When a procedure produces incorrect results, a ____ error has occurred.
A. logic
B. syntax
C. run-time
D. design
Answer: A
Computer Science & Information Technology
You might also like to view...
A surge protector cannot protect your equipment from _____.
A. an incompatible power adapter B. a power irregularity C. a power outage D. dust and dirt
Computer Science & Information Technology
The main threat involving wireless access points is unauthorized access to the network. The principal approach for preventing success is the __________ standard for port-based network access control.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which of the following is a protocol used by bridges to allow multiple physical paths to exist between them?
a. spanning tree b. source routing c. source routing transparent d. all of the above
Computer Science & Information Technology
What is a change control policy?
What will be an ideal response?
Computer Science & Information Technology