Question

The ARM implementation of the JTAG standard for this task replaces the TDI and TDO pins with the single bidirectional pin SWDIO. The Morris worm exploited a command injection in a Unix sendmail mode intended for this purpose. This task can be performed using the netlist insertion method, in which an integrated logic analyzer traces the post-synthesis netlist. The x command in one tool for this task (-5[1])executes PEEKTEXT and POKETEXT using the Unix system call (*) ptrace. IBM Purity is often used to perform this task for memory occurrences, while gdb and lldb (10[2])are more general tools for performing this task. This task can be primitively performed on hardware by inserting breakpoints between instructions or by single-stepping. (10[1])For 10 points, name this process of removing errors from code. ■END■ (10[2])

ANSWER: debugging [accept fixing code or finding code errors until “removing errors” is read; accept control flow analysis; prompt on probing; reject “validation” or “verification”]
<KJ, Other Science>
= Average correct buzz position

Back to tossups

Buzzes

PlayerTeamOpponentBuzz PositionValue
Jacob RosenbergInnovation Academy CJohns Creek66-5
Jeffrey XuGeorgia Tech AMilton9210
Sanjay Shanmuga PerumalLambertGeorgia Tech B9210
Pranav JothiGeorgia Tech CMississippi State11610
Joanna XiaoGeorgia Tech DInnovation Academy B12810
Moses DongJohns CreekInnovation Academy C12810