The program development cycle is made up of __________ steps that are repeated until no errors can be found in the program.
a. five
b. four
c. three
d. two
a. five
Computer Science & Information Technology
You might also like to view...
You can type comments to yourself in the _____ for a specific slide while working in Normal view.
A. Slide pane B. Notes pane C. Slides tab D. Outline tab
Computer Science & Information Technology
Asymmetric encryption uses ____ separate keys for each message.
A. one B. two C. three D. four
Computer Science & Information Technology
A(n) ________ is a control that allows a user to select one or more values in a group of choices
A) legacy object B) ActiveX control C) button D) check box
Computer Science & Information Technology
The ____ CHART TOOLS contextual tabs appear on the Ribbon when you select a chart.
A. INSERT and DESIGN B. DESIGN and FORMAT C. INSERT and FORMAT D. FORMAT and PRINT
Computer Science & Information Technology