Errors in a software program are referred to as:
a) Viruses
b) Bugs
c) Computer Fault
d) None of These

1 Answer

Answer :

b) Bugs

Related questions

Description : Errors in computer programs are called: a) Hubs b) Bugs c) Syntex Error d) None of these

Last Answer : b) Bugs

Description : Errors in computer programmes are called: (A) Follies (B) Mistakes (C) Bugs (D) Spam

Last Answer : (C) Bugs

Description : Which statement is valid about computer program? A) High level languages must be converted into machine language to execute B) High level language programs are more efficient and faster to execute C) It ... to identify errors in high level language program than in low level programs D) All of above

Last Answer : Answer : A

Description : A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program: a) Trojan Horses b) Worms c) Macro Viruses d) None of These

Last Answer : a) Trojan Horses

Description : _____is a computer program that is loaded into a computer without the owner's knowledge: a) Hack Material b) Viruses c) Both of Above d) None of These

Last Answer : b) Viruses

Description : Which among the following is correct about the Antivirus Programs: a) They contain a database of signatures for all known viruses and worms b) The software searches a computer for the presence of these signatures c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Software testing is (A) the process of establishing that errors are not present. (B) the process of establishing confidence that a program does what it is supposed to do. (C) the process of ... as per specifications. (D) the process of executing a program with the intent of finding errors. 

Last Answer : (D) the process of executing a program with the intent of finding errors.

Description : When does a Page fault occur? (1) There is an error in a specific page (2) A program accesses a page not currently in main memory (3) A program accesses a page of main memory (4) A program accesses a page belonging to another program

Last Answer : A program accesses a page not currently in main memory

Description : What is correcting errors in a program called? 1) Debugging 2) Compiling 3) Interpreting 4) None of these

Last Answer : 1) Debugging

Description : _______viruses infect executable program files: a) File Infector Viruses b) Macro Viruses c) Multi Partite Viruses d) None of These

Last Answer : a) File Infector Viruses

Description : Why are viruses referred to as being acellular?

Last Answer : organisms, as they have been considered either as very simple microorganisms or very complex molecules

Description : Locating and eliminating defects in a program is: a) Bugs b) Debugging c) Virus Control Protocol d) None of These

Last Answer : b) Debugging

Description : _____is the process of finding errors in software code. 1) Compiling 2) Testing 3) Running 4) Debugging 6 5) None of these

Last Answer : Answer :4

Description : ..... is the process finding errors in software code. 1) compiling 2) Assembling 3) Interpreting 4) Debugging

Last Answer : 4) Debugging

Description : Which of the following is not anti-viruses software? A) NAV B) F-Prot C) Oracle D) McAfee

Last Answer : Answer : C

Description : A collection of related instructions organized for a common purpose is referred to as A) File B) Database C) Program D) None of above

Last Answer : Answer : C

Description : A program written in a high level language is referred to as: a) Memory Code b) Object Code c) Source Code d) Assembly Code e) None of These

Last Answer : b) Object Code

Description : The software that is used to create text-based documents are referred to as ______ a) DBMS b) Suites c) Spreadsheets d) Word processors e) None of these

Last Answer : d) Word processors

Description : Which software do you use to keep your system intact from computer viruses? -Technology

Last Answer : Antivirus software is used to keep your system intact from computer viruses.

Description : Amit installed an antivirus software to remove all the viruses from his computer. -Technology

Last Answer : 1. Antivirus software is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them.2. Two actions performed by an antivirus ... ) Scanning and monitoring files and folders on your computer to ensure that they are not infected.

Description : What software detects and removes or quarantines computer viruses? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : b. Anti‐virus

Description : Errors in computer results could be due to 1) encoding of data 2) transmission of data 3) manipulation of data 4) all of the above

Last Answer : 4) all of the above

Description : Which among the following is correct regarding the Boot Sector Viruses: a) These viruses are resides in the boot sector of a floppy or hard disk. b) Such viruses are activated every time a computer ... uninfected floppy disk is inserted into the floppy drive d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : _____are attempt by individuals to obtain confidential information from you by falsifying their identity: a) Phishing Trips b) Computer Viruses c) Spyware Scams d) Viruses e) Phishing Scams

Last Answer : a) Phishing Trips

Description : .....are attempts by individuals to obtain confidential information from you by falsifying their identity. 1) Phishing trips 2) Computer viruses 3) Spyware scams 4) Phishing Scams

Last Answer : 4) Phishing Scams

Description : .....are attempts by individuals to obtain confidential information from you by falsifying their identity. 1 Phishing trips 2 Computer viruses 3 Spyware scams 4 Phishing Scams

Last Answer : 4 Phishing Scams

Description : Select the most appropriate definition of Ethical hacking. a. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the viruses ... for security vulnerabilities and plugging the hole before the viruses get chance to handle them.

Last Answer : c. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the unauthorized peoples get a chance to exploit them.

Description : More subtle because you are not aware that you are running these macros (A) The purpose of copyright (B) Danger of macro viruses (C) Derivative works (D) computer-specific crime

Last Answer : (B) Danger of macro viruses

Description : More subtle because you are not aware that you are running these macros (the document opens and the application automatically runs); spread via email A. The purpose of copyright B. Danger of macro viruses C. Derivative works D. computer-specific crime

Last Answer : B. Danger of macro viruses

Description : If a program in its functioning has not met user requirements is some way, then it is (A) an error. (B) a failure. (C) a fault. (D) a defect.

Last Answer : (D) a defect.

Description : Suppose that the number of instructions executed between page faults is directly proportional to the number of page frames allocated to a program. If the available memory is doubled, the mean interval between page faults is also ... memory were available? (A) 60 sec (B) 30 sec (C) 45 sec (D) 10 sec

Last Answer : Answer: C Explanation: T = Ninstr x 1µs + 15,000 x 2,000 µs = 60s Ninstr x 1µs = 60,000,000 µs - 30,000,000 µs = 30,000,000 µs Ninstr = 30,000,000 The number of instruction ... doesn't mean that the program runs twice as fast as on the first system. Here, the performance increase is of 25%.

Description : The language that the computer can understand and execute is called A) Machine language B) Application software C) System program D) All of above

Last Answer : Answer : A

Description : The term Software refers to the set of ________or data a computer processor reads in order to perform a task or operation: a) Electronic Program Instructions b) Planned program instructions

Last Answer : a) Electronic Program Instructions

Description : What is a URL? a) A computer software program b) A type of programming object c) The address of a document or page on the World Wide Web d) An acronym for Unlimited resources for Learning e) None of these

Last Answer : c) The address of a document or page on the World Wide Web

Description : _________ is the first program run on a computer when computer boots up 1) System Software 2) Operating Software 3) Systems Operations 4) None

Last Answer : 2) Operating Software

Description : _________ is the first program run on a computer when computer boots up 1 System Software 2 Operating Software 3 Systems Operations 4 None

Last Answer : 2 Operating Software

Description : Software are referred to as i) Hardware ii) Computer programs iii) Binary data iv) procedure

Last Answer : ii) Computer programs

Description : Why would our program suddenly get password certification errors and then later stop getting them?

Last Answer : I don’t have specific knowledge, but certifications generally implies checking a cert database and/or server to check certs, and a rejection could mean that the cert status actually changed, or that there was a communication problem or bug with the cert server/service for a while.

Description : What does it mean to find and fix program errors ?

Last Answer : Debugging is the process of finding and eliminating errors in a program .

Description : Before checking the program for errors in translating code into machine language the high level language code is loaded into __ a. Register b. Memory c. Data d. CPU

Last Answer : b. Memory

Description : After studying and evaluating a client's existing internal control, an auditor has concluded that the policies and procedures are well-designed and functioning as intended. Under these circumstances, the ... risk at a lower level than would be set under conditions of weak internal control.

Last Answer : Set detection risk at a higher level than would be set under conditions of weak internal control.

Description : What is the function of following UNIX command? WC - lb& (A) It runs the word count program to count the number of lines in its input, a, writing the result to b, as a foreground process. (B) It runs ... (D) It copies the l ' numbers of lines of program from file, a, and stores in file b.

Last Answer : (B) It runs the word count program to count the number of lines in its input, a, writing the result to b, but does it in the background.

Description : Which one of the following is not a definition of error ? (A) It refers to the discrepancy between a computed, observed or measured value and the true, specified or theoretically correct value. (B) It ... to fail. (D) It refers to human action that results in software containing a defect or fault. 

Last Answer : The input, or clock pulse.

Description : In software testing, how the error, fault and failure are related to each other? (A) Error leads to failure but fault is not related to error and failure (B) Fault leads to failure but error is ... Error leads to fault and fault leads to failure (D) Fault leads to error and error leads to failure

Last Answer : (C) Error leads to fault and fault leads to failure

Description : Maybe I have a virus on my PC. What program should I run my PC with? Of course I have an antivirus I have Avast but I would like to check the whole computer. Thanks

Last Answer : EsetOnLineScanner - http://www.eset.com/cz/domacnosti/produkty/online-scanner/

Description : The primary goal of comparing a user manual with the actual behavior of the running program during system testing is to A. Find bugs in the program B. Check the technical accuracy of the document

Last Answer : B. Check the technical accuracy of the document

Description : Sources of regression test cases are A. Boundary tests and other pre planned tests. B. Tests that reveal bugs in the program C. Customer reported bugs D. All of the above

Last Answer : D. All of the above

Description : I'm new to software development. When I downloaded the sample codes to look at for the iPhone SDK, They will not launch in the Aspen Simulator due to errors. Has anyone else had this problem? If so, how can I fix the errors?

Last Answer : answer:Your problem may be covered in this thread in Apple's Support Forums: The problem is in the Build Settings. I got this problem when I changed the build settings so it was not pointing to the ... it. The build settings are saved in the .xcodeproject file so you need to get rid of it.

Description : Why cant we find all errors before we give software to our customers?

Last Answer : Need answer

Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above

Last Answer : All of theabove