System developers use _____ to document and trail program defects, code changes, and replacement code.
A. bug tracking software
B. the obstruction generator
C. fault promotion analysis
D. the defect distribution policy
Answer: A
Computer Science & Information Technology
You might also like to view...
Write the code to declare a two dimension array of integers with 10 rows and 20 columns.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
By embedding the macro it becomes ________, and if you export the form into another database, any macros embedded will remain with the object
A) portable B) manageable C) functional D) efficient
Computer Science & Information Technology
In Project 2013, the default for a duration of one day is ________ hours
A) 6 B) 7 C) 8 D) 10
Computer Science & Information Technology
Hackers often set up ________ in areas such as airports where users are expecting to find a free, wireless access point.
A. Trojan horses B. nodes C. botnets D. rogue hotspots
Computer Science & Information Technology