1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kogti [31]
3 years ago
14

The following code in a different program is not working properly. The message should display the value of the intCounter variab

le if the intCounter variable contains a balance that is less than or equal to 15. The message does not display. What mistake did the previous programmer make?
Computers and Technology
1 answer:
SIZIF [17.4K]3 years ago
6 0

Debug is tools where to address issue I any logic low is mistake. In each programming languages these tools should available.

<u>Explanation:</u>

Intcounter variable used as condition value is 15 to display message. End user has to check whether intcounter whether value has reached less than or equal to 15. If a loop or conditions is reached then message will not be display.

To address issue end has to use debug program and under the mistake. Debugging the program has to done step by step and find out the mistake and take necessary actions.

You might be interested in
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
What is point mode in excel 2013?
gtnhenbr [62]
I believe it means bullet points as in a form of typing
6 0
4 years ago
Which of the following is generally true about Open Source Software?
JulijaS [17]
<span>Open source software is usually free to download and install, and it can be studied, changed, and distributed according to the rights of the software. I don't believe there is any copyright laws on this type of software. The most known open source software is Linux and it's available for most operating systems right now. Typically, open source owners just ask for donations for their work.</span>
3 0
4 years ago
Question #1
Veronika [31]

The correct evolution is the production era-selling era-marketing era-relationship era

Explanation:

Evolution of marketing is the systematic way in which the marketing industry developed and hence the various developments and the modifications are systematically defined in each of the era

There are four major stages of development the product life cycle, the introduction, the growth and the maturity and finally the decline of the product. Philip Kotler is the founder of this modern method of marketing

4 0
3 years ago
What shows the web address of the page that is currently displayed in the workspace?
babunello [35]

Answer:

In a web browser, the address bar (also location bar or URL bar) is a GUI widget that shows the current URL. The user can type a URL into the bar to navigate to a chosen website.

6 0
3 years ago
Read 2 more answers
Other questions:
  • What phrase best describes the overall structure of the<br> passage
    9·1 answer
  • Which devices are managed through device management?
    15·2 answers
  • What is <br> central vision
    12·2 answers
  • Write a program that generates two 3x3 matrices, A and B, withrandom values in the range [1, 100] and calculates the expression½
    11·1 answer
  • Consider the following scenario below and recommend a solution.
    8·1 answer
  • A communications medium that carries a large amount of data at a fast speed is called
    14·1 answer
  • A friend asks you for help writing a computer program to calculate the square yards of carpet needed for a dorm room. The statem
    15·1 answer
  • 1) ( IBADE - 2020)A legislação que regula o uso da Internet no Brasil por meio da previsão de princípios, garantias, direitos e
    9·1 answer
  • You are looking at computer ads. One has a processor that is 3.64GHz. What does this mean?
    5·1 answer
  • If u play codm pls tell me ur username
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!