In addition to classifying programming languages as high or low level, they are also classified by orientation as either ____ or object-oriented.

a. linked
b. procedural
c. interpreted
d. compiled


b. procedural

Computer Science & Information Technology

You might also like to view...

In order for the XSL code to be valid, the _______ line of HTML must be present.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can undock a document from a group by pulling the document tab out of the group.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Disk Management uses ________, which in turn deletes the data when the partitions are removed

Fill in the blank(s) with correct word

Computer Science & Information Technology

What is two-factor authentication’s promise?

A. The two factors of authentication have to be similar B. The impostor needs one method to work to be able to access a system C. If one authentication method is broken, the impostor will still not be able to authenticate himself or herself. D. The user can pick any of the two authentication methods.

Computer Science & Information Technology