After defects are found in a software product and reported, what should the next step be?    

A. Submission of defects to a defect management system
B. Develop fix for defect
C. Note defect in the production logs and provide management with an overview of the defect
D. Publish information regarding the defect


Answer: A

Computer Science & Information Technology

You might also like to view...

The textbook specifies that ________ cannot be used in a macro name

Fill in the blank(s) with correct word

Computer Science & Information Technology

In the Search Companion, the ________ is a wildcard that represents zero or more characters

A) comma (,) B) asterisk (*) C) pound sign (#) D) question mark (?)

Computer Science & Information Technology

The U.S. Congress has made several attempts to pass and maintain legislation that limits children's exposure to online pornography, but eventually each of these laws has been ruled out because they were unconstitutional.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

One of the simplest hashing algorithms involves dividing the primary key field by a particular ____.

A. power of two B. prime number C. irrational number D. transcendental number

Computer Science & Information Technology