A diagram that uses special symbols to display pictorially the flow of execution of a program or program module is a(n):

a. hierarchy chart
b. pseudocode listing
c. application chart
d. flowchart


D

Computer Science & Information Technology

You might also like to view...

A ____ allows you to define which areas of artwork on a single layer are visible, not visible, or partly visible.

A. buffer B. layer mask C. style option D. stencil mask

Computer Science & Information Technology

In ____ copying, each reference variable refers to its own object.

A. shallow B. deep C. method D. object

Computer Science & Information Technology

In a WIDS anomaly detection system the security administrator defines the ____ (or normal) state of the network's traffic.

A. baseline B. signature C. pattern D. false positives

Computer Science & Information Technology

The catch clause __________.

a. starts with the word catch followed by a parameter list in parentheses containing an ExceptionType parameter variable b. follows the try clause c. contains code to gracefully handle the exception type listed in the parameter list d. The catch clause does all of these

Computer Science & Information Technology