1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
My name is Ann [436]
3 years ago
11

What are some strategies that you can use when you debug a program?

Computers and Technology
1 answer:
mote1985 [20]3 years ago
5 0

Answer:

Incremental and bottom-up program development.

Instrument program

Binary search.

Problem simplification.

Explanation:

You might be interested in
has anyone noticed to get credit for answering a question you don't even need to answer it correctly?
Helga [31]

Yes I've noticed this. Unfortunately it's up to the user (Asker) to report an answer incorrect.

8 0
3 years ago
Read 2 more answers
Data with values that change continuously or smoothly over time is known as:
Alexeev081 [22]

Answer:

A.  \:  \boxed{analog  \: data}

5 0
3 years ago
Read 2 more answers
What is a statement that adds 1 to the int j when the int counter has a value less than the int n?
Nikitich [7]
I think the answer is n combination r or n permutation r.
Please mark me as brainliest.
5 0
3 years ago
Describa las etapas del arranque de viruta
blondinia [14]

Answer:

Las virutas son partículas que se eliminan mecánicamente de una pieza de trabajo mecanizada. En el contexto de la tecnología de fabricación, especialmente el mecanizado, el término se refiere principalmente a virutas de metal; En principio, sin embargo, las virutas se crean en todo tipo de mecanizado de cuerpos sólidos. Las astillas de madera son el resultado de la carpintería. Cuando se mecanizan plásticos, se crean virutas, así como cuando se mecanizan materiales minerales, cristalinos o amorfos como el vidrio, que a menudo se realiza mediante esmerilado.

7 0
2 years ago
You configure a Windows laptop for a user who frequently travels and must connect to several wireless networks. While at a new b
aliina [53]

Answer:

Turn on file and printing sharing for all networks.

Explanation:

Windows has several security features when connecting to a network. In the control panel, you can access to Network and internet > Network and sharing center > Advanced sharing options. There you will see 3 different profiles, one for private networks, one for guest or public networks, and one for all networks.

You should take one of the 2 options. Enable file and printer sharing for all networks, so he can just print without doing anything more. Or keeping the print sharing just for private networks, and adding his new branch office's network to the private networks list.

8 0
3 years ago
Other questions:
  • What are issues to consider when deciding to build software in-house or purchase commercial off-the-shelf software (cots)?
    14·1 answer
  • The windows troubleshooting utility that identifies and eliminates nonessential files is called _____.
    15·2 answers
  • Whats the relationship between the CPU and motherboard
    6·1 answer
  • Suppose we have two String objects and treat the characters in each string from beginning to end in the following way: With one
    14·1 answer
  • In the well-known ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and ins
    9·1 answer
  • As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them.
    10·1 answer
  • When a router forwards incoming packets closer to their destination hosts, this is called?
    9·1 answer
  • Which statement is NOT CORRECT?
    11·1 answer
  • Pls tell me the answer pls i need the answer
    6·2 answers
  • In what decade was photography invented? the 1800s the 1820s the 1840s the 1860s
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!