__________ is the informal language used by programmers to create models of programs.
a. Flowcharting
b. Pseudocode
c. Algorithm
d. Source code
b. Pseudocode
You might also like to view...
The ___ tag instructs validators to compare the code in the document to the HTML5 rules.
A. HEAD B. DOCTYPE C. HTML D. BODY
If a Web application that communicates with a database has not been audited, a potential SQL ____ risk remains.
A. infection B. encryption C. injection D. projection
?There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events?
A. activate the forensics analysis team and prepare documentation B. ?meet with your lawyers to prepare to counter-sue the customers C. settle with the customers, however much it may cost D. none of these answers
With __________ the processor looks ahead in the instruction code fetched from memory and predicts which branches, or groups of instructions, are likely to be processed next.
Fill in the blank(s) with the appropriate word(s).