You need to see an image, but here's some possible answers.
operating system.
program.
spreadsheet.
freeware.
groupware.
shareware.
application software.
bundled software.
software system. ...
package. ...
sofware (related) ...
hardware (related) ...
software program. ...
software-hardware (related) ...
pc-based (related)
<h2><u><em>
Bryannasalaz</em></u></h2>
Answer:
D. called
Explanation:
A function is executed when it is called.
Function definition comprises of the code body of the function.For example:
int add(int a, int b){
return a+b;
}
Function declaration or function prototype specifies the signature of the function ( number and type of arguments, return type). e.g,
int add(int a,int b);
Function call is when the function is executed with actual arguments:
add(2,4);
This will return 6 upon execution of function body.
The answer is True
It
intentionally or unintentionally compromises a system by making unauthorized changes
to data. As compared to intentional changes which are usually malicious, unintentional
changes are normally accidental. Changes and modifications to the system
configurations can also compromise integrity. Such modifications might include
deleting, changing, and creating information in a network resource.
It is best to implement mechanisms on how one can track and audit such changes as they happen