The ________ language was developed by IBM Corporation between 1954 and 1957 to be used for scientific and engineering applications that require complex mathematical computations.

(a) COBOL.
(b) Pascal.
(c) Fortran.
(d) Basic.


(c) Fortran.

Computer Science & Information Technology

You might also like to view...

Which subsystem does permanent networking cabling within a building belong to?

What will be an ideal response?

Computer Science & Information Technology

Which of the following kinds of software allows users to create visual aids for presentations to communicate ideas, messages, and other information to a group?

A. desktop publishing B. image editing C. presentation D. communications

Computer Science & Information Technology

The SSID broadcast for a wireless router has been disabled but a network administrator notices that unauthorized users are accessing the wireless network. The administor has determined that attackers are still able to detect the presence of the wireless network despite the fact the SSID has been disabled. Which of the following would further obscure the presence of the wireless network?

A. Upgrade the encryption to WPA or WPA2 B. Create a non-zero length SSID for the wireless router C. Reroute wireless users to a honeypot D. Disable responses to a broadcast probe request

Computer Science & Information Technology

Enumerate the steps required for addition of a record when an index file uses external hashing as specified in the text.

What will be an ideal response?

Computer Science & Information Technology