Programs used to control system performance are classified as

A. experimental programs

B. system programs

C. specialized program

D. organized programs

You can do it
  1. Process of gaining access to a computer by giving correct user identification is classified as
  2. Application program used with all documentation is considered
  3. Library program may comes from
  4. Slots in spreadsheet that can be copied to other slots are classified as
  5. Programs are fully tested and documented properly before including it into
  6. Programs used to control system performance are classified as
  7. Program which is readily available to computer users as part of software package is classified as
  8. Application program example includes
  9. Program provides users with grid of rows and columns is classified as
  10. Programs written by programmer to help computer users are considered as
  11. Commercial organization specializing preparation and design of software package is classified as
  12. Slots in spreadsheet whose formula is not exactly copied are classified as
  13. Specialized program that allows users to utilize in specific application is classified as
  14. Software which controls general operations of computer system is classified as
  15. Number and name system uses to identify user is called
  16. Types of software programs usually includes
  17. Record of programs recorded as they run is classified as
  18. If program can cope data errors - program is called
  19. Program used to transfer contents onto a printer from VDU screen is classified as
  20. System software's are supplied by the
  21. Set of programs with full set of documentation is considered as
  22. System program which performs one simple task is classified as
  23. Process to exit from computer by giving correct instructions such as 'EXIT' is classified as
  24. Program which is used to produce pictures and text and to organize it in newspaper is classified as
  25. System programs examples includes
  26. In microcomputers - operating system is usually stored on
  27. Set of software authorized to specific users is considered as
  28. Collection of useful working routines and programs and is only available to users with authorization…
  29. Typing of words on keyboard to drive program with help of
  30. Set of software is held central by