1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zlopas [31]
3 years ago
15

You're programming an infinite loop. What must you include in your code to prevent crashes?

Computers and Technology
2 answers:
natta225 [31]3 years ago
4 0

You have to put repeat

melisa1 [442]3 years ago
3 0

Usage of delay function in the code to prevent crashes when programming an infinite loop.

<u>Explanation: </u>

Nothing bad happens due to an infinite loop when it releases all the allocated memory before the loop ends. The issues arises when an infinite loop consumes resources inside the loop or creating a new memory allocation inside the loop. The code need to written in such a manner that when a loop does not exist in a certain time the error must be thrown to handle the infinite loop.

You might be interested in
Lucinda is a network manager. She wants to set up a small office computer network so that it will not be affected at all by elec
Katena32 [7]

Answer:

The network media she should use is;

E. Shielded twisted-pair

Explanation:

A network connection that will not be affected by electrical or electromagnetic interference is a shielded twisted pair cable

Electromagnetic interference, EMI, is an externally originating disturbance that has an impact on electrical circuits through electromagnetic induction, direct conduction, or electrostatic coupling, with the possible effect of circuit degradation or disruption

EMI can be prevented by the use of shielded twisted pair (STP) cabling that provides a barrier that reduces the effect of external electromagnetic fields and transports the current induced to the ground through a grounding wire

4 0
4 years ago
The linux/unix command __________ can be used to search for files or contents of files.
Nana76 [90]
The `grep` command is used for this. https://man7.org/linux/man-pages/man1/grep.1.html
8 0
2 years ago
An attacker attempting to break into a facility pulls the fire alarm to distract the security guard manning an entry point. Whic
OlgaM077 [116]

Answer:

'Urgency' is the name of this type of social engineering attack.

Explanation:

Social engineering attack describes a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

In 'Urgency attacks', the attacker uses some sort of emergency or urgent situation to get someone/people to do what they want or divulge a piece of information.

Hope this Helps!

5 0
4 years ago
Q1. Information systems that monitor the elementary activities and transactions of the organizations are: I a. Management-level
VashaNatasha [74]

Answer:

B. Operational-level systems monitor the elementary activities and transactions of the organization.

6 0
2 years ago
Please answer this please
dexar [7]

Answer:

It's not a question.

Explanation:

3 0
4 years ago
Other questions:
  • 14. Emelia is very concerned about safety and has conducted a study to determine how many bike helmets were replaced at each loc
    13·2 answers
  • If you need to use arrows in a chart, which feature or menu option of a word processing program would you use?
    13·2 answers
  • You are going to write a program for Computer test which will read 10 multiple choice questions from a file, order them randomly
    11·1 answer
  • What will you personally do to make your peers aware of the seriousness Of teen crashes?
    9·1 answer
  • Given the scenario, before leaving the office, you ask the CIO to provide which formal document authorizing you to perform certa
    11·1 answer
  • You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. Your company requires that all cabling follow the TIA
    14·1 answer
  • Which of the following is a tip for making sure you are messaging safely?
    5·1 answer
  • How do you add verticse in edit mode blender
    5·1 answer
  • Write two statements that each use malloc to allocate an int location for each pointer. Sample output for given program:
    7·1 answer
  • Write down the reciprocal of 40​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!