1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bixtya [17]
3 years ago
15

In traditional programming, probably the most often used error-handling outcome was to ____.

Computers and Technology
1 answer:
Harman [31]3 years ago
3 0

In traditional programming, doubtless the error-handling outcome that is most often used was to terminate the program<span> in which the offending statement occurred, or at least to terminate the module (if not the entire program) in which the offending statement occurred.</span>

You might be interested in
Brain of the computer system is called​
bagirrra123 [75]

Answer:

central processing unit in short form CPU :)

5 0
3 years ago
Read 2 more answers
Someone hacked into an employee's computer and erased all of their data. All data for the past three weeks was lost as that was
hichkok12 [17]

WWW/ World Wide Web.

7 0
3 years ago
HELP ASAP PLZ PLZ PLZTegan is playing a computer game on her smartphone and the battery is getting low. When she goes to charge
frozen [14]

Answer:

3rd choice

Explanation:

6 0
2 years ago
Suppose the sender wants to send the following bit stream by using bit stuffing. What would the sender transmit if the following
Helen [10]

The purpose of bit stuffing is used as a delimiter to mark the end of one frame and the beginning of the next frame.

<h3>What is Bit Stuffing?</h3>

This refers to the use of one or more information bits in order to break up the message for easy synchronization.

The parts of a frame are:

  1. Frame header
  2. Payload field
  3. Trailer
  4. Flags.

<h3>What is a Flag?</h3>

This is a bit pattern that is used to define the start and end bits in a given frame and the 8-bit pattern 01111110 as the flag is commonly used.

Hence, we can see that your question is incomplete so I gave you a general overview to help you have a better understanding of the concept.


Read more about bit stuffing here:

brainly.com/question/12949292
#SPJ1

7 0
2 years ago
A(n) ________ virus runs a program that searches for common types of data files, compresses them, and makes them unusable.
ad-work [718]

Answer:

encryption

Explanation:

A(n) encryption   virus runs a program that searches for common types of data files, compresses them, and makes them unusable.

5 0
3 years ago
Other questions:
  • You have connected thirteen pcs and laptops to a wireless network. to make your wlan more secure, what should you do to disallow
    11·1 answer
  • Which payment method typically charges the highest interest rates
    15·1 answer
  • Alternating Current or AC is better for use in ___________, while DC direct current is needed in _________ .
    15·2 answers
  • A(n) _____ bus enables the central processing unit (CPU) to communicate with a system’s primary storage.
    5·1 answer
  • One of the most common uses of spreadsheet programs are communicating with others. O editing images and photos. O tracking and m
    8·2 answers
  • To determine the average of a range of numbers, click the ____ in the formula bar, then click average.
    13·1 answer
  • We use a cubic equation in which the variables and coefficients all take on values in the set of integers from 0 through p - 1 a
    8·1 answer
  • Discribe two ways you can zoom in and out from an image
    9·2 answers
  • Has replaced the need for landline telephones in many instance​
    10·1 answer
  • PlanthelogicforLungi’sapplicationusingpseudocode.Thelogicneedstosatisfythefollowingneeds:TheapplicationwillneedtoallowLungitoen
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!