1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anit [1.1K]
3 years ago
11

____ errors occur when a formula is written incorrectly, when a mistake is made with a decision condition, or when the wrong var

iable name is used.
Computers and Technology
1 answer:
Viktor [21]3 years ago
8 0
Based on Understanding Computers: Today and Tomorrow, Comprehensive written by<span> Deborah Morley, Charles S. Parker, This is called run time errors. It appears when a program was incorrectly encoded or the wrong variable is used to implement a task. During this problem, a programmer must learn the cause of the error and correct it to do needed task.</span>
You might be interested in
A user creates a GPO. What do you need to do for that user to manage his or her GPO that he or she created?
d1i1m1o1n [39]

Answer: Nothing should be done.

Explanation:

Group Policy helps in the provision of a centralized management of operating systems, and applications. It should be noted that a group policy object (GPO) is simply referred to as the configurations involving the group policy.

Nothing should be done to manage the GPO created. When the permission to create a GPO has been given to someone, it means that they can also manage the GPO therefore, nothing needs to be done anymore.

8 0
3 years ago
The faster the clock speed, the more of these the processor can execute per second. what are they?
inna [77]
The more the Instructions

Also referred to as clock rate, clock speed is that speed the microprocessor executes each instruction. The CPU requires a number of cycles to execute an instruction. Thus, the faster the clock speed, the faster the CPU and the faster it can execute instructions in a second.



8 0
3 years ago
Read 2 more answers
Which protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication?
amid [387]

The L2TP or Layer 2 Tunneling Protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication.

<h3>What is vpn?</h3>

VPN is known as a Virtual Private Network extends a private network across a public network and activates users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

The main difference between VPN proxy and a VPN is encryption and VPNs hides all the web activities performed by the user as well as user's private IP address.

Therefore, the L2TP or Layer 2 Tunneling Protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication.

Learn more about VPN here:

brainly.com/question/17272592

#SPJ4

3 0
2 years ago
A network that operates without relying on a server is the ________ network.
Arlecino [84]
A network that operates without relying on a server is the nternet network
5 0
4 years ago
Which technique emphasizes the participative development among system owners, users, designers, and builders?A) Rapid applicatio
tekilochka [14]

Answer:

The correct option to the following question is option (D).

Explanation:

Rapid Application Building is also known as the RAD(Rapid Application Development) and it is one of the important functions of software development.

It is the concept that gives special importance in working on software and get more flexible as compared with the first development methods.

JAD(Joint Application Development) which is referred to as designing in the computers based systems and it the one of the important function of the software development.

5 0
4 years ago
Other questions:
  • I don't understand question how do I work it out?
    7·2 answers
  • Help PLEASE (in attachment)
    8·1 answer
  • 4+4 act quick for brainliest
    10·2 answers
  • To create bold shadows, which lighting choice would work best.
    7·1 answer
  • How to manufacture an ict application?
    15·1 answer
  • Select the correct answer
    5·2 answers
  • What is essence of computer systems and networks?​
    9·1 answer
  • Shira’s Shoes sold 875,000 pairs of sandals in June, which was 70% of the total number of shoes sold. How many shoes did the com
    14·2 answers
  • What is the value of numX when this program is executed? if 3 &lt; 5 and 8 != 3: numX = 3 else: numX = 7
    13·2 answers
  • Create a dynamic array of 100 integer values named myNums. Use a pointer variable (like ptr) which points to this array. Use thi
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!