The identification and removal of bugs in a program is called”(75)”.A.checkingB.debuggingC.revisionD.verification
The identification and removal of bugs in a program is called”(75)”.
A.checking
B.debugging
C.revision
D.verification
相关考题:
● The program and the data are kept inside the computer in a place called (73) .A. bus B. cache C. CPU D. memory
● (75) is a sequence of letters and digits,the first character mustbe a letter.(75) A.An identifierB.A stringC.An arrayD.program
Program that can destroy another computer’s programs are called () . A、bugsB、bugsC、virusesD、games
● Software (75) focuses on three attributes of the program: software architecture, data structure, and procedural detail.(75)A. analysisB. designC. installationD. upgrade
● Configuration management is the process of managing change in hardware, software, firmware, documentation, measurements, etc. As change requires an initial state and next state, the marking of significant states within a series of several changes becomes important. The identification of significant states within the revision history of a configuration item is the central purpose of (75) identification.(75)A. baselineB. valueC.costD. control
●when a string constant is written in C program,the compiler creates (75) of characters containing the characters of the string,and terminating it with"\0".(75) A.a groupB.an arrayC.a setD.a series
, also called end-user program, includes database programs, spreadsheets, word rocessors etc.A.System softwareB.Utility softwareC.Application softwareD.Compiler software
● The program and the data are kept inside the computer in a place called(73) .(73)A. busB. cacheC. CPUD. memory
The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the(71)of the operating system: it allocates time and memory to programs and handles the filestore and communications in response to(72). The shell acts as an(73)between the user and the kernel. When a user logs in, the(74)program checks the username and password, and then starts another program called the shell. The shell is a command line(75)(CLI). It interprets the commands the user types in and arranges for them to be carded out. The commands are themselves programs: when they terminate, the shell gives the user another prompt(% on our systems).A.hubB.centerC.coreD.nucleus
To verify that your printer is operating correctly, you can run the printer(75)program。A.driverB.viewC.browseD.self-test
Programmers test a program by running it to ensure that the(74)are correct and that the program produces the desired outcome. If errors do occur, the programmer must make the appropriate change and recheck the program until it produces the correct results. This(75)is called testing and debugging.A.commandsB.softwareC.instructionsD.measure
● SWOT analysis is a kind of risk identification method. If the project team chose the SO strategy, they should __(75)__.(75)A.make full use of the advantage and catch the opportunityB.overcome the weakness and catch the opportunityC.make full use of the advantage and reduce the threatD.overcome the weakness and reduce the threat
The (1) program means a program written in a high-level language. It is generally translated to an (2) program, which is in a form. directly understandably by the computer.The translation is usually done by a program called (3).A.assembleB.webC.CD.source
Configuration management is the process of managing change in hardware,software,firmware,documentation,measurements,etc.As change requires an initial state and next state,the marking of significant states within a series of several changes becomes important.The identification of significant states within the revision history of a configuration item is the central purpose of(75) identification.A.baselineB.valueC.costD.control
Inside the computer, the operation system(of another software module called a data communication(71))must decide which program will get control next. Each program remember, is associated(72). a particular front -end port. If a program's data have not yet reached its front - end buffer, there is no point giving that program control. Thus the data communication monitor sends its own(73)signal to the front -end devices next port is polled. Note that the(74)computer speed. The computer never has to wait for a terminal or a communication line. Instead, it is the expressive front - end processor that waits for the slower system(75)to respond.A.memoryB.controlC.monitorD.charge
The identification and removal of bugs in a program is called”(73)A.checkingB.debuggingC.revisionD.verification
A computer program, orjust a program, is a sequence of (75) ,written to performa specified task with a computer.A.languagesB.instructionsC.programsD.functions
● Most (75) measures involve data encryption and password.(75)A. securityB. hardwareC. displayD. program
● (75) means thata source program file can be compiled and executed on different computers.(75)A. PortabilityB.UsablityC.RecoveryD.Mobility
The identification and removal ofbugs in a program is called "( )".A.checkingB.debuggingC.revisionD.verification
The identification and removal of bugs in a program is called"______".A.checkingB.debuggingC.revisionD.verification
bugs