1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
beks73 [17]
2 years ago
12

PLEASE HELP, PLEASE THIS C++ CODE WON'T WORK IDK WHY CFBundleDevelopmentRegion English CFBundleDisplayName DOSBox CFBundleExecut

able DOSBox CFBundleGetInfoString 0.74-1, Copyright 2002-2012 The DOSBox Team CFBundleIconFile dosbox.icns CFBundleInfoDictionaryVersion 6.0 CFBundleName DOSBox CFBundlePackageType APPL CFBundleShortVersionString 0.74-1 CFBundleVersion 0.74-1 NSHumanReadableCopyright Copyright 2002-2012 The DOSBox Team NSPrincipalClass NSApplication CGDisableCoalescedUpdates
Computers and Technology
1 answer:
skad [1K]2 years ago
5 0

Answer:

Explanation:

There are such things as compiler bugs and even operating system bugs in which a program error-free itself fails to execute correctly.

For anyone including even the most experienced programmers, the overwhelming probability is that is not what is happening here.

There is only really one way to debug programs. Divide and conquer.

Enable all warnings in your compiler, find out what all the warnings mean, and drive them out or (not preferred) convince yourself that isn’t the problem

Keep trying to sub-divide the bit you think is wrong until you realize your error and fix it. If you come to the conclusion that bit is fine and the error exists earlier, but only exhibits at that point, change the program to test components in complete isolation.

If you come to a bit that you really can’t work out why it’s doing what it does, write a small standalone program that doesn’t do what you expect and post a question on Stack Overflow being clear about what you expect as the output and what you get.

Or

You didn’t write the correct instructions to reach your objective. It’s easy to write a program that nothing at all correctly and still compiles error-free. The compiler only spots the most glaring errors.

Hope this helps

You might be interested in
Where is the risk of someone intercepting another person’s online activity the greatest?
sergey [27]

social networking site

3 0
3 years ago
You are working on a project and need to be able to access the content from home and share the files with other team members. Th
inn [45]
Local server so you can all you use if you guys are near
5 0
3 years ago
Read 2 more answers
Do you think it's better for a young designer to use free, open-source art programs or to pay for commercial programs? Explain y
Alex787 [66]

Answer:

The young designer should use free open-source art programs for his designs. The designer can create new tools and get and update a verse collection of design tools in the software.

Explanation:

An open-source program is a software or application whose source code is available for changes, upgrade and sharing within the public.

Rather than in closed-source software where all upgrades and changes are made only by the tech-company with the license, and the expensive nature of the purchase, the open-source code programs are mostly free with a general public license.  

5 0
3 years ago
When I use
slega [8]

Answer:

If it works then no, if it doesn't then yes

Explanation:

Code Academy probably runs either way because it is not taking this as a intense class.

5 0
3 years ago
You wish to share cases created and owned by your community users (Customer Community Plus) with the internal product support te
emmainna [20.7K]

Answer:

The correct answer is option C. Custom Sharing Group

Explanation:

A custom Share group enables users to share documents which are being held by the high-volume community and portal users with the internal and external users. This Share groups relate all over portals or communities and are connected with sharing sets. Sharing rules and regulations are utilized to expand sharing accessibility to users in public groups or roles. They enable greater access for specific users.

8 0
2 years ago
Other questions:
  • Discuss Hashing and how it is utilized within the IT industry. Also, discuss how Hashing can improve our sorting and searching r
    12·1 answer
  • In the late 1980s, which wide area network (wan) technology became one of the standard methods of connecting business computers
    11·1 answer
  • Gregory Yob is associated with which of these games?
    7·2 answers
  • How can you troubleshoot Internet access problems?
    11·1 answer
  • All systems have ___________.
    9·2 answers
  • Reading log of any book with page numbers​
    5·1 answer
  • A company that provides finance services wants to shift to a mobile platform. What is the major advantage that the users of the
    10·2 answers
  • A*=++a/6+b++ 3 if a=3,b=4​
    13·1 answer
  • Suppose you want to boot a VM from its virtual DVD drive, but it boots to the VM’s hard drive. Which of the following could be t
    12·1 answer
  • Please explain what steps you will take to prevent hackers from getting access to your personal information.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!