- •It must run without some of the protection mechanisms that guard against faulty instructions or illegal memory accesses.
- •Interrupt handlers have read-write access to the data an application stores in the registers
- •Vector graphics
- •It is an example of a code review
- •Integrated Development Environment
- •Identify the type of email attachment so a suitable program can be used to open the attachmen
- •Is assigned to a computer and may change the next time the computer connects to the network
- •Intrusion detection system
It is an example of a code review
|
144. |
|
Which step in the programming process involves enumerating known solutions |
|
Plan a solution to the problem
|
145. |
|
In which step in the programming process are flaws in design decisions revealed? |
|
Evaluate and test everything
|
146. |
|
Which of the following is not true about free software? |
|
Modification of free software requires a licensing fee
|
147. |
|
Which of the following best describes the acronym “IDE” within the context of software creation and management tools? |
|
Integrated Development Environment
|
148. |
|
Which of the following best describes system acceptance tests? |
|
Software is operated for a period of time in a simulated or real setting
|
149. |
|
Which of the following are programs commonly found in an integrated software development environment? I. Compilers III. Debuggers |
|
|
150. |
|
Which of the following does not represent an activity performed to locate software bugs? |
|
Convert program source code to machine code
|
151. |
|
Which of the following terms best describes software that produces object code from source code? |
|
Compilers
|
152. |
|
Microsoft Visual Studio, IBM Visual Age, Eclipse, and NetBeans are examples of |
|
IDEs
|
153. |
|
When creating a program, syntax errors are detected by which of the following? |
|
Compilers
|
154. |
|
Which of the following statements is true? |
|
Open source software changes are tested by contributors and integrated into the most current source code.
|
155. |
|
Which of the following is not a benefit of open-source software? |
|
Built-in security holes can be used to collect private information.
156. |
|
Which of the following statements is false? |
|
The Java Virtual Machine in the browser executes Javascript
|
157. |
|
Which of the following is a text file containing a set of predefined tags that are used to specify how data should be displayed in a browser or another application program? |
|
HTML
|
158. |
|
MIME types: |
|