_______ is the process of searching code to locate a source of trouble.

A. Error-handling
B. Debugging
C. Tracing
D. Setting a watch

Answer: B

Computer Science & Information Technology

You might also like to view...

What does the following command accomplish? nc –v –z –w 1 10.10.23.4 1-1024

a. Starts a listener on the hacker's machine b. Port scans the following IP address 10.10.23.4 c. Blocks traffic to the following IP address 10.10.23.4 d. Allows all traffic to the following IP address 10.10.23.4

Computer Science & Information Technology

Another word for "clipped" is ____.

A. cut B. expanded C. masked D. compounded

Computer Science & Information Technology