As opposed to general-purpose applications, which are widely used in nearly every discipline, ________ applications are more narrowly focused.

A. object-oriented
B. web authoring
C. electronic
D. specialized


Answer: D

Computer Science & Information Technology

You might also like to view...

Keyword ________ indicates that an element contains parseable character data.

a) PARSEDATA b) NDATA c) CDATA d) PCDATA

Computer Science & Information Technology

Find out the IP network address assigned to your organization. What class (A thorugh E) is it?

What will be an ideal response?

Computer Science & Information Technology

Hacking into phone systems is called ___________

a. Telnetting b. Dial hacking c. Phreaking d. None of the above

Computer Science & Information Technology

Which of the following is most commonly a local security policy?

a. Password length b. Use a password to log in c. Soft Power d. RAID

Computer Science & Information Technology