An error in a computer program
a) Crash b) Power Failure c) Bug
d) Virus e) None of these

1 Answer

Answer :

c) Bug

Related questions

Description : An error in a computer program is known as _______: a) Crash b) Power Failure c) Bug d) Virus e) Fatal Error

Last Answer : c) Bug

Description : An error in a computer program is: a) Crash b) Bug c) Power Failure d) None of These

Last Answer : b) Bug

Description : An error in a computer program is: a) Crash b) Bug c) Power Failure d) None of These

Last Answer : b) Bug

Description : An error in computer program is called: a) Hacking b) Virus c) Bug d) None of These

Last Answer : c) Bug

Description : In IT terminology failure in the kernel is called as (1) Crash (2) C r a s h dump (3) Dump (4) Kernel error

Last Answer :  Crash

Description : Bug describes: a) An error in computer program b) Some problems in wires in computer system c) Only internet connectivity problem d) None of These

Last Answer : a) An error in computer program

Description : The problem that threatens the success of a project but which has not yet happened is a (A) bug (B) error (C) risk (D) failure

Last Answer : (C) risk

Description : Define Bug, Error, Fault, and Failure.

Last Answer :  Bug: A bug can be defined as the initiation of error or a problem due to which fault, failure, incident or an anomaly occurs. Error: A human action that produces an incorrect result. ... prescribed in the system specification. A software fault becomes a software failure only when it is activated.

Description : An error in computer data is called A) Chip B) Bug C) CPU D) Storage device

Last Answer : Answer : B

Description : An error in software or hardware is called a bug. What is the alternative computer jargon for it? A) Leech B) Squid C) Slug D) Glitch

Last Answer : Answer : D

Description : A ‘bug’ in a programme is a (1) Statement (2) Error (3) Signature (4) both (2) and (3)

Last Answer : Error

Description : Isn't there some way to send a virus to the spammers so their computer will crash?

Last Answer : answer:You know, two wrongs don’t make a right. But, I wouldn’t complain if someone started fighting the spammers with spam. ;)

Description : If a program in its functioning has not met user requirements is some way, then it is (A) an error. (B) a failure. (C) a fault. (D) a defect.

Last Answer : (D) a defect.

Description : An error in computer data is called a. Chip b. Bug c. CPU d. Storage device

Last Answer : Bug

Description : An error in software or hardware is called a bug. What is the alternative computer jargon for it? a. Leech b. Squid c. Slug d. Glitch

Last Answer : Glitch

Description : An error in computer data is called a. Chip b. Bug c. CPU d. Storage device

Last Answer : b. Bug

Description : An error in software or hardware is called a bug. What is the alternative computer jargon for it? a. Leech b. Squid c. Slug d. Glitch

Last Answer : d. Glitch

Description : An error in computer data is called a. Chip b. Bug c. CPU d. Storage device

Last Answer : b. Bug

Description : An error in software or hardware is called a bug. What is the alternative computer jargon for it? a. Leech b. Squid c. Slug d. Glitch

Last Answer : d. Glitch

Description : A/an ______ is a system susceptibility or flaw: a) Error b) Vulnerability c) Virus d) None of These

Last Answer : b) Vulnerability

Description : A program designed to destroy data on your computer which can travel to "infect" other computers is called as: a) Operational Risks b) Torpedo c) Infector d) Virus

Last Answer : d) Virus

Description : Bill Gates is on the top of Forbes list of billionaires for 2014. How many people would like to see him use some of that money to make a Windows program that doesn't crash?

Last Answer : Gates has been absent from MS for almost 8 years now.

Description : Machine language is A) Machine dependent B) Difficult to program C) Error prone D) All of above

Last Answer : Answer : D

Description : When does a Page fault occur? (1) There is an error in a specific page (2) A program accesses a page not currently in main memory (3) A program accesses a page of main memory (4) A program accesses a page belonging to another program

Last Answer : A program accesses a page not currently in main memory

Description : Locating and eliminating defects in a program is: a) Bugs b) Debugging c) Virus Control Protocol d) None of These

Last Answer : b) Debugging

Description : Software that prevents unauthorized persons from accessing certain parts of a program, database or network is: a) Firewall b) Scanner c) Anti - Virus d) None of These

Last Answer : a) Firewall

Description : One or more defects or problems that prevent the software from working as intended or working at all is a: a) Bug b) Bot c) Programming Language d) Fuzzy Logic e) None of These

Last Answer : a) Bug

Description : I have a Problem with my Gmail Account,I get this error message:The server returned the error: Account exceeded bandwidth limits. (Failure)What should i do?

Last Answer : First thing I would do is check the status of the free-space in your inbox. There should be a bar at the bottom of your screen saying how many gigs of space you have used / have left. If that is full, ... that you don't need anymore. If space isn't the problem, then I don't know what is. Good luck!

Description : I received a failure to yield ticket on Dec 12,2008. It says my court date is March 10,2008. Is this error a valid reason to have the ticket dismissed?

Last Answer : Call the number listed on the ticket and ask clerk for verification of court date. A warrant could be issued for your arrest if you fail to appear on court date.

Description : Of the following statements, which best distinguishes ordinary negligence from gross negligence? a. The more material the undetected error the greater the likelihood of ordinary negligence. ... care denotes ordinary negligence, whereas failure to exercise minimal care indicates gross negligence

Last Answer : Failure to exercise reasonable care denotes ordinary negligence, whereas failure to exercise minimal care indicates gross negligence

Description : What kind of quality cost is incurred when an error is detected in a product prior to shipment? a) Prevention b) Internal Failure c) External Failure d) Appraisal

Last Answer : Ans: b

Description : In software testing, how the error, fault and failure are related to each other? (A) Error leads to failure but fault is not related to error and failure (B) Fault leads to failure but error is ... Error leads to fault and fault leads to failure (D) Fault leads to error and error leads to failure

Last Answer : (C) Error leads to fault and fault leads to failure

Description : In a star network each node (file server, workstations and peripherals) is connected to a central device called a _____: a) Bug b) Center c) Hub d) None of These

Last Answer : c) Hub

Description : My friend gets this error code while trying to install anti virus whats up ?

Last Answer : Google is your friend From the bottom post: I know already what caused this. I disabled windows firewall service, so just enable it -> install -> disable it again That’s in response to one of the error codes – the first one, pertaining to the firewall. Try that and report back.

Description : 9 Melissa was a _____macro virus: a) Microsoft Word b) Microsoft Excel c) Internet d) Microsoft Power Point e) None of These

Last Answer : a) Microsoft Word

Description : 9 Melissa was a _____macro virus: a) Microsoft Word b) Microsoft Excel c) Internet d) Microsoft Power Point e) None of These

Last Answer : a) Microsoft Word

Description : A …….. is a virus that is often disguised as a useful computer program. -Technology

Last Answer : (a) Trojan horse is a virus, i.e. often disguised as a useful computer program.

Description : A virus is a harmful program, which one entering a computer, starts creating copies of itself. -Technology

Last Answer : True Virus is a malicious program that is designed to make a system sick, just like a real virus.

Description : A _______ is a computer program that can replicate itself and spread from one computer to another. a) Antivirus b) Pen Drive c) Mouse d) Computer Virus

Last Answer : d) Computer Virus

Description : A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks. A) Worm B) Zombie C) Virus D) Trap doors

Last Answer : B) Zombie

Description : What could be causing my friends computer to crash?

Last Answer : answer:I would suspect these things: power supply RAM has become unseated in the sockets / mild corrosion on RAM sockets. hard drive connection / hard drive failure I'd try pulling the RAM chips ... Hard drive connections can get intermittent, reseat the cables into the hard drive(s) at both ends.

Description : Why does my computer crash?

Last Answer : answer:Is this a laptop or a desktop computer? It seems that there are two possible culprits. 1 Heat! Your computer has probably built up a ton of dust inside and needs to be cleaned out. When ... Examine your event viewer to learn more about what your computer was doing at the time of the crash.

Description : Is my computer getting ready to crash?

Last Answer : Does it sounds like fan noise or a more mechanical hard drive sound?

Description : Why does my computer crash so much?

Last Answer : Which operating system? Is the laptop crashing or just IE? What is 4od?

Description : What would it mean to you if you lost all your files, music or photos because of a computer crash?

Last Answer : I don’t back up. I never thought about it. I would be pretty upset if i lost all my europe photos and university essays. Shoot now im going to have to look into it!

Description : Most important advantage of an IC is its A) Easy replacement in case of circuit failure B) Extremely high reliability C) Reduced cost D) Lower power consumption

Last Answer : Answer : B

Description : Which among the following is correct regarding the Boot Sector Viruses: a) These viruses are resides in the boot sector of a floppy or hard disk. b) Such viruses are activated every time a computer ... uninfected floppy disk is inserted into the floppy drive d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Virus can spread from one computer to another via use of: a) Infected Floppy Disk b) Computer Networks c) Internet d) All of Above e) None of These

Last Answer : d) All of Above

Description : Identify the true statement A) Computers are 100% accurate but it can suffer from GIGO B) Computers are reliable because they use electronic component which have very low failure rate C) Computer is never tired and does not suffer from boredom D) All of above

Last Answer : Answer : D

Description : A computer has very low failure rate because it uses electronic components. It produces very consistent results. This is highlighted by which of the feature of computer? A) Accuracy B) Reliability C) Versatility D) Automatic

Last Answer : Answer : B