Using the ___________ method, you execute your program (either in your head or on paper) one instruction at a time, much like the computer does, to verify that your program is correct

a. problem abstraction
b. desk check
c. problem specification
d. program engineering
e. implementation


b. desk check

Computer Science & Information Technology

You might also like to view...

In the function call

doesSomething (7, x, p); what are 7, x and p called?

Computer Science & Information Technology

When you call a ____________ method, it executes its code and returns without passing any value back to the program statement that called it.

a. void b. terminal c. value-returning d. private

Computer Science & Information Technology

?_________ is organized as three protocols that typically run on top of TCP for secure network communications and are designed to be relatively simple and inexpensive to implement.

A) ?SSL ? B) ?SSH ? C) ?TLS ? D) ?SSI

Computer Science & Information Technology

WPA-Enterprise security provides the highest level of wireless network authentication security

Indicate whether the statement is true or false

Computer Science & Information Technology