If more method calls occur than can have their activation records stored on the program execution stack, an error known as a ________ occurs.

a. stack overflow.
b. stack rewind.
c. stack full.
d. stack empty.


a. stack overflow.

Computer Science & Information Technology

You might also like to view...

To create a digital signature, a sender first takes the original plaintext message and runs it through a_______, which is a mathematical calculation that gives the message a_______.

a) key function, key value. b) signature function, signature value. c) hash function, hash value. d) None of the above.

Computer Science & Information Technology

Which of the following contains defensive tools that block Web-based exploits?

A. a cookie blocker B. a secure connection C. a temporary Internet file D. antivirus software

Computer Science & Information Technology

_____________ is a formal process that seeks to understand the problem and document in detail what the software system needs to do.

a. Requirements specification b. Analysis c. Design d. Implementation e. Testing

Computer Science & Information Technology

Which is the best what-if analysis tool to determine the optimal combination of products to produce in order to maximize profit?

A) Scenario Manager B) Two-variable data table C) Solver D) Goal Seek

Computer Science & Information Technology