As opposed to general-purpose applications, which are widely used in nearly every discipline, ________ applications are more narrowly focused.
A. object-oriented
B. web authoring
C. electronic
D. specialized
Answer: D
Computer Science & Information Technology
You might also like to view...
Keyword ________ indicates that an element contains parseable character data.
a) PARSEDATA b) NDATA c) CDATA d) PCDATA
Computer Science & Information Technology
Find out the IP network address assigned to your organization. What class (A thorugh E) is it?
What will be an ideal response?
Computer Science & Information Technology
Hacking into phone systems is called ___________
a. Telnetting b. Dial hacking c. Phreaking d. None of the above
Computer Science & Information Technology
Which of the following is most commonly a local security policy?
a. Password length b. Use a password to log in c. Soft Power d. RAID
Computer Science & Information Technology