_______ is the process of searching code to locate a source of trouble.
A. Error-handling
B. Debugging
C. Tracing
D. Setting a watch
Answer: B
Computer Science & Information Technology
You might also like to view...
What does the following command accomplish? nc –v –z –w 1 10.10.23.4 1-1024
a. Starts a listener on the hacker's machine b. Port scans the following IP address 10.10.23.4 c. Blocks traffic to the following IP address 10.10.23.4 d. Allows all traffic to the following IP address 10.10.23.4
Computer Science & Information Technology
Another word for "clipped" is ____.
A. cut B. expanded C. masked D. compounded
Computer Science & Information Technology