Answer:
I said CLI.
Explanation:
''A command-line interface (CLI) processes commands to a computer program in the form of lines of text.''- Wikipedia
To understand flow of programming logic flow chat technique been used. Once end user starts any learning programming flow chat design been learned and corrected the mistake. After success of flow chat design end user been advice to do programming and tested in computer.
<u>Explanation:</u>
In flow chart design is used for beginner level programming. Some time to make higher level managers to understand this flow chart design is used.
Flow chart has start, procedure, condition, function or procedure and end with stop diagrams.
Flow chart makes end user understand the flow of logics.
Suppose we need to do a process for a procedure, end user has to design with start flow chart symbol and put a procedure flow chart symbol with identification character, then end user has use same identification character and start designing the procedure in the flow chart diagram.
Procedure in flow char design is used to call same procedure number of time, so that repeated coding is avoided.
Answer:
<u>see </u><u>below</u><u>:</u>
Explanation:
One is (the cursor).
Whenever you see a flashing vertical line called-the cursor--you can start typing.Note that the mouse pointer is also called a cursor,but it is shaped differently.The keyboard cursor is also called the insertion point.
Answer:
Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.
On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.
This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.