An application may rely on other files, in particular, ______________ files.
Fill in the blank(s) with the appropriate word(s).
DLL
correct
Computer Science & Information Technology
You might also like to view...
Which of the following is a value that is written into the code of a program?
a. a literal b. an assignment statement c. an operator d. a variable
Computer Science & Information Technology
In the figure above, which of the following software is being used?
A. Windows Media Player B. Apple iTunes C. Apple iRip D. Windows Music Player
Computer Science & Information Technology
The ____ element is used to display prompting text on the screen.
A. prompting B. input C. legend D. label
Computer Science & Information Technology
When using the Common Internet File System (CIFS), which security model will require network users to have a user name and password to access a specific resource?
A. NT level security B. Share-level security C. User-level security D. CIF level security
Computer Science & Information Technology