Which IT professional generates systems documentation for end users and programmers?
A. Programmer
B. Technical writer
C. Network administrator
D. Helpdesk analyst
Answer: B
Computer Science & Information Technology
You might also like to view...
An __________ attack attempts to alter system resources or affect their operation.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
It is the responsibility of the ____ to ensure that the tested expression is changed in a way that ultimately leads to a normal exit from a while loop.
A. user B. computer operator C. programmer D. compiler
Computer Science & Information Technology
The ____ portion of EFS uses a single key to encrypt the file or folder.
A. asymmetric B. public C. symmetric D. private
Computer Science & Information Technology
A method that lets a user change the class’s instance variables is called a(n) ____.
A. getter B. mutator C. accessor D. friend
Computer Science & Information Technology