Menu-driven programs should be broken down into __________ that perform individual tasks.

a. loops
b. functions
c. modules
d. cases

c. modules

Computer Science & Information Technology

You might also like to view...

In a __________ attack, an application or physical device masquerades as an authentic application or device for the purpose of capturing a user password, passcode, or biometric.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In Linux, what is the command for viewing a file's contents on the screen?

A. dir B. cat C. etc D. ls

Computer Science & Information Technology