The communication mechanisms among modules are called ______.

a) algorithms
b) solutions
c) prototypes
d) interfaces


d.

Computer Science & Information Technology

You might also like to view...

The __________ member variable may be accessed before any objects of the class have been created.

a. private b. public c. inline d. static e. None of these

Computer Science & Information Technology

Which of the following is the best example of a fundamental network management tool?

a. SNMP b. ping c. trace route d. Documentation

Computer Science & Information Technology

Give three examples of when you would want to use quotes around your search query.

What will be an ideal response?

Computer Science & Information Technology

Each character in a string is stored in binary using the ASCII or ____ code.

a. EBCDIC b. Unicode c. Char-set d. C-char

Computer Science & Information Technology