Question

The ARM implementation of the JTAG standard for this task replaces the TDI and TDO pins with the single bidirectional pin SWDIO. The Morris worm exploited a command injection in a Unix sendmail mode intended for this purpose. This task can be performed using the netlist insertion method, in which an integrated logic analyzer traces the post-synthesis netlist. The x command in one tool for this task executes PEEKTEXT and POKETEXT using the Unix system call (*) ptrace. IBM Purity is often used to perform this task for memory occurrences, while gdb and lldb are more general tools (10[1])for performing this task. This task can be primitively performed on hardware by inserting breakpoints between instructions or by single-stepping. (10[2])For 10 points, name this process of removing errors from code. ■END■ (10[1])

ANSWER: debugging [accept fixing code or finding code errors until “removing errors” is read; accept control flow analysis; prompt on probing; reject “validation” or “verification”]
<KJ, Other Science>
= Average correct buzz position

Back to tossups

Buzzes

PlayerTeamOpponentBuzz PositionValue
Ryan GomesFlorida TechUF A9610
Bill ZhaoUF BUCF B11610
Rivera RiveraValenciaUCF A11610
Eve MarambaUF CUSF12810