The program development cycle is made up of __________ steps that are repeated until no errors can be found in the program.

a. five
b. four
c. three
d. two


a. five

Computer Science & Information Technology

You might also like to view...

You can type comments to yourself in the _____ for a specific slide while working in Normal view.

A. Slide pane B. Notes pane C. Slides tab D. Outline tab

Computer Science & Information Technology

Asymmetric encryption uses ____ separate keys for each message.

A. one B. two C. three D. four

Computer Science & Information Technology

A(n) ________ is a control that allows a user to select one or more values in a group of choices

A) legacy object B) ActiveX control C) button D) check box

Computer Science & Information Technology

The ____ CHART TOOLS contextual tabs appear on the Ribbon when you select a chart.

A. INSERT and DESIGN B. DESIGN and FORMAT C. INSERT and FORMAT D. FORMAT and PRINT

Computer Science & Information Technology