A user program may limit user input to 'y' and 'n' by

A. telling the terminal driver to discard all other keys
B. ignoring all other keys


A. telling the terminal driver to discard all other keys

Computer Science & Information Technology

You might also like to view...

When shooting video for the Web, what can you do to help keep the file size as small as possible?

What will be an ideal response?

Computer Science & Information Technology

LAN and WAN communications have been generally guided by a network communications model called the ___________________________________ reference model.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A line comment must be placed at the end of the line to which the comment refers.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Multiple servers' IP addresses fall within the DHCP scope assigned by the administrator. Which of the following should be implemented to ensure these static IP addresses are not assigned to workstations?

A. The administrator should create exclusions for the workstations IP addresses. B. The administrator should change the servers to utilize DHCP to obtain IP addresses. C. The administrator should change the workstations to utilize static IP addresses. D. The administrator should create exclusions for the servers IP addresses.

Computer Science & Information Technology