1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ratling [72]
2 years ago
6

The following code has which kind of error?

Computers and Technology
1 answer:
Mila [183]2 years ago
6 0

Answer:

There would be a logic error.

Explanation:

The count for x should have been initialized before addint it to the variable total.

You might be interested in
In fnaf who´s spring trap in fnaf 3 and who are the five victim names that he murdered and lure them into the back room.
Vedmedyk [2.9K]

Answer:

Springtrap is William Afton, and the names of his victims are Gabriel, Jeremy, Susie, Fritz, and Cassidy

Explanation:

3 0
3 years ago
Read 2 more answers
A network administrator recently implemented two caching proxy servers on the network. how can the administrator best aggregate
Romashka [77]

The answer to this question would be:

The network administrator can best aggregate the log files from the proxy servers by “Configuring both proxy servers to log to a syslog server”.

Using the syslog server is a great method to merge logs from various sources into a single location.

4 0
3 years ago
How does technology make America great?​
Digiron [165]
Technology makes America great by allowing us to become more connected with one another.
3 0
4 years ago
Many businesses use robotic solutions. Which department of the food and beverage industry uses robotic solutions on a large scal
Alenkinab [10]

Answer:

Its packing you're welcome :)

Explanation:

7 0
3 years ago
Read 2 more answers
What connects two or more LANs together?
boyakko [2]
Wide Area Network also known as WAN
3 0
3 years ago
Read 2 more answers
Other questions:
  • 1. Write a bash script to create 3 files of different size greater than 1700 kb and less than 1800 kb . The 2. Content of the fi
    9·1 answer
  • What does OLE stand for? Object
    8·2 answers
  • As the operations manager for a supermarket chain, Mai needs to find a telecommunications technology that: enables managers in r
    9·1 answer
  • _____ is a systems development technique that produces a graphical representation of a concept or process that systems developer
    11·1 answer
  • What is the most common way for an attacker outside of the system to gain unauthorized access to the target system?
    15·1 answer
  • Briefly explain what are JavaScript librairies​
    12·1 answer
  • How do you compare text on different pages of a document?
    14·1 answer
  • A host is on the 192.168.146.0 network that has a subnet mask of 255.255.255.0. The binary value of the host portion is 11010101
    8·1 answer
  • [80 points] Fill in the missing word.
    14·1 answer
  • question 1 scenario 1, question 1-5 you’ve just started a new job as a data analyst. you’re working for a midsized pharmacy chai
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!