Identify and explain the two categories of activities in program maintenance.

What will be an ideal response?


Answers will vary.

Computer Science & Information Technology

You might also like to view...

The process to induce you to provide personal information through a website is called cyberstalking

Indicate whether the statement is true or false.

Computer Science & Information Technology

Typing netstat -rcommand shows the ____________________ table.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

MC If two or more records have the duplicate primary-key field values, this vio-lates the_________ .

a) Rule of Data Integrity. b) Rule of Database Integrity. c) Rule of Entry Integrity. d) None of the above.

Computer Science & Information Technology

Suppose your friend plans, designs, creates, operates, secures, monitors, and maintains databases. She must be a(n) ___________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology