When a procedure produces incorrect results, a ____ error has occurred.

A. logic
B. syntax
C. run-time
D. design


Answer: A

Computer Science & Information Technology

You might also like to view...

A surge protector cannot protect your equipment from _____.

A. an incompatible power adapter B. a power irregularity C. a power outage D. dust and dirt

Computer Science & Information Technology

The main threat involving wireless access points is unauthorized access to the network. The principal approach for preventing success is the __________ standard for port-based network access control.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is a protocol used by bridges to allow multiple physical paths to exist between them?

a. spanning tree b. source routing c. source routing transparent d. all of the above

Computer Science & Information Technology

What is a change control policy?

What will be an ideal response?

Computer Science & Information Technology