Machine language is also called ____ language.

A. volatile
B. high-level
C. binary
D. primary


Answer: C

Computer Science & Information Technology

You might also like to view...

Use the sort (Sobell, page 975) utility to display the lines of the food file in alphabetical order.

What will be an ideal response?

Computer Science & Information Technology

One of the two characterizations of expert hackers is ________.

automated attack tools dogged persistence Both automated attack tools and dogged persistence Neither automated attack tools nor dogged persistence

Computer Science & Information Technology

A proxy server would MOST likely be installed to provide which of the following functions? (Select TWO).

A. Combined DNS and DHCP hosting B. Encryption C. Content filtering D. Fault tolerance E. Website caching

Computer Science & Information Technology

Describe the key activities in the revenue, conversion, and expenditure cycles.

What will be an ideal response?

Computer Science & Information Technology