____ was the first high-level programming language that was actually implemented.
A. COBOL
B. BASIC
C. PL-1
D. FORTRAN
Answer: D
You might also like to view...
Which of the following sets of statements creates a multidimensional array with 3 rows, where the first row contains 1 value, the second row contains 4 items and the final row contains 2 items?
a.``` int[][] items; items = new int[3][?]; items[0] = new int[1]; items[1] = new int[4]; items[2] = new int[2]; ``` b.``` int[][] items; items = new int[3][]; items[0] = new int[1]; items[1] = new int[4]; items[2] = new int[2]; ``` c.``` int[][] items; items = new int[?][?]; items[0] = new int[1]; items[1] = new int[4]; items[2] = new int[2]; ``` d.``` int[][] items; items[0] = new int[1]; items[1] = new int[4]; items[2] = new int[2]; ```
Malware is another term for ____ and refers to any computer program designed to surreptitiously enter a computer, gain unauthorized access to data, or disrupt normal processing operations.
A. malicious software B. virus signatures C. corrupted files D. backup utilities
When modifying a disk image in VirtualBox, what mode provides full access to the guest OS to read and write, so that when a snapshot is created, the state of the disk is also saved with it?
A. Normal mode B. Writethrough mode C. Shareable mode D. Immutable mode
Which one of the following is NOT a reason for performing an ethical hack?
What will be an ideal response?