Under MVS, the __________ holds system constants and pointers to most of the key control blocks.

a. task control block
b. request block
c. stack
d. communication vector table


d. communication vector table

Computer Science & Information Technology

You might also like to view...

The ____ encompasses those principles, policies, and procedures that ensure essential business functions in the event of a disaster.

A. enterprise recovery function B. enterprise planning function C. strategic planning function D. enterprise continuity function

Computer Science & Information Technology

If a password contains eight upper and lower-case letters and digits, how many possible passwords might an attacker need to try to gain access?

What will be an ideal response?

Computer Science & Information Technology

To report on a company's net book value on the annual tax return, a depreciation ________ must be maintained

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is a complex formula? ?

A. =SUM(B4:B8) B. =(B4/B8)*10 C. both =SUM(B4:B8) and =(B4/B8)*10 D. neither =SUM(B4:B8) nor =(B4/B8)*10

Computer Science & Information Technology