A_______________ contains specific rules and words that express the logical steps of an algorithm.
The design of the network is called the network .
The most frequently used instructions of a computer program are likely to be fetched from____________.
The _________contains data descriptions and defines the name, data type, and length of each field in the database.
Personal logs or journal entries posted on the Web are known as________.
A(n)__________uses pictures (called icons) &ni menus displayed on the screen to send commands to the computer system.
The___________manual tells you how to use a software program.
Which of the following is not a type of broadband internet connection ?
Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as
Making a field_________means that it cannot be left blank.
@ Jenisys Systems Pvt Ltd