Adjacent items in a list are called ________ items
A) contiguous
B) continuous
C) noncontiguous
D) synchronous
A
Computer Science & Information Technology
You might also like to view...
Designing a program to avoid common errors is called __________ programming.
a. defensive b. detection c. direct d. validation
Computer Science & Information Technology
The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient, is known as:
A. business continuity planning B. disaster planning C. business management planning D. enterprise disaster planning
Computer Science & Information Technology