1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
avanturin [10]
3 years ago
14

Which best describes a computer bug? A piece of computer hardware that is out of date or has a newer version a piece of computer

software containing defects that prevent a program from running properly a piece of computer hardware that is being used improperly a piece of computer software that is out of date or has a newer version
Computers and Technology
2 answers:
Marrrta [24]3 years ago
6 0

Answer:

When a program does not behave as expected because the programmer made incorrect assumptions.

Explanation:

Anastasy [175]3 years ago
3 0

Answer:

a piece of computer software containing defects that prevent a program from running properly

Explanation:

.

You might be interested in
In the INSERT statement that follows, assume that all of the table and column names are spelled correctly, that none of the colu
Firlakuza [10]

Answer:

The number of items in the column list doesn't match the number in the VALUES list.

Explanation:

The statement is:

INSERT INTO InvoiceCopy

(VendorID, InvoiceNumber, InvoiceTotal, PaymentTotal, CreditTotal,

TermsID, InvoiceDate, InvoiceDueDate)

VALUES

(97, '456789', 8344.50, 0, 0, 1, '2016-08-01');

As clearly seen, there are 8 number of items (VendorID, InvoiceNumber, InvoiceTotal, PaymentTotal, CreditTotal,  TermsID, InvoiceDate, InvoiceDueDate) but there are only 7 items in the values list.

Assuming the conditions given are true, it is seen the number of items in the column list does not match that of the values list, which identifies as a fault.

5 0
3 years ago
You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not su
Semenov [28]

Answer:

b) TKIP encryption,e) Preshared key

Explanation:

The parameters that need to be configured on the laptop include the Temporal Key Integrity Protocol (TKIP) and the Preshared key. TKIP is an older wireless protocol that encrypts data at bit level. It is less secure as compared to the Advanced Encryption Standard (AES), AES works well with WPA2 which is not supported by the access point. The preshared key is the access password used on a shared secure channel. It is also used to validate users on the WiFi network. Once the two parameters are configured the laptop will have access to the network

3 0
3 years ago
Your team has been asked to design a LAN for a very successful CPA firm with five departments in one building and a total of 560
ziro4ka [17]

Answer:

Please find in attachment.

Explanation:

The details in attachment are self explanatory.

Download docx
5 0
3 years ago
Explain synchronized plug firing.
eimsori [14]
HEY THERE!!

In a camera, flash synchronization is defined as synchronizing the firing of a photographic flash with the opening of the shutter admitting light to photographic film or electronic image sensor. It is often shortened to flash sync  or flash synch.


HOPE IT HELPS
6 0
3 years ago
You received a call from a user who brought her own device to the office but cannot find or connect to the company WLAN. The lap
nignag [31]

Answer:

d. Company WAP has SSID broadcast disable

Explanation:

The most likely reason the user cannot find the company WLAN from her own device is that company WAP has SSID broadcast disable.

8 0
4 years ago
Other questions:
  • Which of the following technologies uses the results of a scientific discovery?
    10·2 answers
  • Which tab is used to edit objects on the slide master and layouts
    10·1 answer
  • Please help!
    15·1 answer
  • Date Class Constructor – assigns fields to appropriate formal parameter – using the setters so error checking will occur. The co
    6·1 answer
  • What of the following is not a benefit of active listening
    8·2 answers
  • Another area where the Internet and the Web have had a huge influence is the workplace environment. How different do you think i
    15·1 answer
  • Design a base class, Road, with the following members:
    13·1 answer
  • Give two examples of situations or applications where electrical circuits are used.
    15·1 answer
  • What is the answer <br> Answer 1<br> Answer 2<br> Answer 3<br> Answer 4
    13·2 answers
  • What was the strategy the company adopted for ERP implementation?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!