1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir79 [104]
3 years ago
9

When ____ occur during preliminary debugging, dummy print statements—statements that are temporarily inserted into the code to d

isplay status information on the screen—can be used to help locate the error.
Computers and Technology
1 answer:
ANEK [815]3 years ago
4 0

Answer:

Logic error.

Explanation:

When a logic error occurs sometimes it becomes difficult to locate the error in the code.So to locate the error dummy print used to see which loop,if,else,switch case etc. is executing or not.

for example:-

for(int i=0;i<45;i++)

{

if(i!=1)

{

   continue;

}

cout<<i<<endl;

}

we wanted the loop to print all value of i except 1 but it is printing only 1.We can use dummy print statement for this code in if condition.for(int i=0;i<45;i++)

{cout<<"Loop"<<endl;

if(i!=1)

{

cout<<"Printing"<<endl;

   continue;

}

cout<<i<<endl;

}

We see that the loop is printed 45 times and printing 44 times.We found that the condition in if statement is wrong.It hould be '==' instead of '!='.

You might be interested in
Explain paragraph layout
S_A_V [24]

Answer:

introduction, body, resolution/conclusion.

3 0
3 years ago
What does coding mean​
NeTakaya
The process or activity of writing computer programs.
3 0
3 years ago
Read 2 more answers
As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in
Nataliya [291]

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
6 0
3 years ago
How do you print black and white on the ink Canon Pixma/TS3122?
Paha777 [63]

Answer:

If this printer can connect to a device wirelessly, then you can configure it through our mobile device. If not , try to click either the button above the yellow lights or below and see if that works.

5 0
3 years ago
Lisa is modifying a spreadsheet. Which view enables her to see how her changes will look when she prints the spreadsheet?
emmainna [20.7K]
The page layout view

The page layout view is useful for printing spreadsheets. It lets you review what you print and enables you to get a nice feel of the page when it is printed. All of the functions of the standard view are enabled and a few extra tools like ruler and header and footer fields that help achieve an awesome finish to your page.

 



5 0
4 years ago
Read 2 more answers
Other questions:
  • According to the article words have the power to change people's behavior. Describe one example of this from the article
    6·1 answer
  • When is the bond between the actin and myosin head is broken? when an ATP molecule binds to the myosin head when an ATP molecule
    6·1 answer
  • Add the following binary numbers. 101110010 and 111001101
    13·1 answer
  • Write an HLA Assembly language program that prompts for a specific int8 value named n and then displays a repeated digit pattern
    14·1 answer
  • The most common layout of keys on the keyboard is the _____ keyboard.
    5·2 answers
  • Please help I don’t know
    5·1 answer
  • Which of the four digital-to-analog conversion techniques (ASK, FSK, PSK or QAM) is the most susceptible to noise? Defend your a
    11·1 answer
  • What is the general term for programs used to operate a computer
    15·1 answer
  • The \t and \n are examples of one of Python's escape characters.<br><br> A. True<br> B. False
    11·1 answer
  • What version of bluetooth is installed on the yaesu ft-5dr?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!