1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ira [324]
3 years ago
6

Typically, a programmer develops a programâs logic, writes the code, and ____ the program, receiving a list of syntax errors.

Computers and Technology
1 answer:
miv72 [106K]3 years ago
4 0
"debugs" is the answer
You might be interested in
Who invented slide Rule and when?​
podryga [215]
Invented by William Oughtred in the 1600s but only used in the mid 1800s
3 0
3 years ago
Read 2 more answers
Dwight <br> d. eisenhower was impressed with germany's network of highways and how it __________.
emmasim [6.3K]
Eased the mobilization and transportation of troops
5 0
2 years ago
Which type of network is the internet? choose the answer
Alex Ar [27]

Answer:

WAN or wide area network

Explanation:

The Internet is the most basic example of a WAN. It is connecting all computers together around the world.

5 0
3 years ago
What two things should you do before starting the design process
Charra [1.4K]

Answer: B and C

Explanation: Analyze the audience

                      Identify the problem

8 0
2 years ago
________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White
Fynjy0 [20]

Answer:

TLS

Explanation:

In the field of computer security, TLS refers to Transport Layer Security it is closely related to the Secure Sockets Layer (SSL) although TLS is more commonly used these days. They are both techniques in cryptography that provides for the safe transfer of information between two parties (servers, systems and user applications)

TLS particularly provides a balance between transmission speed and data security through the use of symetric and asymmetric cryptography and the encryption and decryption key is the session key at both ends (sender and reciever), as such TLS has found usage in most advanced data exchange systems like credit card processing and online banking.

8 0
3 years ago
Other questions:
  • What is a geotag?
    10·1 answer
  • Why is Abraham called the Father of Believers?
    6·1 answer
  • The accessibility of a website refers to which of
    6·1 answer
  • The latest form of personal communication that most resembles a public journal is a _____.
    15·2 answers
  • Create the code that will find
    11·1 answer
  • Directions. Read and analyze the sentences below. There are words or phrases to be corrected. Rewrite it on the blank accrording
    6·1 answer
  • What does this function do in the code?
    5·2 answers
  • Subscribe too my you tube channel for a brainiest
    15·1 answer
  • The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a select
    7·2 answers
  • You are trying to sell a new product to a store owner. Which method of presentation
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!