1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex73 [517]
4 years ago
6

When a program runs but gives incorrect output, this is called ? error

Computers and Technology
1 answer:
Ierofanga [76]4 years ago
4 0
Either an error or a glitch/bug.
You might be interested in
One emerging type of trojan horse is called a ____-access trojan.
Sliva [168]
<span>One emerging type of Trojan horse is called a remote-access Trojan (RAT).
</span> RAT is a malware program.  With this Trojan horse an intruder is given administrative control over a target computer. The RAT controls the system via a remote network connection as if by physical access. It is typically installed<span> invisibly with a user-requested program.</span>
3 0
4 years ago
Which of these colors is most likely to be outside the CMYK gamut?
erma4kov [3.2K]
CMYK does not include a white color because it is assumed that it will be printed on a white paper and depending on the percentage of each color that is used, the white from the paper will be used to fill the space, therefore making the shades appear lighter. If it's something that will only be seen digitally, use RGB.
3 0
3 years ago
Robot is an example of which generation computer?​
n200080 [17]

Robot is an example of Fifth Generation Computer.

I hope it's help you...

Thanks♥♥

6 0
3 years ago
Given the IPv4 address, 200.245.10.150/28, how many subnets are possible and how many hosts can be supported by each subnet?
natali 33 [55]

Answer:

d. 24 = 16 subnets, 24 - 2 = 14 hosts per subnetwork

Explanation:

When four bits are borrowed from the fourth octet of class C IP address 200.245.10.150, the IP address is subnetted to 16 subnets, where the number of subnets is equal to two raised to the number of borrowed bits (ie, 2^ number of borrowed bits), and 14 assignable host IP address gotten from the formula;

  = 2^(number of host bits in the fourth octet) - 2

  = (2^4) - 2

  = 16 - 2 = 14 host addresses

3 0
3 years ago
Which method would be the BEST to protect security information and event management (SIEM) log data at rest from tampering by au
AnnyKZ [126]

Answer:

Option B (Deployment of write once read many (WORM) drives) is the appropriate one.

Explanation:

  • SIEM application goods/services consolidate safety information management (SIM) with security event management (SEM) throughout the area of device protection. We include an overview including its known vulnerabilities created by users and network equipment in actual environments.
  • No quantity of administrative intervention will alter the substance on something like a WORM disc, even by physical disc disruption or failure. That would be the better-suggested choice.
7 0
4 years ago
Other questions:
  • Which type of spreadsheet cell represents the left hand sides (lhs) formulas in an optimization analysis?
    5·1 answer
  • One of the most obvious initial changes in windows vista is the ____ interface
    10·1 answer
  • When activated, an Excel object has all the features of an Excel
    8·2 answers
  • An interrupt priority scheme can be used to ____. allow the most urgent work to be finished first make it possible for high-prio
    14·1 answer
  • Create your own Python code examples that demonstrate each of the following. Do not copy examples from the book or any other sou
    11·1 answer
  • What is the answer to in Microsoft Word you can access the blank from the command command from the mini toolbar what is the corr
    10·2 answers
  • What is the most likely reason that a digital artist would use a program such as Autodesk Maya or Max to create 3-D images for a
    12·1 answer
  • Instructions
    8·1 answer
  • To call the superclass's no-parameter constructor explicitly, use super(); group of answer choices true false
    10·1 answer
  • Which of these could you use to change data into information?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!