Performing each step of an algorithm by hand the same as a computer would to verify the algorithm is correct is called a(n) __________.

a. step-wise refinement
b. desk check
c. top-down design
d. program maintenance
e. software development


b. desk check

Computer Science & Information Technology

You might also like to view...

The TreeSet class is built upon a backing instance of the TreeMap class. Discuss the advantages and disadvantages of this strategy for reuse.

What will be an ideal response?

Computer Science & Information Technology

When you work on multiple open pages using a Windows computer, use the filename tabs at the top of the ____ toolbar to move quickly between pages.

A. Standard B. Project C. Document D. Window

Computer Science & Information Technology

Which of the following methods are available to begin developing slide content?

A. Select a document theme and then enter text, illustrations, and tables B. Import a Microsoft Word outline C. Start with a blank presentation and the default Office Theme D. Open an existing presentation and modify it

Computer Science & Information Technology

The _________ provides the most accurate evaluation of an organization’s IT system’s security risks.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology