Often, the programmer’s interface with the operating system is implemented through __________.

a. an application programming interface or API
b. the user interface
c. direct calls to operating system routines
d. none of the above


a. an application programming interface or API

Computer Science & Information Technology

You might also like to view...

Give a few examples of cospectral graphs with respect to the Laplacian matrix.

Computer Science & Information Technology

Setting up equipment to spoof a carrier?s tower and infrastructure is known as _______________.

A. network ghosting B. cell tower control C. network analysis D. tower spoofing

Computer Science & Information Technology

Ethernet is a connection standard for high-definition (HD) video and audio.

a. true b. false

Computer Science & Information Technology

An attacker wearing a building maintenance uniform approached a company's receptionist asking for access to a secure area. The receptionist asks for identification, a building access badge and checks the company's list approved maintenance personnel prior to granting physical access to the secure are.The controls used by the receptionist are in place to prevent which of the following types of attacks?

A. Tailgating B. Shoulder surfing C. Impersonation D. Hoax

Computer Science & Information Technology