System developers use _____ to document and trail program defects, code changes, and replacement code.

A. bug tracking software
B. the obstruction generator
C. fault promotion analysis
D. the defect distribution policy


Answer: A

Computer Science & Information Technology

You might also like to view...

Write the code to declare a two dimension array of integers with 10 rows and 20 columns.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

By embedding the macro it becomes ________, and if you export the form into another database, any macros embedded will remain with the object

A) portable B) manageable C) functional D) efficient

Computer Science & Information Technology

In Project 2013, the default for a duration of one day is ________ hours

A) 6 B) 7 C) 8 D) 10

Computer Science & Information Technology

Hackers often set up ________ in areas such as airports where users are expecting to find a free, wireless access point.

A. Trojan horses B. nodes C. botnets D. rogue hotspots

Computer Science & Information Technology