1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goblinko [34]
4 years ago
6

Determine the result. Type "Error" if the program would terminate due to divide-by-zero. Only literals appear in these expressio

ns to focus attention on the operators; most practical expressions include variables.
100 / 2
Computers and Technology
1 answer:
nasty-shy [4]4 years ago
7 0

Answer:

It depends upon the programming language that you are working on, and you can set your own error message using the try catch option. As an example, suppose you are working on the C#. Code like below can be added:

using System;

class MainClass {

static void Main(string[] args) {

int a = 5;

int b= 0;

int c= 100/2;

console.WriteLine(c);

try {

int d = a / b;

} catch (DivideByZeroException err) {

Console.WriteLine(err);

}

}

}

System.DivideByZeroException: Attempted to divide by zero.

This will give the above error message. And this is an error message by the system. We can also have a user-defined error message.

Explanation:

Please check the answer.

You might be interested in
What are the ASE special certifications?
kykrilka [37]

Answer:

It is The National Institute for Automotive Service Excellence.

Explanation:

8 0
3 years ago
Read 2 more answers
SecOps focuses on integrating the need for the development team to provide iterative and rapid improvements to system functional
IRINA_888 [86]

Answer: (B) <em>False</em>

Explanation:

SecOps also known as the Security Operations is referred to as a collaborative or combined effort between Information Technology security and the operations teams that tend to integrate technology, tools, and processes in order to meet the collective aim goals and aim of keeping an organization and enterprise secure while on the other hand reducing risk and also improving organizations agility.

5 0
3 years ago
What are the two reasons we analyze algorithims
fredd [130]

The reason for analyzing an algorithm is to discover its characteristics in order to evaluate its suitability for various applications are compared with other algorithms for the same application

4 0
3 years ago
What was the history of technology since the 1980s to now and how is it used in classrooms?.?. PLEASE HELP
levacccp [35]

Answer:

Please check the explanation.

Explanation:

The US education department mentioned that in 1900 there were only 10% of students enrolled in the schools, however by the end of 1992, the percentage increased by 85% and it became 95%. In 1930 1 million students were enrolled in university. And by 2012, it became 21.6 million. The teachers began to follow a new type of teaching, and the academics began to follow a special method for communique, education as well as for helping the students understand the concepts.

Though, after the 1980s the personal computer came into being in schools and colleges. Since then numerous versions of PC have originated in the marketplace as well as mobiles tracked by Smartphones, and now nearly 100% of people in the US have smartphones. Virtual reality, augmented reality, AI, Machine learning. etc. has cemented the way for the virtual classrooms. Also, each subject is now up with fruits and not just-food. The consequence is such a delightful setup of the Virtual schoolrooms in the entire US, and all over the ecosphere. The projectors, VR devices, AI applications for education, online classroom facility, Electronic version of chalkboards, and in fact everything is no sophisticated, and it is making not only teaching easy but learning as well. And the result is, students are ending up with better results, and teachers seem to be happier and more relaxed. And that is making school management satisfied as well.

3 0
4 years ago
Consider a situation where we have a file shared between many people.  If one of the people tries editing the file, no other pe
Sergeu [11.5K]

Explanation:

I am a collection of this process from Trash on the computer system and the program that included a new twist on the computer and the skin that appears after loading and the Windows operating system it was much that appear on identifying long horizontal bar at the bottom of the screen and water pollution and its control car parts of the computer with enough letters and adware if for the collection of the fat calculation in the complete committee that in the water method is a product of a screensaver been disciplined displayed at the subject of the right click an icon To Number Sau new file getting opened on you can getting opened on a forgiving of an operational effectiveness of the program is a false false false

7 0
3 years ago
Other questions:
  • What view and zoom setting do you need for true WYSIWYG display? Why?
    14·1 answer
  • The Internet of Things (IoT) is a concept with emphasis on machine-to-machine communications to describe a more complex system t
    10·1 answer
  • For selection purposes, it is critical that application items have a proven relationship between a selection device and some rel
    5·1 answer
  • Write a program that will find the smallest, largest, and average values in a collection of N numbers. Get the value of N before
    13·1 answer
  • You are driving on expressway with three lanes in your direction at a speed lower then
    8·2 answers
  • Your it department enforces the use of 128-bit encryption on all company transmissions. your department also protects the compan
    13·1 answer
  • What values can represent a bit
    8·1 answer
  • Most significant effect the rotary press had on printing
    9·1 answer
  • How much weight does a headgear need to carry
    9·1 answer
  • What is the purpose of application software policies? Check all that apply.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!