1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flura [38]
1 year ago
9

What does syntax error mean :-;explain briefly.thankyou!

Computers and Technology
1 answer:
Alex Ar [27]1 year ago
3 0
A syntax error is an error in the syntax of a sequence of characters or tokens that is intended to be written in a particular programming language. For compiled languages, syntax errors are detected at compile-time. A program will not compile until all syntax errors are corrected.
You might be interested in
Will an email sent from a phone say it was sent from your phone
Morgarella [4.7K]
 Most emails sent<span> from devices like an </span>Android phone<span> or </span>Iphone<span> have an extra line at </span>the<span> ending which suggests that they have </span>sent their <span>replies
or </span>emails<span> using </span>their phones<span>.

So most likely, yes.</span>
6 0
3 years ago
Read 2 more answers
Read the argument below and determine the underlying principle that was used to come to the conclusion presented: It is recommen
PIT_PIT [208]

Answer:

Hence option a is the correct one. Driving a car can be dangerous, but if you learn how to properly drive a car then you can significantly reduce the risk involved,

Explanation:

a) Driving a car can be dangerous, but if you learn how to properly drive a car then you can significantly reduce the risk involved.

As it belongs How to be a good car driving without risk as equivalent diet concept as a base.

Less than 3-5 servings of vegetables a day not taken equivalent car driving dangerous if no proper driving.

Hence option 1 is valid.

b) is wrong as it has negative feedback regarding the base case.

c) is a suggestion for the strong part which is also the wrong option

5 0
3 years ago
Rachel works in a bank. She wants to present the idea of implementing an IS to the management. How should Rachel describe the IS
Leni [432]

Rachael should describe information system to the management as an organized system that helps collect or gather, organize, track, store, manipulate, and analyze data to generate and distribute the information from gathered data to appropriate persons. The information generated is useful for managing your operations and making decisions. The efficient use of Information Systems will, without a doubt give a lot of opportunities to the company.

6 0
3 years ago
Read 2 more answers
Pendant Publishing edits multi-volume manuscripts for many authors. For each volume, they want a label that contains the author'
lbvjy [14]

Answer:

Check the explanation

Explanation:

Pseudocode For Reading File:

start

Declarations

InputFIle records.txt

OutputFile result.txt

string authorName

string title

int numOfVol

open InputFile

open OutputFile

input authorName, title, numOfVol from records.txt

while not eof

output authorName

output title

output numOfVol

end while

close records.txt

close results.txt

END

The flowchart for reading the file can be seen below.

3 0
3 years ago
The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system.
navik [9.2K]

Answer:

False

Explanation:

The Security Development Life Cycle (SDLC), is a software development which involves traditional approach towards its design such as, waterfall model, Agile, etc.

It can either be referred to as a generic secure development life cycle or a specific one, such as the Microsoft SDL or the Cisco SDL.

Its phases includes,

A1 - Security Assessment

A2 - Architecture

A3 - Design and Development 1

A4 - Design and Development 2

A5 - Ship

PRSA - Post Release

Each phase talks about how a secured software is developed.

The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system. This statement is false because by definition and attributes Security Development Life Cycle is a traditional approach towards software development and not a general method.

6 0
3 years ago
Other questions:
  • 1- Design a brute-force algorithm for solving the problem below (provide pseudocode): You have a large container with storage si
    10·1 answer
  • What type of restrictions may be placed on your license?
    7·1 answer
  • What is the resistance of a 1,000-foot length of #6 AWG wire at a temperature of 25 degrees C? A. 0.1593 ohm B. 0.4028 ohm C. 0.
    7·1 answer
  • How to select the entire table in microsoft excel
    11·1 answer
  • Find the reciprocal of 7/2 × 3/5<br>​
    6·1 answer
  • CodeHS 3.4.5. What is the code for four colored triangles.
    8·1 answer
  • Create a pseudocode program that asks students to enter a word. Call a function to compute the different ways in which the lette
    9·1 answer
  • Ciscon Telecom is a mobile operator in the European Union. The company provides personalized services to its customers, and its
    8·2 answers
  • Question 1 (1 point)
    9·1 answer
  • If there is a secure socket layer in place, what will you need in addition to a user id in order to access the shared files?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!