The communication mechanisms among modules are called ______.
a) algorithms
b) solutions
c) prototypes
d) interfaces
d.
Computer Science & Information Technology
You might also like to view...
The __________ member variable may be accessed before any objects of the class have been created.
a. private b. public c. inline d. static e. None of these
Computer Science & Information Technology
Which of the following is the best example of a fundamental network management tool?
a. SNMP b. ping c. trace route d. Documentation
Computer Science & Information Technology
Give three examples of when you would want to use quotes around your search query.
What will be an ideal response?
Computer Science & Information Technology
Each character in a string is stored in binary using the ASCII or ____ code.
a. EBCDIC b. Unicode c. Char-set d. C-char
Computer Science & Information Technology