The identification and removal of bugs in a program is called”(75)”.A.checkingB.debuggingC.revisionD.verification

The identification and removal of bugs in a program is called”(75)”.

A.checking

B.debugging

C.revision

D.verification


相关考题:

● The program and the data are kept inside the computer in a place called (73) .A. bus B. cache C. CPU D. memory

● (75) is a sequence of letters and digits,the first character mustbe a letter.(75) A.An identifierB.A stringC.An arrayD.program

Program that can destroy another computer’s programs are called () . A、bugsB、bugsC、virusesD、games

● Software (75) focuses on three attributes of the program: software architecture, data structure, and procedural detail.(75)A. analysisB. designC. installationD. upgrade

● Configuration management is the process of managing change in hardware, software, firmware, documentation, measurements, etc. As change requires an initial state and next state, the marking of significant states within a series of several changes becomes important. The identification of significant states within the revision history of a configuration item is the central purpose of (75) identification.(75)A. baselineB. valueC.costD. control

●when a string constant is written in C program,the compiler creates (75) of characters containing the characters of the string,and terminating it with"\0".(75) A.a groupB.an arrayC.a setD.a series

● A group of related fields is called a (75) .(75)A. dataB. fileC. recordD. database

A(75) infected computer may lose its data.A.fileB.databaseC.VirusD.program

, also called end-user program, includes database programs, spreadsheets, word rocessors etc.A.System softwareB.Utility softwareC.Application softwareD.Compiler software

● The program and the data are kept inside the computer in a place called(73) .(73)A. busB. cacheC. CPUD. memory

The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the(71)of the operating system: it allocates time and memory to programs and handles the filestore and communications in response to(72). The shell acts as an(73)between the user and the kernel. When a user logs in, the(74)program checks the username and password, and then starts another program called the shell. The shell is a command line(75)(CLI). It interprets the commands the user types in and arranges for them to be carded out. The commands are themselves programs: when they terminate, the shell gives the user another prompt(% on our systems).A.hubB.centerC.coreD.nucleus

To verify that your printer is operating correctly, you can run the printer(75)program。A.driverB.viewC.browseD.self-test

Programmers test a program by running it to ensure that the(74)are correct and that the program produces the desired outcome. If errors do occur, the programmer must make the appropriate change and recheck the program until it produces the correct results. This(75)is called testing and debugging.A.commandsB.softwareC.instructionsD.measure

● SWOT analysis is a kind of risk identification method. If the project team chose the SO strategy, they should __(75)__.(75)A.make full use of the advantage and catch the opportunityB.overcome the weakness and catch the opportunityC.make full use of the advantage and reduce the threatD.overcome the weakness and reduce the threat

A group of related fields is called a(75).A.dataB.fileC.recordD.database

The (1) program means a program written in a high-level language. It is generally translated to an (2) program, which is in a form. directly understandably by the computer.The translation is usually done by a program called (3).A.assembleB.webC.CD.source

Configuration management is the process of managing change in hardware,software,firmware,documentation,measurements,etc.As change requires an initial state and next state,the marking of significant states within a series of several changes becomes important.The identification of significant states within the revision history of a configuration item is the central purpose of(75) identification.A.baselineB.valueC.costD.control

Inside the computer, the operation system(of another software module called a data communication(71))must decide which program will get control next. Each program remember, is associated(72). a particular front -end port. If a program's data have not yet reached its front - end buffer, there is no point giving that program control. Thus the data communication monitor sends its own(73)signal to the front -end devices next port is polled. Note that the(74)computer speed. The computer never has to wait for a terminal or a communication line. Instead, it is the expressive front - end processor that waits for the slower system(75)to respond.A.memoryB.controlC.monitorD.charge

In general, you install software by the(75)program in CD-ROM.A.read meB.optionC.loadD.setup

The identification and removal of bugs in a program is called”(73)A.checkingB.debuggingC.revisionD.verification

A computer program, orjust a program, is a sequence of (75) ,written to performa specified task with a computer.A.languagesB.instructionsC.programsD.functions

● Most (75) measures involve data encryption and password.(75)A. securityB. hardwareC. displayD. program

(75)A.Program analysisB.Function requirementC.Application analysisD.Physical model

● (75) means thata source program file can be compiled and executed on different computers.(75)A. PortabilityB.UsablityC.RecoveryD.Mobility

The identification and removal ofbugs in a program is called "( )".A.checkingB.debuggingC.revisionD.verification

The identification and removal of bugs in a program is called"______".A.checkingB.debuggingC.revisionD.verification