Programmers use the term "____" to describe programs that are well designed, and easy to understand and maintain.
A. refined
B. graceful
C. stylish
D. elegant
Answer: D
You might also like to view...
Which of the following refers to the use of fraudulent Web sites and e-mail links to trick people into revealing sensitive, personal, and financial information?
A. hacking B. phishing C. scamming D. tricking
A string of characters used to control network access is called a(n):
A) password B) secure identifier C) passphrase D) login
?Although many authors use a more conversational style for e-mail, users should remember that e-mail messages often are forwarded to other recipients or groups,and so you must consider the users to whom it might be distributed.
Answer the following statement true (T) or false (F)
A(n) ____ in the busy list occurs when a memory block between two other busy memory blocks is returned to the free list.
A. blank line B. null entry C. joined entry D. empty entry