1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
My name is Ann [436]
3 years ago
11

What are some strategies that you can use when you debug a program?

Computers and Technology
1 answer:
mote1985 [20]3 years ago
5 0

Answer:

Incremental and bottom-up program development.

Instrument program

Binary search.

Problem simplification.

Explanation:

You might be interested in
In Windows 7/Vista, the information that establishes basic settings such as the location of the operating system and other key s
mel-nik [20]
Bios, This stores all of the computers start-up information. It tells the computer where to find the operation system inside the main storage and how to start it.

Hope this helps! :)
7 0
3 years ago
A ____ is harmful computer code that spreads without your interaction, slipping from one network to another and replicating itse
blondinia [14]
Malware is the answer

3 0
3 years ago
Assume there is an interactive math tutor. Many students take the math lessons online. At the end of each lesson, students have
Rus_ich [418]
Oh gosh oh I don’t wowiww
6 0
2 years ago
what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?
Zigmanuir [339]

Answer:

Image result for what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Common applications of X. 509 certificates include SSL/TLS and HTTPS for authenticated and encrypted web browsing, signed and encrypted email via the S/MIME protocol, code signing, document signing, client authentication, and government-issued electronic ID.

Explanation:

8 0
3 years ago
What is the name for the base-2 system used by computers to represent
NemiM [27]

Answer:

B. Binary Code

Explanation:

Binary code is the base-2 system used by computers to represent data. Binary code consists of 0's and 1's which can be used to represent states such as on or off; go or no-go and more.

7 0
2 years ago
Other questions:
  • What is the differnces between dark and middle ages of computer?​
    9·1 answer
  • The adjustable contact of a potentiometer is placed at the center of its adjustment. If the total resistance is 5 kOhms, what is
    9·1 answer
  • What technique creates different hashes for the same password? ccna routing protocols final answers?
    7·1 answer
  • 8. A pattern of being late for work or for appointments is usually
    12·1 answer
  • BOTH INTERNATIONAL & INLAND Which procedure(s) shall be used to determine risk of collision?
    14·1 answer
  • On laptops with a smart card reader installed, where is the smart card reader usually located?
    13·1 answer
  • Type two statements that use rand() to print 2 random integers between (and including) 100 and 149. End with a newline.
    15·1 answer
  • The duties of a database administrator include determining which people have access to what kinds of data in the database; these
    13·2 answers
  • Algorithm to calculate the area of a square.​
    6·1 answer
  • Question is in photo
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!