When the body of a function is implemented temporarily with just a printf call that displays a message reporting that the function was entered, the programmer is using __________.

a. bottom-up testing
b. data input validation
c. display functions
d. stepwise refinement
e. a stub


e. a stub

Computer Science & Information Technology

You might also like to view...

Computer ____________________ is defined as the use of technical investigation and analysis techniques to identify, collect, preserve, and analyze electronic items of potential evidentiary value so that they may be admitted as evidence in a court of law, used to support administrative action, or simply used to further analyze suspicious data.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Match the following terms with their description

I. NSFNET II. ARPANET III. CERN IV. NAPs V. CSNET A. Created by the National Science Foundation B. The primary Internet backbone in the late 1980s C. European Organization for Nuclear Research D. The first five large network access points E. Started in the 1960s

Computer Science & Information Technology

If you like to listen to a certain radio program, or get the most updated sports scores, or maybe just like to know about the day-to-day happenings with someone you share a common interest, you can subscribe to a podcast, webcast, or blog and the most current information will be available to you automatically. This is called ________ technology

Fill in the blank(s) with correct word

Computer Science & Information Technology

The exposure of an asset supported by a strong control to a threat of annual occurrence is 3. The impact of the threat on the asset is very high. Using the NIST framework, the risk equals

2 1 5 4

Computer Science & Information Technology