All programs must be brought into ____ before they can be executed.
A. secondary storage
B. an input device
C. an output device
D. main memory
Answer: D
You might also like to view...
What is byte-code? What is its importance?
What will be an ideal response?
If you choose to use a vocabulary's namespace as the default namespace for a schema, you do not have to qualify any references to customized objects in the ____ namespace.
A. catalog B. EBNF C. limited D. target
A _____________ is a word, phrase, symbol, or design that identifies and distinguishes the source of the goods of one party from those of others.
a. copyright b. trademark c. domain name d. Web host
A ____ captures the user's passwords and credit card numbers (and sends them to someone else), or may even put the computer under someone else's remote control at some point in the future.
A. keystroke logger B. virus C. worm D. sniffer