If you put assert macros throughout your code, then

a. You have to put up with the resulting inefficiency and program halts with messages indecipherable to the user until you edit your code to remove them.
b. You can put #define NDEBUG in your code in the file just before the #include directive.
c. With most command line compilers and IDEs (integrated development environment), you can define NDEBUG for the compile session by using an IDE menu option or you can use the compiler command line option –DNDEBUG.


b) and c) are correct.
Explanation: a) is wrong. (And horribly pessimistic.) Easy options exist as pointed out in b) and c) to prevent the macros from being compiled into your code.

Computer Science & Information Technology

You might also like to view...

When creating a class, rather than declaring completely new members, you can designate that the new class inherits the members of an existing class. The existing class is called the __________ class, and the new class is the __________ class.

a) derived, base b) root, child c) sub, super d) base, derived

Computer Science & Information Technology

In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable

A) Cluster B) Bus C) Star D) Hierarchical

Computer Science & Information Technology

Which of the following is not true about monetizing a blog?

A) Google serves as an advertising middle man. B) If a small business wants to advertise on a set of networks, Google will sell advertising space through Google's AdWords tool. C) Advertising is a lucrative business on the Internet, so if a user has a lot of traffic, they can make some money displaying ads for Google. D) People who want to advertise on the Internet pay Google to do so, and websites pay Google to display those ads.

Computer Science & Information Technology

The goal of the ____ attacker is to inject a SQL query/command as an input, possibly via Web pages.

A. phishing B. XSS C. SQL injection D. denial of service

Computer Science & Information Technology