网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
The identification and removal of bugs in a program is called"______".

A.checking
B.debugging
C.revision
D.verification

参考答案

参考解析
解析:
更多 “The identification and removal of bugs in a program is called"______".A.checking B.debugging C.revision D.verification” 相关考题
考题 ● The program and the data are kept inside the computer in a place called (73) .A. bus B. cache C. CPU D. memory

考题 Program that can destroy another computer’s programs are called () . A、bugsB、bugsC、virusesD、games

考题 , also called end-user program, includes database programs, spreadsheets, word rocessors etc.A.System softwareB.Utility softwareC.Application softwareD.Compiler software

考题 ● The program and the data are kept inside the computer in a place called(73) .(73)A. busB. cacheC. CPUD. memory

考题 Passage OneSometimes children are kidnapped. Kidnapping is like stealing a child. It is important that kidnappedchildren are found and brought home as soon as possible.The sooner the public knows about a kidnapping the sooner they might be able to help. Some people decided to start a program that would alert the public about kidnappings right away. This program is called Care Alert.The Care Alert program gives television and radio stations important information about a recently kidnapped child. These stations will then tell the public what happened in hopes that someone might be able to help. Anyone that may have seen something about the kidnapping could then call the police.Sometimes one parent of a child kidnaps his or her own child. These kidnappings are not usually used in the Care Alert program. The Care Alert program is only used when a stranger has taken a child.When a child is kidnapped he is in a lot of danger. It is very important to find him as soon as possible. It is hoped that this new Care Alert program will save children's lives.36. What is kidnapping based on the passage? It is ______.A. taking a child away without permissionB. making a child sleeping with a songC. hugging a child with loveD. saving a child from a stranger

考题 The purpose of(66)is to enlarge the(67), the set of addresses a program can utilize. For example, it might contain twice as many addresses as main memory. A program using all of it, therefore, would not be able to fit in main memory all at once. Nevertheless, the computer could execute such a program by Copying into main memory those portions of the program needed at any given point during execution.To facilitate copying(66)into real memory, the operating system divides it into pages, each of which contains a fixed number of addresses. Each page is stored on a disk until ii is needed. When the page is needed, the operating system copies it from disk to main memory, translating the(68)into real addresses. The process of translating virtual addresses into real addresses is called(69). The copying of virtual pages from disk to main memory is known as(70)or swapping.A.fake memoryB.false memoryC.virtual memoryD.mendacious memory

考题 The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the(71)of the operating system: it allocates time and memory to programs and handles the filestore and communications in response to(72). The shell acts as an(73)between the user and the kernel. When a user logs in, the(74)program checks the username and password, and then starts another program called the shell. The shell is a command line(75)(CLI). It interprets the commands the user types in and arranges for them to be carded out. The commands are themselves programs: when they terminate, the shell gives the user another prompt(% on our systems).A.hubB.centerC.coreD.nucleus

考题 What remains of a word after the removal of all affixes is a stem.()

考题 Programmers test a program by running it to ensure that the(74)are correct and that the program produces the desired outcome. If errors do occur, the programmer must make the appropriate change and recheck the program until it produces the correct results. This(75)is called testing and debugging.A.commandsB.softwareC.instructionsD.measure

考题 The (1) program means a program written in a high-level language. It is generally translated to an (2) program, which is in a form. directly understandably by the computer.The translation is usually done by a program called (3).A.assembleB.webC.CD.source

考题 Inside the computer, the operation system(of another software module called a data communication(71))must decide which program will get control next. Each program remember, is associated(72). a particular front -end port. If a program's data have not yet reached its front - end buffer, there is no point giving that program control. Thus the data communication monitor sends its own(73)signal to the front -end devices next port is polled. Note that the(74)computer speed. The computer never has to wait for a terminal or a communication line. Instead, it is the expressive front - end processor that waits for the slower system(75)to respond.A.memoryB.controlC.monitorD.charge

考题 The identification and removal of bugs in a program is called”(73)A.checkingB.debuggingC.revisionD.verification

考题 The identification and removal ofbugs in a program is called "( )".A.checking B.debugging C.revision D.verification

考题 bugs

考题 5520 AMS将NE备份文件名格式化为:IP address()agent name()software()oam auto removal()yyyy-mm-dd-hh-mm-ss.gz,其中auto removal值正确的是A、MB、DC、SD、Y

考题 余热排出系统﹝压水堆﹞ residual heat removal system

考题 群分出截面 group removal cross section

考题 Which statements describe guaranteed behavior of the garbage collection and finalization mechanisms?()  A、Objects are deleted when they can no longer be accessed through any reference.B、The finalize() method will eventually be called on every object.C、The finalize() method will never be called more than once on an object.D、An object will not be garbage collected as long as it is possible for an active part of the program to access it through a reference.E、The garbage collector will use a mark and sweep algorithm.

考题 英译中:Furniture removal carriers

考题 英译中:Automated vehicle identification

考题 运行checksetup.pl后,系统生成localconfig文件,以下为其中几行内容,请说出哪句为BUG数据库的名称?()A、$db_host=“localhost“;B、$db_port=3306;C、$db_name=“bugs“;D、$db_user=“bugs。

考题 单选题A rogue loose called a hacker could take control of the entire system by implanting his own instructions in the software and then he could program the computer to erase any sign ______ .A of his being ever thereB he ever has been thereC of his having ever been thereD of him having ever been there

考题 单选题() is the removal of exhaust gases by blowing in fresh air.A Gas exchangeB ChargingC ScavengingD Supercharging

考题 单选题Great care is dedicated to the removal of from the scavenge air()A gravityB viscosityC densityD humidity

考题 单选题Gas exchange, which is a basic part of the cycle of an internal combustion engine, is()A the supply of normal air and removal of compressed airB the supply of fuel oil and combustion of the atomized oilC the supply of fresh air and removal of exhaust gasesD the supply of fresh air and removal of the extra heat

考题 多选题Which statements describe guaranteed behavior of the garbage collection and finalization mechanisms?()AObjects are deleted when they can no longer be accessed through any reference.BThe finalize() method will eventually be called on every object.CThe finalize() method will never be called more than once on an object.DAn object will not be garbage collected as long as it is possible for an active part of the program to access it through a reference.EThe garbage collector will use a mark and sweep algorithm.

考题 名词解释题bugs