____ was the first high-level programming language that was actually implemented.

A. COBOL
B. BASIC
C. PL-1
D. FORTRAN


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following sets of statements creates a multidimensional array with 3 rows, where the first row contains 1 value, the second row contains 4 items and the final row contains 2 items?

a.``` int[][] items; items = new int[3][?]; items[0] = new int[1]; items[1] = new int[4]; items[2] = new int[2]; ``` b.``` int[][] items; items = new int[3][]; items[0] = new int[1]; items[1] = new int[4]; items[2] = new int[2]; ``` c.``` int[][] items; items = new int[?][?]; items[0] = new int[1]; items[1] = new int[4]; items[2] = new int[2]; ``` d.``` int[][] items; items[0] = new int[1]; items[1] = new int[4]; items[2] = new int[2]; ```

Computer Science & Information Technology

Malware is another term for ____ and refers to any computer program designed to surreptitiously enter a computer, gain unauthorized access to data, or disrupt normal processing operations.

A. malicious software B. virus signatures C. corrupted files D. backup utilities

Computer Science & Information Technology

When modifying a disk image in VirtualBox, what mode provides full access to the guest OS to read and write, so that when a snapshot is created, the state of the disk is also saved with it?

A. Normal mode B. Writethrough mode C. Shareable mode D. Immutable mode

Computer Science & Information Technology

Which one of the following is NOT a reason for performing an ethical hack?

What will be an ideal response?

Computer Science & Information Technology