1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bixtya [17]
4 years ago
15

In traditional programming, probably the most often used error-handling outcome was to ____.

Computers and Technology
1 answer:
Harman [31]4 years ago
3 0

In traditional programming, doubtless the error-handling outcome that is most often used was to terminate the program<span> in which the offending statement occurred, or at least to terminate the module (if not the entire program) in which the offending statement occurred.</span>

You might be interested in
The ability to present an effective message with useful content is obviously important to a good _____ presentation.
Zina [86]

A successful oral presentation depends on your ability to communicate your ideas clearly and with relevant content.

<h3>What is an oral expression? </h3>
  • Oral presentations, often known as public speaking or just presentations, involve one or more speakers discussing a particular topic with an audience.
  • This seeks to provide information, amuse, educate, and/or make a point.
  • When the author speaks in front of other students, coworkers, or other interested groups to convey the results of years of expertise and research while outlining essential elements to success, the book is referred to as an example of oral presentation.
  • An oral presentation is one of the best venues for fusing verbal prowess with powerful nonverbal indicators to extend your communication.
  • It enables people to speak in front of a live audience with assurance about their thoughts and opinions.

To learn more about Oral presentation, refer to:

brainly.com/question/27326303

#SPJ4

7 0
2 years ago
Compare the encryption algorithms found in s-tools: idea, mdc, des, and 3des.
grin007 [14]
Are their answer chocies 

3 0
4 years ago
In total, how many 8-bit registers are there in the Intel 80x86 CPU design presented in class? Name one of these 8-bit registers
RSB [31]

Answer:

In general the number of  bit registers in Intel 80x86 CPU design when combined together forms a 16 - bit register

An example of the  -bit registers are AH, AL, BH, BL, CH, CL, DH, and DL

Explanation:

Solution

The 8086 CPU design has a total of eight 8-bit registers and these register can be integrated together to make 16- bit register as well.

The 16-bit data is stored by breaking the data into a low-order byte and high order byte.

The name of the 8 bit registers is shown below:

AH, AL, BH, BL, CH, CL, DH, and DL

7 0
3 years ago
What should a pie chart represent?
Crazy boy [7]

Answer:

Data that adds up to 100%

Explanation:

7 0
2 years ago
Hardy doesn't have access to a work template, which is on the network server. What should he do?
BabaBlast [244]

Answer:

Allow access.

Explanation:

Network server is a type of central repository (file server), where computers connected to it can access files stored in the repository. There can be other types of network server, besides file server, like printer server.

Network server are usually not available over the internet and require users to connect to a local network (intranet), in order to access it.

The server is managed by an administrator. One of the jobs of the administrator is to password protect and/or add users to the server.

4 0
4 years ago
Other questions:
  • The bantu and arabic languages blended, creating what new language?
    14·2 answers
  • The first step in the information systems planning process is to ___________.
    8·1 answer
  • The bearing of point p from A​
    15·1 answer
  • Match the definition with the corresponding word
    12·2 answers
  • A ________ is a single media file including art, sound, animation, or movies.
    9·1 answer
  • What device connects a lan's switch to the next network? qizzlets?
    5·1 answer
  • Convert the following denary numbers into binary using 8-bit register:
    10·1 answer
  • Choose a common cloud-based application from the lesson.(Infrastructure as a service, Software as a service, Platform as a servi
    5·1 answer
  • A ____________ is a collection of infected IT devices that an attacker or attack group controls.
    8·1 answer
  • Digital Print Project
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!