The companion disk for this text includes a class BuggyCollection. Run the test cases against BuggyCollection to find the bugs in it. Fix the bugs. Remember, you aren’t done until all the tests pass.

What will be an ideal response?


The Instructor’s code includes a version of BuggyCollection in which the offending lines are identified with a comment “// buggy”. Also, see the readme.txt file in that folder.

Computer Science & Information Technology

You might also like to view...

A snapshot of any open window on your desktop is a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is the most time-consuming method of circumventing CMOS passwords?

a. key disks b. default passwords c. social engineering d. jumping

Computer Science & Information Technology

Which of the following is the MOST important factor when considering environmental factors?

A. Server room access should be limited to authorized personnel. B. Servers should be kept in a warm and dark environment. C. Remove the floppy drives from the system. D. The server administrator should ensure adequate levels of cooling.

Computer Science & Information Technology

The declarations and statements that compose the method definition are called the ________.

a) method body b) method header c) parameter list d) method name e) None of the above.

Computer Science & Information Technology