When you start an application, each program instruction is placed in a ____, where it awaits processing.

A. hard core
B. memory location
C. register
D. processor


Answer: B

Computer Science & Information Technology

You might also like to view...

The benefit from dividing code into methods known as ____________ is gained as follows: After you write code to perform a task once, you can use the code again every time your program needs to perform the same task.

a. code recycling b. software engineering c. logic recycling d. code reuse

Computer Science & Information Technology

What are the four layers of the TCP/IP model?

What will be an ideal response?

Computer Science & Information Technology

Requirements for a complex password system include using a ____ value, implementing strong encryption, requiring periodic password changes, and generally implementing a system where guessing a password or its hash is very difficult.

A. hex B. salt C. zero D. known

Computer Science & Information Technology

You can share documents with others by e-mailing them or posting them to a blog from inside ________

A) Internet Explorer B) Share view C) Backstage view D) Outlook

Computer Science & Information Technology