Program used to transfer contents onto a printer from VDU screen is classified as

A. utility dump

B. screen dump

C. function dump

D. enquiry dump

You can do it
  1. Special set of characters that computer associates with specific user identification is classified as
  2. Library program may comes from
  3. Program provides users with grid of rows and columns is classified as
  4. Program which is readily available to computer users as part of software package is classified as
  5. Slots in spreadsheet whose formula is not exactly copied are classified as
  6. In microcomputers - operating system is usually stored on
  7. Types of software programs usually includes
  8. If program can cope data errors - program is called
  9. Application program used with all documentation is considered
  10. System programs examples includes
  11. Process of gaining access to a computer by giving correct user identification is classified as
  12. Commercial organization specializing preparation and design of software package is classified as
  13. Software which controls general operations of computer system is classified as
  14. System software's are supplied by the
  15. Programs used to control system performance are classified as
  16. Program produces experimental results for biologist research is classified as
  17. Process of checking software suitability for any particular application is classified as
  18. Specialized program that allows users to utilize in specific application is classified as
  19. Program used to transfer contents onto a printer from VDU screen is classified as
  20. Function of running and loading programs and usage of peripherals is function of
  21. Program which exactly perform operations that manual says is classified as
  22. Application program example includes
  23. Program which is used to produce pictures and text and to organize it in newspaper is classified as
  24. System program which performs one simple task is classified as
  25. Set of programs with full set of documentation is considered as
  26. Number and name system uses to identify user is called
  27. Programs are fully tested and documented properly before including it into
  28. Record of programs recorded as they run is classified as
  29. Collection of useful working routines and programs and is only available to users with authorization…
  30. Set of software authorized to specific users is considered as