Software falls into two main categories, system and ________

Fill in the blank(s) with correct word


application, applications

Computer Science & Information Technology

You might also like to view...

Which form documents the team's activities during evidence collection?

A. Scene Sketch form B. Field Activity Log form C. Photography Log form D. Field Evidence Log form

Computer Science & Information Technology

Aside from a live memory capture taken at the time of first response, what are two locations on a computer where copies of previous memory configurations can be found?

a. Cache b. Hybernation files c. The registry d. .DMP files

Computer Science & Information Technology

Which of the following is out of your control as a developer?

A. the size of embedded files B. the size of linked files C. the number of HTTP requests D. a user's Internet connection speed

Computer Science & Information Technology

What is the subnet mask for a Class C IP address?

A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.255

Computer Science & Information Technology