__________ is the informal language used by programmers to create models of programs.

a. Flowcharting
b. Pseudocode
c. Algorithm
d. Source code


b. Pseudocode

Computer Science & Information Technology

You might also like to view...

The ___ tag instructs validators to compare the code in the document to the HTML5 rules.

A. HEAD B. DOCTYPE C. HTML D. BODY

Computer Science & Information Technology

If a Web application that communicates with a database has not been audited, a potential SQL ____ risk remains.

A. infection B. encryption C. injection D. projection

Computer Science & Information Technology

?There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events?

A. activate the forensics analysis team and prepare documentation B. ?meet with your lawyers to prepare to counter-sue the customers C. settle with the customers, however much it may cost D. none of these answers

Computer Science & Information Technology

With __________ the processor looks ahead in the instruction code fetched from memory and predicts which branches, or groups of instructions, are likely to be processed next.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology