The user responds to an active prompt by typing a command name followed by necessary __________.

a. modifiers
b. parameters
c. operands
d. pointers

b. parameters

Computer Science & Information Technology

You might also like to view...

The mouse technique that allows you to select one or more objects and pull it to a different location is called ________

A) mark and move B) pick and pull C) drag and drop D) select and swap

Computer Science & Information Technology

Why is a security impact assessment performed as part of a change management process?

A. To find out if sufficient funds have been allocated to the security function B. To review the level of security against the efforts involved in testing change C. To determine the likelihood of downtime or security reduction caused by a potential change D. To assess compliance with regulations

Computer Science & Information Technology