Open the DB2 command line processor.
⇑ Translate the sentence above by Google ⇑
Related: processor
Prev: If your program is a viewer or editor of data—such as a word processor or an image displayer—that data might be from an attacker, so it's an untrusted input.
Next: Following the input processor are four decade counters.