Which IT professional generates systems documentation for end users and programmers?

A. Programmer
B. Technical writer
C. Network administrator
D. Helpdesk analyst


Answer: B

Computer Science & Information Technology

You might also like to view...

An __________ attack attempts to alter system resources or affect their operation.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

It is the responsibility of the ____ to ensure that the tested expression is changed in a way that ultimately leads to a normal exit from a while loop.

A. user B. computer operator C. programmer D. compiler

Computer Science & Information Technology

The ____ portion of EFS uses a single key to encrypt the file or folder.

A. asymmetric B. public C. symmetric D. private

Computer Science & Information Technology

A method that lets a user change the class’s instance variables is called a(n) ____.

A. getter B. mutator C. accessor D. friend

Computer Science & Information Technology