Menu-driven programs should be broken down into __________ that perform individual tasks.
a. loops
b. functions
c. modules
d. cases
c. modules
Computer Science & Information Technology
You might also like to view...
In a __________ attack, an application or physical device masquerades as an authentic application or device for the purpose of capturing a user password, passcode, or biometric.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
In Linux, what is the command for viewing a file's contents on the screen?
A. dir B. cat C. etc D. ls
Computer Science & Information Technology