One of the functions of an IDE is to check for: flowchart errors. Syntax errors. memory errors X input and output.​

Answers

Answer 1

Answer:

flowchart errors

Explanation:

Answer 2

Answer:

flowchart errors

Explanation:


Related Questions

Which popular file format loses some of the information from the image? JPEG TIFF RAW NEF

Answers

Answer:

The popular file format that loses some of the information from the image is JPEG

Explanation:

⚠️ HURRY TIME IS TICKING ⚠️
Sierra needs to ensure that when users are entering data into a datasheet or form that they are limited in the values that they select. Which option should she use as the data type?
• Lookup list
• Bound value
• Short-text
• Date/time

Answers

Answer:

To ensue that data entering data is limited, Usually A dropdown list is used but here in the available option

Lookup list is correct.

Explanation:

Let explain why we have selected Lookup list

A lookup list is used to look for some value in a list.

For example in Excel we select a column for search which is basically limiting the value which we search.

Bound Value

we usually have 2 bounds ,

lower and upper bound

lower bound is the smallest value in a set while upper bound it the highest value in a set.

Short Text:

Short text is used to minimize the word.

For example instead of United States we simply write US

Date/Time are used for data/time value.

so the most appropriate answer is Lookup list.

identify the information that's safe to send via e-mail

Answers

Answer:

nonehdbdjsjnajsjfjsap

Explanation:

baba booey

What are specific and relevant terms that will help you locate information using an internet search engine?

A: Keywords

B: Search Words

C: Smart Words

D: Unusual Words

please help me!!​

Answers

I would say A:keywords

Hope this helps

I’m sorry if this is wrong

Have a great day/night

Answer:

keyword

Explanation:

i got it right

What predefined match policy allows viewers to watch a claimed video but does not allow ads to display on the video

Answers

Answer:

The correct response is "Track".

Explanation:

Tracks encourage the individual that listens to that same music video to miss or ignore that same starting of almost any soundtrack at a certain moment. It might also impact an individual who accompanies a facility that implements or obeys guests.

For obvious reasons, a digital ad service can track client's internet search engine behavior patterns to continue providing accurate recommendations.

Please Help, Thank you!

-State whether- True or False :

a) Bluetooth uses Radio waves...
b) White hackers steal confidential information...
c) Hub transfers send the incoming data to the desired
destination only...
d) Infra-red signals are suitable for long distance data
communication...
e) HTTP is used in between a web server and a web browser...
f) LAN (Local Area Network) is the network exists around a person...
g) Coaxial cable consists of a copper conductor (wire)...
h) Microwave antennas are located at a substantial height above
the ground level...
i) Firewall can be implemented as a software, hardware or a
combination of both...

Please, please help me!♡´・ᴗ・`♡

j) Star topology is complicated to set up...

Answers

Answer: Devices connected in a Bluetooth network communicate with each other using ultra-high frequency (UHF) radio waves. These are electromagnetic waves with frequencies around 2.4 gigahertz (2.4 billion waves per second). UHF waves of different frequencies are used in microwave ovens, GPS systems and many other devices, White hat hackers employ the same methods of hacking as black hats, with one exception- they do it with permission from the owner of the system first, which makes the process completely legal. ... There are even courses, training, conferences and certifications for ethical hacking. A hub connects multiple computers together in a Local Area Network (LAN). All information sent to the hub is then sent through each port to every device in the network.

Hubs are unable to tell one computer from another, so they receive information on one port and then blindly forward it to all other ports — whether it was intended for those computers or not.

So even though you may only want to send information to one other computer, if you have five total computers on your network, then there will be four other computers receiving data that wasn’t intended for them. Showing results for are Infrared signals are suitable for long distance data communication..

Search instead for are Infra-red signals are suitable for long distance data communication..

Infrared laser systems can also be used for long-range communication (up to about 2.4 kilometres), with a maximum projected data rate of 16 Mbps. ... An infrared transmitting device, either a light-emitting diode (LED) or a laser diode, converts an electrical signal to an optical signal.

Web Browser is a software which is used to browse and display pages available over internet whereas web server is a software which provides these documents when requested by web browsers. ... Web browser sends an HTTP Request and gets a HTTP Response. Web server receives HTTP Request and sends a HTTP Response.

Simple LANs generally consist of cabling and one or more switches. A switch can be connected to a router, cable modem, or ADSL modem for Internet access. A LAN can include a wide variety of other network devices such as firewalls, load balancers, and network intrusion detection.

Coaxial cable, or coax (pronounced /ˈkoʊ. æks/) is a type of electrical cable consisting of an inner conductor surrounded by a concentric conducting shield, with the two separated by a dielectric (insulating material); many coaxial cables also have a protective outer sheath or jacket.

Terrestrial microwave- The most common type of microwave antenna is the parabolic “dish.”A typical size is about 3 m in diameter. The antenna is fixed rigidly and focuses a narrowbeam to achieve line-of-sight transmission to the receiving antenna. Microwave antennasare usually located at substantial heights above ground level to extend the range betweenantennas and to be able to transmit over intervening obstacles. To achieve long-distancetransmission, a series of microwave relay towers is used, and point-to-point microwave linksare strung together over the desired distance. Used in long haul telecommunicationsservice, as an alternative to coaxial cable or optical fiber.

You can implement a firewall in either hardware or software form, or a combination of both. Firewalls prevent unauthorized internet users from accessing private networks connected to the internet, especially intranets

Nadia's productivity at work is being hurt due to the large quantity of unwanted e-mail she receives. What steps can she take to reduce the amount of e-mail she receives?

Carefully read and complete subscription forms.

Read e-mail messages every hour.

Stop using the Internet.

Forward spam to spam at uce.gov.

Stop posting her e-mail address on newsgroups.

Answers

Answer:

I think that carefully reading and completing subscription forms is important and could possibly lower the amount of emails.

Reading them every hour will only hurt her work ethic.

Stop using the internet won't help at all.

Forwarding the spam to spam at uce.gov could work because that's what the site was made to do.

Stop posting her e-mail address on newsgroups could definitely help.

I'm stuck between the 1st, 4th, and 5th one but its one of them.

How many answer choices are you allowed?

It is steps plural.

Answer:2,3,5

Explanation:

Describe the history of computer in Nepal.​

Answers

Answer:

The first computer brought in Nepal was IBM 1401 which was brought by the government in lease for the population census of 1972 (2028 BS). Later in 1975 (2031 BS)YantrikSarinikaran Kendra (Electronic Data Processing Centre) was established which was later called as National Computer Centre ( NCC )

Answer:

The first computer brought in Nepal was IBM 1401 which was brought by the government in lease for the population census of 1972 (2028 BS). Later in 1975 (2031 BS)YantrikSarinikaran Kendra (Electronic Data Processing Centre) was established which was later called as National Computer Centre ( NCC )

Explanation:

if this answer is correct please make as brainlelist

Sharing contacts is different from sharing a calendar. Use the drop-down menus to explain how.
1. You can share contacts with
outside the organization without publishing online.
2. You are not able to that somebody share their contacts with you.
3. Both calendars and contacts are shared in emails. For the latter, the recipient clicks
and selects from a list.

Answers

Answer:

anyone

request

open shared contacts

Explanation:

edge 2020

Answer:

anyone

request

open shared contacts

Explanation:

help now ASAP, and thank you

Answers

Answer: True

Oxygen is needed to combust/ignite the fuel that is mixed in, which provides the heat and thrust to push the jet forward. On a chemical level, the oxygen (O2) mixes with whatever the fuel chemical may be. Recall that oxygen is often used to burn things, due to oxygen effectively breaking the bonds of the fuel chemical and unleashing its stored potential chemical energy.

Which best defines what a script tag does?

Answers

Answer:

The answer to your question would be C , A tag used to write programming scripts.

Explanation:

The  element either contains scripting statements, or it points to an external script file through the src attribute. Common uses for JavaScript are image manipulation, form validation, and dynamic changes of content. Hope this helps you! </p><p></p>

Which of the following best describes the protocol used on the internet?

Answers

Answer:

The protocols of the Internet are open and used by all devices connected to the network

Explanation:  

There are billions of devices connected to the Internet, and hundreds of different kinds of devices: laptops, tablets, phones, refrigerators, handheld credit card readers, and so on. Protocols (standards) ensure that the variety of devices interact with each other smoothly.  There are a lot of protocols! The Internet was designed with several layers of abstraction that sort the protocols according to what part of the process they support.

what is multimedia computer system​

Answers

A Multimedia can be defined as any application that combines text with graphics, animation, audio, video, and/or virtual reality. Multimedia systems are used for security to keep intruders out of a system and for the protection of stored documents

HELP PLZZ Which statement is true? Select 3 options.


A. A function must have a return value.

B. A function can use variables as parameters.

C. The definition of a function must come before where the function is used.

D. The definition of a function can come before or after it is used.

E. A function can have more than one parameter.

Answers

Answer:

B. C. E.

hope this helps :D

Answer:

The definition of a function must come before where the function is used.

A function can have more than one parameter.

A function can use variables as parameters.

Explanation:

Which background-repeat value represents this div?
repeat

repeat-y

repeat-x

no-repeat

Answers

Answer:

repeat-y ................ ..

explain the purpose of a web server (4marker)

Answers

It's a computer program that distributes web pages as they are requisitioned. The basic objective of the web server is to store, process and deliver web pages to the users. This intercommunication is done using Hypertext Transfer Protocol (HTTP).

Answer:

A web server is hardware that is dedicated to running the software. A web server can contain one or more websites, and does what clients want and can process incoming network requests.

Users of a _____ database have access through their personal computers linked to local or wide area networks

Answers

Answer:

Company

Explanation:

A company database is a database of a firm or organization that contains the information about the firm's employees, their products, services, and as well their client's and customers' details.

This is often kept on the main database server and arranged and organized by a database administrator.

Hence, Users of a COMPANY database have access through their personal computers linked to local or wide area networks

. In this project, how many times will the [Drive] block be repeated?
a
It will be repeated forever
It will repeat 100 times.
It will repeat 90 times.
It will repeat once.
c

Answers

Answer: wait is a multiple answers to it or

Because I think it’ll be forever

Explanation:

Which of these purchases is most likely to be paid for with a credit card
A. Soda
B. Lotto ticket
C. Parking fee
D. Plane ticket

Answers

Answer:

plane ticket?

Explanation:

What is the highest numeral in a decimal code?

A. 9
B. 5
C. 2
D. 1

Answers

Answer:

9

Explanation:

1.8, 1.9, 2.

~theLocoCoco

Which term refers to the portion of the hard drive where print jobs are stored before going to the print device

Answers

Answer:

Print Queue.

Explanation:

I majored in Technology

Printer spoolers, which queue print jobs and send them one at a time to a printer, should not be confused with printer drivers.

What print jobs are stored before going to the print device?

In order to enable control of print queue actions like stopping, restarting, or canceling tasks, a print queue provides users with printer management features. Some print queues let users rearrange the queue's order and assign print jobs a higher priority.

Messages that need to be printed are gathered in print queues. An Unspecific print queue can be started or canceled.

Applications can print with the help of printer drivers without having to be aware of the specific technical specifications of each printer model.

Therefore, The area of the hard disk where print jobs are kept before being sent to the printer is referred to as the print queue.

Learn more about print device here:

https://brainly.com/question/4005823

#SPJ6

8.10 Code Practice Question 3

Can someone please help cause this has me lost I took a picture of the question because that would be too much to try and type.

I’m sorry if the quality is bad I tried to get a good angle!

Answers

terms = ["Bandwidth", "Hierarchy", "IPv6", "Software", "Firewall", "Cybersecurity", "Lists", "Program", "Logic",

        "Reliability"]

def swap(arr, in1, in2):

   w = arr[in1]

   arr[in1] = arr[in2]

   arr[in2] = w

print(terms)

swap(terms, 5, 1)

swap(terms, 2, 4)

swap(terms, 3, 5)

swap(terms, 5, 6)

swap(terms, 6, 8)

swap(terms, 8, 9)

print(terms)

This is how I interpreted the question. If I need to make any changes, I'll do my best. Hope this helps though.

The program is an illustration of lists and list manipulation

Lists

Lists are variables that are used to hold multiple values in one variable name

Python Program

The program in Python, where comments are used to explain each line is as follows:

#This defines the swap function

def swap(arr, pos1, pos2):

    myList = arr[pos1]

    arr[pos1] = arr[pos2]

   arr[pos2] = myList    

#This initializes the list

terms = ["Bandwidth", "Hierarchy", "IPv6", "Software", "Firewall", "Cybersecurity", "Lists", "Program", "Logic", "Reliability"]

#This prints the list elements

print(terms)

#This swaps the second and the sixth list elements

swap(terms, 5, 1)

#This swaps the third and the fifth list elements

swap(terms, 2, 4)

#This swaps the fourth and the sixth list elements

swap(terms, 3, 5)

#This swaps the sixth and the seventh list elements

swap(terms, 5, 6)

#This swaps the seventh and the ninth list elements

swap(terms, 6, 8)

#This swaps the ninth and the tenth list elements

swap(terms, 8, 9)

#This prints the list elements

print(terms)

Read more about lists and list manipulations at:

https://brainly.com/question/24941798

i need help, thank you

Answers

Answer:

uhh yes?

Explanation:

i think people can go on weeks without food, so a set of trays wit food should last them a day

Ohhh I’m here and I also say yes one set can be enough if used wisely

ASCII is a common format for the representation of characters in writing code. How many characters can be represented in the standard ASCII encoding

Answers

Answer:

A total of 128 characters can be represented in the standard ASCII encoding.

Explanation:

The American Standard Code for Information Interchange (ASCII) was created to make an international standard for encoding the Latin letters. In 1963, ASCII was received so data could be deciphered between PCs; speaking to lower and upper letters, numbers, images, and a few orders.

Since ASCII is encoded using ones and zeros, the base 2 number framework, it uses seven bits. Seven bits permits 2 to the power of 7 = 128 potential blends of digits to encode a character.

ASCII consequently ensured that 128 significant characters could be encoded.

write a QBASIC program to input two sides of a rectangle from the user and print its area and perimeter [Area = L×B, Perimeter =2 (L+B)]​

Answers

Answer:

CLS

INPUT"ENTER THE LENGTH";L

INPUT"ENTER THE BREADTH";B

AREA=L*B;A

PERIMETER=2(L+B);P

PRINT"THE AREA IS =";A

PRINT"THE PERIMETER IS =";P

END

help me i dont understand REAL ANSWERS PLS

Answers

Answer:

it's answer is B

hope it helps you

hey plz help, and thanks

Answers

Answer:D im pretty sure

Explanation:im sorry if get it wrong So sorry ok just sorry

D maybe??? Sorry if it’s wrong

Which visual novels do you recommend and why?

Answers

Answer:

I rec recommend Fate/Stay Night. It's honestly so good!

Explanation:

The ______ occurs in first-come-first-served scheduling when a process with a long CPU burst occupies the CPU. Group of answer choices

Answers

Answer:

convoy effect

Explanation:

The Convoy effect is an episode in Operating System, in which if the burst time of the first process is high among all the processes, then it effects the First-Come-First-Serve algorithm.

Just like in real incidents, when a convoy is heading first in the slows down the vehicles behind; same happens in the Operating System. If long CPU burst occupies first in the ready queue, then it slows, or even in some cases, block other low processes. This effect is also known as starvation.

Therefore, the correct answer is convoy effect.

heeeeeeeeeeeelp idek plz help

Answers

Answer:

b

Explanation:

Other Questions
Write a paragraph that explains the increase and how technologies that have appeared overthe past 100 years may have contributed to the increase or may have prevented moresignificant increases in greenhouse gas levels. just write a C.E.R (claim, evidence, reasoning) which plentiful resource in the new England colonies was used to make many useful things All fats have a negative effect on heart health.TrueFalse Please answer quickly, timed test!!Which term is correctly paired with its role in the body?A) insulin a sugar that regulates blood glycogen levelsB) ADP a molecule that releases energy when it forms ATPC) glycogen a hormone found in blood that regulates blood glucose levelsD) glucose a sugar found in blood that can be broken down to produce ATP serup is which solution Given the polynomial 5x32x2+12, what is the leading coefficient? ******( I"LL GIVE YOU BRAINIEST)!!!******A. -2B. 3C. 5D. 12 At the age of 22, Mrs. LaBlanc was less than 4 feet tall. Her short stature was probably influenced by the lack of a growth hormone produced by the Budgeting, ethics, pharmaceutical company. Chris Jackson was recently promoted to Controller of Research and Development for BrisC or, a Fortune 500 pharmaceutical company that manufactures prescription drugs and nutritional supplements. The companys total R&amp ; D cost for 2017 was expected (budgeted) to be $5 billion. During the companys midyear budget review, Chris realized that current R&amp ; D expenditures were already at $3.5 billion, nearly 40% above the midyear target. At this current rate of expenditure, the R&amp ; D division was on track to exceed its total year-end budget by $2 billion!In a meeting with CFO Ronald Meece later that day, Jackson delivered the bad news. Meece was both shocked and outraged that the R&D spending had gotten out of control. Meece wasnt any more understanding when Jackson revealed that the excess cost was entirely related to research and development of a new drug, Vyacon, which was expected to go to market next year. The new drug would result in large profits for BrisCor, if the product could be approved by year-end. Meece had already announced his expectations of third-quarter earnings to Wall Street analysts. If the R&D expenditures werent reduced by the end of the third quarter, Meece was certain that the targets he had announced publicly would be missed and the companys stock price would tumble. Meece instructed Jackson to make up the budget shortfall by the end of the third quarter using "whatever means necessary." Jackson was new to the controllers position and wanted to make sure that Meeces orders were followed. Jackson came up with the following ideas for making the third-quarter budgeted targets:1. Stop all research and development efforts on the drug Vyacon until after year-end. This change would delay the drug going to market by at least 6 months. It is possible that in the meantime a BrisCor competitor could make it to market with a similar drug.2. Sell off rights to the drug Martek. The company had not planned on doing this because, under current market conditions, it would get less than fair value. It would, however, result in a one-time gain that could offset the budget shortfall. Of course, all future profits from Martek would be lost. Capitalize some of the companys R&D expenditures, reducing R&D expense on the income statement. This transaction would not be in accordance with GAAP, but Jackson thought it was justifiable because the Vyacon drug was going to market early next year. Jackson would argue that capitalizing R&D costs this year and expensing them next year would better match revenues and expenses.3. Referring to the "Standards of Ethical Behavior for Practitioners of Management Accounting and Financial Management,"4. Which of the preceding items are acceptable to use? Which are unacceptable? What would you recommend Jackson do? Simon is selling candy bars for his class fundraiser. In each box of 56 candy bars, 18 arepeanut, and the rest are dark chocolate. Each dark chocolate candy bar costs $2.25.If Simon raises a total of $117, selling a whole box, how much does each peanut candy barcost?O $4.00O $4.25$2.00$1.75Nort Write the equation in point-slope form of the line that contains the points (3,-5) and (5,- 1) Read, look at the image, and choose the correct option.En la escuela me gusta estudiar ________.A. el escritorioB. la pizarraC. la historiaD. el horario A CD and a DVD are both secondary storage devices, explain to a friend the difference between both On a piece of paper, graph y= -2x - 3. Then determine which answermatches the graph you drew. Give any two common development gools of people? The amount of tax is $3.40, which is 5% of the food bill. How much was the food bill not including the tax?If Simon wants to leave a 20% tip on the amount of the food bill before tax, how much should he leave for a tip?What is Simons total bill including tax and tip? What percent of the food bill is this? Select the one statement that is true#1: More soldiers deserted the military than fled to Canada #2:The number of Canadians who fought in Vietnam exceeds the number of American soldiers killed in Vietnam.#3: Boys outnumbered Girls who immigrated to Canada during the Vietnam war.#4: Canada readily accepted deserters during the Vietnam-war era. John wants to draw a circle graph showing his friends favorite ice cream flavors. When he polled his friends asking each their favorite flavor of ice cream, 35% of his friends aid chocolate, 20% of his friends said vanilla, 15% of his friends said Strawberry, 25% of his friends said mint chocolate chip, and 5% of his friends said flavors other than those previously listed. What will be the degree measure of the vanilla sector of the circle graph? A 2.3 kg mass oscillates back and forth from the end of a spring of spring constant 120 N/m. Depending on that x max =0.7 calculate the total energy Please answer correctly !!!!!!!!!!!! Will mark Brianliest !!!!!!!!!!!!!!!!