____ errors occur when a program attempts to perform an illegal action.

A. Syntax
B. Logical
C. Runtime
D. Overload


Answer: C

Computer Science & Information Technology

You might also like to view...

____________________ modeling is a structured method that is used to analyze risk-related data.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Before deployment, an application should be ____.

A. complete B. working properly C. debugged D. all of the above

Computer Science & Information Technology

Phone cords are a type of twisted-pair cable and use an RJ-45 connector.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In the PMT function, the PV argument refers to the ________ of the loan.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology