Identify and explain the two categories of activities in program maintenance.
What will be an ideal response?
Answers will vary.
Computer Science & Information Technology
You might also like to view...
The process to induce you to provide personal information through a website is called cyberstalking
Indicate whether the statement is true or false.
Computer Science & Information Technology
Typing netstat -rcommand shows the ____________________ table.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
MC If two or more records have the duplicate primary-key field values, this vio-lates the_________ .
a) Rule of Data Integrity. b) Rule of Database Integrity. c) Rule of Entry Integrity. d) None of the above.
Computer Science & Information Technology
Suppose your friend plans, designs, creates, operates, secures, monitors, and maintains databases. She must be a(n) ___________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology