网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

The identification and removal of bugs in a program is called”(75)”.

A.checking

B.debugging

C.revision

D.verification


参考答案

更多 “ The identification and removal of bugs in a program is called”(75)”.A.checkingB.debuggingC.revisionD.verification ” 相关考题
考题 ● The program and the data are kept inside the computer in a place called (73) .A. bus B. cache C. CPU D. memory

考题 ● (75) is a sequence of letters and digits,the first character mustbe a letter.(75) A.An identifierB.A stringC.An arrayD.program

考题 Program that can destroy another computer’s programs are called () . A、bugsB、bugsC、virusesD、games

考题 ● Software (75) focuses on three attributes of the program: software architecture, data structure, and procedural detail.(75)A. analysisB. designC. installationD. upgrade

考题 ● Configuration management is the process of managing change in hardware, software, firmware, documentation, measurements, etc. As change requires an initial state and next state, the marking of significant states within a series of several changes becomes important. The identification of significant states within the revision history of a configuration item is the central purpose of (75) identification.(75)A. baselineB. valueC.costD. control

考题 ●when a string constant is written in C program,the compiler creates (75) of characters containing the characters of the string,and terminating it with"\0".(75) A.a groupB.an arrayC.a setD.a series

考题 ● A group of related fields is called a (75) .(75)A. dataB. fileC. recordD. database

考题 A(75) infected computer may lose its data.A.fileB.databaseC.VirusD.program

考题 , also called end-user program, includes database programs, spreadsheets, word rocessors etc.A.System softwareB.Utility softwareC.Application softwareD.Compiler software

考题 ● The program and the data are kept inside the computer in a place called(73) .(73)A. busB. cacheC. CPUD. memory

考题 The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the(71)of the operating system: it allocates time and memory to programs and handles the filestore and communications in response to(72). The shell acts as an(73)between the user and the kernel. When a user logs in, the(74)program checks the username and password, and then starts another program called the shell. The shell is a command line(75)(CLI). It interprets the commands the user types in and arranges for them to be carded out. The commands are themselves programs: when they terminate, the shell gives the user another prompt(% on our systems).A.hubB.centerC.coreD.nucleus

考题 To verify that your printer is operating correctly, you can run the printer(75)program。A.driverB.viewC.browseD.self-test

考题 Programmers test a program by running it to ensure that the(74)are correct and that the program produces the desired outcome. If errors do occur, the programmer must make the appropriate change and recheck the program until it produces the correct results. This(75)is called testing and debugging.A.commandsB.softwareC.instructionsD.measure

考题 ● SWOT analysis is a kind of risk identification method. If the project team chose the SO strategy, they should __(75)__.(75)A.make full use of the advantage and catch the opportunityB.overcome the weakness and catch the opportunityC.make full use of the advantage and reduce the threatD.overcome the weakness and reduce the threat

考题 A group of related fields is called a(75).A.dataB.fileC.recordD.database

考题 The (1) program means a program written in a high-level language. It is generally translated to an (2) program, which is in a form. directly understandably by the computer.The translation is usually done by a program called (3).A.assembleB.webC.CD.source

考题 Configuration management is the process of managing change in hardware,software,firmware,documentation,measurements,etc.As change requires an initial state and next state,the marking of significant states within a series of several changes becomes important.The identification of significant states within the revision history of a configuration item is the central purpose of(75) identification.A.baselineB.valueC.costD.control

考题 Inside the computer, the operation system(of another software module called a data communication(71))must decide which program will get control next. Each program remember, is associated(72). a particular front -end port. If a program's data have not yet reached its front - end buffer, there is no point giving that program control. Thus the data communication monitor sends its own(73)signal to the front -end devices next port is polled. Note that the(74)computer speed. The computer never has to wait for a terminal or a communication line. Instead, it is the expressive front - end processor that waits for the slower system(75)to respond.A.memoryB.controlC.monitorD.charge

考题 In general, you install software by the(75)program in CD-ROM.A.read meB.optionC.loadD.setup

考题 The identification and removal of bugs in a program is called”(73)A.checkingB.debuggingC.revisionD.verification

考题 A computer program, orjust a program, is a sequence of (75) ,written to performa specified task with a computer.A.languagesB.instructionsC.programsD.functions

考题 ● Most (75) measures involve data encryption and password.(75)A. securityB. hardwareC. displayD. program

考题 (75)A.Program analysisB.Function requirementC.Application analysisD.Physical model

考题 ● (75) means thata source program file can be compiled and executed on different computers.(75)A. PortabilityB.UsablityC.RecoveryD.Mobility

考题 The identification and removal ofbugs in a program is called "( )".A.checking B.debugging C.revision D.verification

考题 The identification and removal of bugs in a program is called"______".A.checking B.debugging C.revision D.verification

考题 bugs