网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
The identification and removal of bugs in a program is called”(75)”.
A.checking
B.debugging
C.revision
D.verification
参考答案
更多 “ The identification and removal of bugs in a program is called”(75)”.A.checkingB.debuggingC.revisionD.verification ” 相关考题
考题
● The program and the data are kept inside the computer in a place called (73) .A. bus B. cache C. CPU D. memory
考题
● (75) is a sequence of letters and digits,the first character mustbe a letter.(75) A.An identifierB.A stringC.An arrayD.program
考题
Program that can destroy another computer’s programs are called () .
A、bugsB、bugsC、virusesD、games
考题
● Software (75) focuses on three attributes of the program: software architecture, data structure, and procedural detail.(75)A. analysisB. designC. installationD. upgrade
考题
● Configuration management is the process of managing change in hardware, software, firmware, documentation, measurements, etc. As change requires an initial state and next state, the marking of significant states within a series of several changes becomes important. The identification of significant states within the revision history of a configuration item is the central purpose of (75) identification.(75)A. baselineB. valueC.costD. control
考题
●when a string constant is written in C program,the compiler creates (75) of characters containing the characters of the string,and terminating it with"\0".(75) A.a groupB.an arrayC.a setD.a series
考题
, also called end-user program, includes database programs, spreadsheets, word rocessors etc.A.System softwareB.Utility softwareC.Application softwareD.Compiler software
考题
● The program and the data are kept inside the computer in a place called(73) .(73)A. busB. cacheC. CPUD. memory
考题
The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the(71)of the operating system: it allocates time and memory to programs and handles the filestore and communications in response to(72). The shell acts as an(73)between the user and the kernel. When a user logs in, the(74)program checks the username and password, and then starts another program called the shell. The shell is a command line(75)(CLI). It interprets the commands the user types in and arranges for them to be carded out. The commands are themselves programs: when they terminate, the shell gives the user another prompt(% on our systems).A.hubB.centerC.coreD.nucleus
考题
To verify that your printer is operating correctly, you can run the printer(75)program。A.driverB.viewC.browseD.self-test
考题
Programmers test a program by running it to ensure that the(74)are correct and that the program produces the desired outcome. If errors do occur, the programmer must make the appropriate change and recheck the program until it produces the correct results. This(75)is called testing and debugging.A.commandsB.softwareC.instructionsD.measure
考题
● SWOT analysis is a kind of risk identification method. If the project team chose the SO strategy, they should __(75)__.(75)A.make full use of the advantage and catch the opportunityB.overcome the weakness and catch the opportunityC.make full use of the advantage and reduce the threatD.overcome the weakness and reduce the threat
考题
The (1) program means a program written in a high-level language. It is generally translated to an (2) program, which is in a form. directly understandably by the computer.The translation is usually done by a program called (3).A.assembleB.webC.CD.source
考题
Configuration management is the process of managing change in hardware,software,firmware,documentation,measurements,etc.As change requires an initial state and next state,the marking of significant states within a series of several changes becomes important.The identification of significant states within the revision history of a configuration item is the central purpose of(75) identification.A.baselineB.valueC.costD.control
考题
Inside the computer, the operation system(of another software module called a data communication(71))must decide which program will get control next. Each program remember, is associated(72). a particular front -end port. If a program's data have not yet reached its front - end buffer, there is no point giving that program control. Thus the data communication monitor sends its own(73)signal to the front -end devices next port is polled. Note that the(74)computer speed. The computer never has to wait for a terminal or a communication line. Instead, it is the expressive front - end processor that waits for the slower system(75)to respond.A.memoryB.controlC.monitorD.charge
考题
The identification and removal of bugs in a program is called”(73)A.checkingB.debuggingC.revisionD.verification
考题
A computer program, orjust a program, is a sequence of (75) ,written to performa specified task with a computer.A.languagesB.instructionsC.programsD.functions
考题
● Most (75) measures involve data encryption and password.(75)A. securityB. hardwareC. displayD. program
考题
● (75) means thata source program file can be compiled and executed on different computers.(75)A. PortabilityB.UsablityC.RecoveryD.Mobility
考题
The identification and removal ofbugs in a program is called "( )".A.checking
B.debugging
C.revision
D.verification
考题
The identification and removal of bugs in a program is called"______".A.checking
B.debugging
C.revision
D.verification
考题
bugs
热门标签
最新试卷