网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

The identification and removal of bugs in a program is called”(73)

A.checking

B.debugging

C.revision

D.verification


参考答案

更多 “ The identification and removal of bugs in a program is called”(73)A.checkingB.debuggingC.revisionD.verification ” 相关考题
考题 ● The program and the data are kept inside the computer in a place called (73) .A. bus B. cache C. CPU D. memory

考题 73 The term that best describes the 'right' to manipulate or change others is called?A. AuthorityB. PowerC. LeadershipD. CoercivenessE. Project charter

考题 Program that can destroy another computer’s programs are called () . A、bugsB、bugsC、virusesD、games

考题 ●There are several applications called Web (73) that make it easyto access the World Wide WeB.two of the most popular being Netscape Navigator and Microsoft's Internet Explorer.(73) A.viewsB.homepagesC.browsersD.sites

考题 Integration(73)is the process of verifying that the components of a system work together as described in the program design and system design specifications.(73)A.tryingB.checkingC.testing.D.coding

考题 Each program module is compiled separately and the resulting(73) files are linked ether to make an executable application.A.objectB.sourceC.assemblerD.library

考题 To document your code can increase program(72) and make program easier to(73).A.reliabilityB.securityC.readabilityD.usability

考题 Integration(73)is the process of verifying that the components of asystem work together as described in the program design and system design specifications.A.tryingB.checkingC.testingD.coding

考题 , also called end-user program, includes database programs, spreadsheets, word rocessors etc.A.System softwareB.Utility softwareC.Application softwareD.Compiler software

考题 ● Integration(73)is the process of verifying that the components of a system work together as described in the program design and system design specifications.(73)A. trying B. checking C. testing D. coding

考题 software, also called end-user program, includes database programs, word processors, spreadsheets etc.A.ApplicationB.SystemC.CompilerD.Utility

考题 ● The program and the data are kept inside the computer in a place called(73) .(73)A. busB. cacheC. CPUD. memory

考题 ● To document your code can increase program (72) and make program easier to (73).(72)A. reliabilityB. securityC. readabilityD. usability(73)A. executeB. interpretC. compileD. maintain

考题 The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the(71)of the operating system: it allocates time and memory to programs and handles the filestore and communications in response to(72). The shell acts as an(73)between the user and the kernel. When a user logs in, the(74)program checks the username and password, and then starts another program called the shell. The shell is a command line(75)(CLI). It interprets the commands the user types in and arranges for them to be carded out. The commands are themselves programs: when they terminate, the shell gives the user another prompt(% on our systems).A.hubB.centerC.coreD.nucleus

考题 Programmers test a program by running it to ensure that the(74)are correct and that the program produces the desired outcome. If errors do occur, the programmer must make the appropriate change and recheck the program until it produces the correct results. This(75)is called testing and debugging.A.commandsB.softwareC.instructionsD.measure

考题 ● __(73)__ are the four major activities of software configuration management.①configuration identification ②statement report ③change control④preparation of requirement document ⑤configuration auditing(73)A.①②③④ B.①②④⑤ C.①②③⑤ D.②③④⑤

考题 The (1) program means a program written in a high-level language. It is generally translated to an (2) program, which is in a form. directly understandably by the computer.The translation is usually done by a program called (3).A.assembleB.webC.CD.source

考题 The most important program on any computer is (73) .A.Office 2000B.VirusC.softwareD.Operating System

考题 Integration(73)is the process of verifying that the components of a system work togedler as described in the program design and system design speci6cations.A.tryingB.checklngC.testingD.coding

考题 Inside the computer, the operation system(of another software module called a data communication(71))must decide which program will get control next. Each program remember, is associated(72). a particular front -end port. If a program's data have not yet reached its front - end buffer, there is no point giving that program control. Thus the data communication monitor sends its own(73)signal to the front -end devices next port is polled. Note that the(74)computer speed. The computer never has to wait for a terminal or a communication line. Instead, it is the expressive front - end processor that waits for the slower system(75)to respond.A.memoryB.controlC.monitorD.charge

考题 With respect to program variables,(73)means assigning a beginning value to a variablA.B.SetupC.startupD.initializationE.pre-compile

考题 The identification and removal of bugs in a program is called”(75)”.A.checkingB.debuggingC.revisionD.verification

考题 ● The most important program on any computer is (73) .(73)A. Office 2000B. VirusC. softwareD. Operating System

考题 ● (73)testing is the responsibility ofthe programmer, who knows exactly what is going on inside the program.(73)A. AcceptanceB.SystemC.Black boxD.White box

考题 The identification and removal ofbugs in a program is called "( )".A.checking B.debugging C.revision D.verification

考题 Program(73)describes program's objectives, desired output, input data required, processing requirement, and documentation.A.specification B.flowchart C.structure D.address

考题 The identification and removal of bugs in a program is called"______".A.checking B.debugging C.revision D.verification