draft the logic of the code. This process is an example of:
• A. drawing a value stream map.
• B. developing pseudocode.
• C. identifying functions.
• D. compiling the language.
B. developing pseudocode.
A security administrator is adding accounting features to a web
application. Which of the following would be the BEST action?
• A. Enhance the granularity of user permissions.
• B. Enable an audit log.
• C. Implement smart card login.
• D. Adopt a procedure for adding accounts.
B. Enable an audit log.
A systems administrator wants to run a script but does not have access
to the graphical user interface. Which of the following can be used to
run scripts?
• A. Text editor
• B. Word processor
• C. Command line
• D. Spreadsheet
C. Command line
Which of the following will a company do to update a customer's
address while using a flat file database?
• A. Update the address for each order the customer placed.
• B. Update the address in the customer address table.
• C. Update the address field in the customer order table.
• D. Update the primary key to reflect the customer’s address.
B. Update the address in the customer address table
A developer embeds a query in a high-level program to extract
information from a database. This is an example of:
• A. database direct access.
• B. database utility access.
• C. database programmatic access.
• D. database manual access.
C. database programmatic access