Sarah is a detall-oriented programmer. While testing her program, what other skill would she have to apply in order to detect all bugs?

Answers

Answer 1
The answer is Troubleshooting

Related Questions

Explain network optimization challenges of internet providers.

Answers

Answer:

The internet was initially used to transfer data packets between users and data sources with a specific IP adress.Due to advancements,the internet is being used to share data among different small,resource constrained devices connected in billions to constitute the Internet of Thing (IoT).A large amount of data from these devices imposes overhead on the (IoT) network.Hence,it is required to provide solutions for various network related problems in (IoT) including routing,energy conservation,congestion,heterogeneity,scalability,reliability quality of service (QoS) and security to optimally make use of the available network.In this paper,a comprehensive survey on the network optimization in IoT is presented.

You would like the word "Employee" to appear in cells A1, B1, C1, D1, and E1. To be efficient, you should
type the label in Al and drag down column A
use the merge and center command
type the label in Al and use autofill
type the label in each of the cells

Answers

To be efficient, type the label in Al and use autofill. Check more about excel below.

What is Excel used for?

Microsoft Excel is known to be a kind of software that helps its users to be able to edit, organize and calculate data through the use of a spreadsheet.

Note that one can be able to duplicate a word such as "Employee" on excel by typing the label in Al  and use autofill.

Learn more about Excel from

https://brainly.com/question/25879801

#SPJ2

Write a program that allows the user to enter three separate strings: a city name, a state name, and a ZIP code.

Answers

Answer:

In Python:

city = input("Enter a city: ")

state = input("Enter a state: ")

zip_code = input("Enter a zip code: ")

What is the purpose behind the Three Phase Commit? It improves upon the two phased commit by requiring that locks be acquired at the start of a transaction. It allows for coordination even in the event of unreliable network connections. It ensures that no shared locks are help by other connections in the event of a write operation. None of the above.

Answers

The answer is a) It improves upon the two-phased commit by requiring that locks be acquired at the start of a transaction.

Reason: The 3PC is an extension or you can say developed from 2PC that avoids blocking of an operation. It just ensures that first n sites have intended to commit a transaction that means it acquires commits or locks before the start of any transaction to avoid any blocking.

Option b) is wrong as it does not allow coordination, it just let all the other sites do their transaction if any other site is blocked, so no coordination is there between sites that they will wait till their coordinator is corrected.

Option c) is wrong as lock operations are shared between other connections as when their coordinator fails, the new coordinator agrees to the old coordinator that they had shared locks before and they can start their transaction.

Option d) is wrong as option a) is correct.

If you like the answer, please upvote.

What free website can you record videos on, and edit them without money?

Answers

Answer:

You can edit videos on Capcut for free and I think you can also use Alightmoon

Answer:

You can edit videos using this application called Kinemaster.

Explanation:

After recording the video download Kinemaster available on Playstore and App store

All Office programs have similar commands on the tab for changing the document view a. File b. View c. Locate d. display ​

Answers

Answer:

B. View

Explanation:

So you can eliminate "Locate" and "Display", since those do not exist on the Microsoft Word task bar.

Now you're left with File and View. File has everything to do with sharing and exporting your file, such as printing or saving it to your computer as a specific file.

With that being said, we're left with "B. View", which as you can see when you click it, presents many us with ways to view our document.

Good luck on your Microsoft Office/Word Certification!

I want know answer for best way to copy formula on MS Access

Answers

Answer:

copy and paste is alternate

why GUI operating system is more popular than CUI operating system these days? discuss
please give me long answer​

Answers

Answer:

Explanation:GUI operating system is more popular than CUI operating system these days because they support extra devices and multimedia system and also network and internet which CUI doesnot support. In CUI operating system we have to type commands to perform any task in the computer but in GUI operating system we can give vommands to the computer by clicking on icons, menus and buttons which is easier to us.

Hope It helps................

why is it important to o save a file when using a computer

Answers

Answer:

I think that it's important to save a file when using a computer so you won't lose it. Much like a document usually files are important and mark progress. Like if you're writing an essay and get tired simply save it to a file or document and continue it later. But if you weren't to do that you could lose all your saved work.

Explanation:

Hope that helps. there's not a lot of information to go off of

I think that it's important to save a file when using a computer so you won't lose it.

what is the keyboard shortcut to display formulas on the worksheet

Answers

the keyboard shortcut is c=8

Q) Look at the code and determine the output

y=-10
while(y<10):
print('$', end="") y += 5

(a) $$$$$$$$$$
(b) $$$$
(c) $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
(d) Nothing will be printed

Answers

Answer:

B.

Explanation:

a web server is a computer that manages files for multiple user on a net work. true or false​

Answers

True. I’m pretty sure

Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string in c++

Answers

#include
#include

using namespace std;

int CountCharacters(char userChar, string userString){
int result = 0;
for(int i = 0;i if(userString[i] == userChar){
result++;
}
}
return result;
}

int main(){
string userString;
char userChar;
cin>>userChar>>userString;
cout< return 0;
}

how does the internet bring people farther apart
use a paragraph to answer the question​

Answers

Answer:

First of all you may not be able to see your friend in person and it gets very sad. Sometimes you call them but they don't answer you because they don't have enough time to talk or they have something else to do. They won't always want to be on the internet you know, they want to go outside and get a life and not be like the FRE-KIN T-I-K T-O-K-E-R-S WHO ARE CHILDREN AND BEING VERY STU-PID AND ARE TOTAL IDIOTS AND SAY STUFF THAT MAKE NO SENSE AND TRY TO GET ATTENTION. OH DON'T BRING TOWARDS THE GA-CHA IT SO TRASH. I still hate gacha :) and I am happy. Another thing is what some people post, you see you meet friends in real life and sometimes you get to know them but you don't know what they might be doing on the internet and another thing is that they post stuff that makes you feel uncomfortable and disgusted.

1. Go to a popular online electronic commerce site like Amazon. Place several items in your shopping cart, and then go to check out. When you reach the screen that asks for your credit card number, right-click on the Web browser and select Properties. You may need to use the help feature of your browser to find the security protocols in use and the certificates used to secure your transactions. What did you find out about the cryptosystems and protocols in use to protect the transaction

Answers

On Amazon.com, I found that there are a few cryptosystems and protocols in place. The most interesting thing I found was that there were 12,292 blank lines of code before anything was actually written. Amazon ensures a secure transaction by encrypting the users information on the users end, and then decrypts their information on their end.


Which two of these can be stored in a float variable?
1
C
3.4
true
"hello"

Answers

Answer:

3.4

Explanation:

A float variable can only store a floating-point number which means it can store a number that has a decimal place or a decimal number.

Answer:

float variable is

3.41

Please answer these questions.

Answers

For question 15 the answer is option C. I don't know the answers to the other questions

What is the term for the action of Brazil imposing tariffs on US imports in response to the imposed tariffs by the U.S. on Brazilian exports to the United States ?

A. Reclaiming
B. Retaliation
C.retribution

Answers

I think the answer is B.

Explain the difference between the = symbol in Java and in mathematics.

Answers

Answer:

In maths the '=' sign tells us that the two integers or variables on either side are the same, wheras in Java the '=' sign means that you are assigning the variable on the left hand side it's value which will be on the right

The definition of "nested statements" is _____.
a. elements of HTML that work within other elements of HTML
b. elements of specific text that work within elements of HTML
c. elements of specific code that work within elements of HTML
d. elements of HTML that work outside of elements of HTML

Answers

C??i think sorry if wrong ..

The problem below uses the function get_numbers() to read a number of integers from the user. Three unfinished functions are defined, which should print only certain types of numbers that the user entered. Complete the unfinished functions, adding loops and branches where necessary. Match the output with the below sample:


Enter 5 integers:

0 5

1 99

2 -44

3 0

4 12

Numbers: 5 99 -44 0 12

Odd numbers: 5 99

Negative numbers: -44

Answers

size=6

def get_numbers(num):
numbers = []
print('Enter %s integers:' % num)

for i in range(0,num):
print(i,end=' ')
user_input = int(input())
numbers.append(user_input) # Add to numbers list
return numbers

def print_all_numbers(numbers):
# Print numbers
print('\nNumbers:',end=' ')
for i in range(0,len(numbers)):
print(numbers[i],end=' ')

def print_odd_numbers(numbers):
# Print all odd numbers
print('\nOdd numbers:',end=' ')
for i in range(0, len(numbers)):
if numbers[i]%2!=0:
print(numbers[i], end=' ')


def print_negative_numbers(numbers):
# Print all negative numbers
print('\nNegative numbers:',end=' ')
for i in range(0, len(numbers)):
if numbers[i] <0:
print(numbers[i], end=' ')

nums = get_numbers(size)
print_all_numbers(nums)
print_odd_numbers(nums)
print_negative_numbers(nums)

Which item would a small business most likely used to meet its daily operational needs ?

Answers

They could use a Budget software

Answer:

Commercial, ready-to-use software

Explanation:

Consider a system which has a memory access time of 300 nsec. An average page fault takes around 10 millisecond to get serviced. If the page fault occurs with a probability of 4% in the system, then find out the effective memory access time of that system. If somehow, you manage to reduce the probability of page fault to 2%, then by how much the system performance improves as compared to the previous case?

Answers

Answer 72 ncs is the answer im pretty sure

You can find the answer in the attached photo

1. All the computer has a power button.​

Answers

Answer:

The power button is a round or square button that powers an electronic device on and off. Nearly all electronic devices have power buttons or power switches. Typically, the device powers on when the button is pressed and powers off when it's pressed again.

Explanation:

1. True. All computers have some way of turning on or off. whether that be a button or a switch.

How can I have a private conversation with no one knowing on my iPhone

Answers

Answer:

Just share a note by making one.

Explanation:

Thank you

Write code that assigns bigValue with the return value of calling the function GetBiggestValue passing number1 and number2 as arguments (in that order). Then, assign bigValue with the return value of calling GetBiggestValue passing bigValue and number3 as arguments (in that order).

Answers

Code:

Function GetBiggestValue(integer value1, integer value2) returns integer result
if value1 > value2
result = value1
else
result = value2

Function Main() returns nothing
integer userVal1
integer userVal2
integer userVal3
integer bigValue

userVal1 = Get next input
userVal2 = Get next input
userVal3 = Get next input

bigValue = GetBiggestValue(userVal1, userVal2)
bigValue = GetBiggestValue(bigValue, userVal3)

Put "Max value: " to output
Put bigValue to output

Why must the image be reduced when the field of view is widened to take in more of the scene?

Answers

The lighting in the shot
As the size of the hole is increased, a larger cluster of light rays gets through to the film or sensor and makes a wider, even blurrier circle. These circles overlap, so the wider each circle becomes, the less clear the picture will be.

Discuss your role as an IT professional in terms of your responsibility to clients, co-workers and society.

Answers

An IT professional is expected to deliver correct installations and programming that are safe from security breaches to clients. To co-workers, teamwork, respect, and brainstorming are needed to work together and achieve results. To society, an IT professional is expected to deliver architectures that do not compromise security and privacy.

An information technology professional could be focused on the hardware or software of systems. It is vital that IT professionals deliver services that are foolproof and not susceptible to attacks.

When working with colleagues, they must cooperate in order to deliver the most efficient services.

Learn more about IT professionals here:

https://brainly.com/question/14314381

explain different users of computer in briefly?​

Answers

Answer:

The question is invalid; there are many types of computer user. Why on earth do you think there are five?

From the top of my head.

Casual- someone at home browsing the web, reading email.

IT Consultant. Advising people.

Software developer- writing software

Secretary - manages email for a company

Academic. Writing research papers.

Monitors. Monitor a computer system.

That’s six off the top of my head. There are probably a dozen more. So why do you think there are five?

Each JavaScript command line ends with a(n) ____ to separate it from the next command line in the program.

Answers

The answer is :
semicolon (;)
Other Questions
Triangle DNO has vertices at D(5, 8), N( 3, 10), and O( 3, 6). If vertex D is translated 4 units to the right, the best name for Triangle DNO is:Answer Choices:a. Scaleneb. Isoscelesc. Equilaterald. Righte. none of these pls help me i rlly need to get this done today. A coordinate grid is shown below:A coordinate grid from negative 2 to 0 to positive 2 is drawn. There are three grid lines between a whole unit on the grid.Part A: Which point represents the origin? (2 points)Part B: Starting from the origin, explain how to plot the following three points accurately:(1, 1)(1, 1.5)(2, fraction 1 over 4)(8 points what's is the best apps to learn French Can you live without purpose, without happiness, and without any kind of love? PLEASE HELP QUESTION IN PICTURE 15 POINTS If Delta FGH sim Delta KJH find FH . How do I multiply a fraction and a whole number? Please explain step by step to get marked I_______the test would be easy.thaughttoughtO taughtO thought Help please Ill make it brainliest Write sentences using the verbs and tense given.7. giggle: future tense 8. chuckle: past tense9. laugh: present tense The overall condition of the way that groups of people lived is called .....A. EconomicsB. Standard of livingC. Happiness Index hand demand and private own You're researching a recent XSS attack against a webapplication. The developer showed you the JavaScript codeused to sanitize and validate input in the browser; even ifyou're not a coder, it seems like it would have prevented theattack. What is the most likely reason the web applicationwas vulnerable? Choose the best response.A. Client-side validation can be easily bypassed.B. Input validation doesn't reliably protect against XSSattacks.C. Server-side validation can be easily bypassed.D. The attacker performed an injection attack to bypassinput validation. Is -4/-19 equivalent to -4/19 I think you...... eat vegetable. It is good for health Which statements are true about Gretchen's adjusted data set?The data set is approximately symmetric.The center moved farther from the center of Manuel's data set.a The center moved closer to the center of Manuel's data set.The spread values are closer to the spread values of Manuel's data set.The data set is skewed left.The spread values are farther from the spread values of Manuel's data set. Which sentence in the passage paraphrase Milgrams thoughts? The idea that Americans had a God-given right to expand westward was known as.. what economy does The government has the right to own all land, buildings, and factories What does the transformation f(x)f(x+5)1 do to the graph of f(x)? Find the angle measure I'll give brainliest to the right answer!!!Find three consecutive odd integers such that the difference of twice the second and the first is 11.