____ relates to how much one module in a program must rely on another.
A. Coupling
B. Cohesion
C. Orthogonality
D. Reusability
Answer: A
You might also like to view...
Explain why the RPC interface to early implementations of NFS is potentially insecure. The security loophole has been closed in NFS 3 by the use of encryption. How is the encryption key kept secret? Is the security of the key adequate?
What will be an ideal response?
Proxy servers perform operations on ____-level data.
A. application B. header C. data link D. transport
Which of the following is NOT one of the basic rules that must be followed when developing a policy?
A. policy should never conflict with law B. policy must be able to stand up in court if challenged C. policy should be focused on protecting the organization from public embarrassment D. policy must be properly supported and administered
A program with a benign capability that conceals another, sinister purpose is called a
a. hack. b. rogue. c. Trojan horse. d. virus. e. worm.