Adjacent items in a list are called ________ items

A) contiguous
B) continuous
C) noncontiguous
D) synchronous

A

Computer Science & Information Technology

You might also like to view...

Designing a program to avoid common errors is called __________ programming.

a. defensive b. detection c. direct d. validation

Computer Science & Information Technology

The process of identifying exposure to threats, creating preventive and recovery procedures, and then testing them to determine if they are sufficient, is known as:

A. business continuity planning B. disaster planning C. business management planning D. enterprise disaster planning

Computer Science & Information Technology