1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kogti [31]
3 years ago
14

The following code in a different program is not working properly. The message should display the value of the intCounter variab

le if the intCounter variable contains a balance that is less than or equal to 15. The message does not display. What mistake did the previous programmer make?
Computers and Technology
1 answer:
SIZIF [17.4K]3 years ago
6 0

Debug is tools where to address issue I any logic low is mistake. In each programming languages these tools should available.

<u>Explanation:</u>

Intcounter variable used as condition value is 15 to display message. End user has to check whether intcounter whether value has reached less than or equal to 15. If a loop or conditions is reached then message will not be display.

To address issue end has to use debug program and under the mistake. Debugging the program has to done step by step and find out the mistake and take necessary actions.

You might be interested in
What is a bitmap ???
leva [86]
<span>a representation in which each item corresponds to one or more bits of information, especially the information used to control the display of a computer screen.
</span><span>represent (an item) as a bitmap.
</span>
4 0
4 years ago
Read 2 more answers
What is one example of how teens use the internet and social media for cyberbullying
vovikov84 [41]

Cyberbullying occurs when individuals use technology to write aggressive, embarrassing, or hateful messages to/about peers in order to intimidate, harass, shame, and control.

7 0
3 years ago
Read 2 more answers
Businesses use ____ to save on travel costs and lodging, car fleets, and the time of highly salaried employees, whether they wor
Daniel [21]

Answer:

The answer is "Videoconferencing"

Explanation:

Video conferencing is a process, that uses communicating devices to convey sound and video information. It is used to involves the performances and meeting more than two members at various sites.  

  • It enables the users to meet a person face to face by different locations, and avoid moving to a single site.
  • This type of communication is used everywhere in the world, it saves the time of highly salaried employees, and provides the usage of different sites in the same organization.  
3 0
3 years ago
Help Me Please. I'm Begging you
Luba_88 [7]

Answer:

d and b can't see the last ones answer so im guessing this is what you needed.

Explanation:

8 0
3 years ago
Josh is learning about hackers known for causing damage and altering functions of websites. Which type of hacker is he learning
amid [387]

Answer:

WHITE HACKERS

Explanation: When a white hat hacker discovers a vulnerability, they will exploit it only with permission and not tell others about it until it has been fixed. In contrast, the black hat will illegally exploit it or tell others how to do so. The gray hat will neither illegally exploit it nor tell others how to do so.

4 0
2 years ago
Read 2 more answers
Other questions:
  • A data structure used to bind an authenticated individual to a public key is the definition of ________.
    14·1 answer
  • Sometimes we write similar letters to different people. For example, you might write to your parents to tell them about your cla
    9·1 answer
  • Which directive is used when defining 64-bit IEEE long reals?
    7·1 answer
  • Which of these are correctly formatted python dictionaries? Check all that apply.
    5·2 answers
  • PLEASE HELPPPPPPP
    15·1 answer
  • IN JAVA Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin ty
    15·1 answer
  • In a digital computer system, the data is transferred between the CPU and the other components
    11·1 answer
  • What is obtained after processing data?​
    8·1 answer
  • Which of the following activities are performed by computer programmers? Choose all that apply.
    5·1 answer
  • What is property in educational technology
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!