Every program that interacts with people responds to a specific set of commands. The set of commands and the syntax for entering them is called the user interface and varies from one program to another. The DOS operating system makes a distinction between internal and external commands.
Answer:
Vulnerable business processes, also called business process compromise (BPC), occurs when an attacker manipulates commonplace actions that are routinely performed.
Answer:
Pulling related code together in objects is Arrays
Helps programmers when they revisit code or are new to code-- Documentation
Explanation:
This is all I know