1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
3 years ago
15

List the difference between GIGO and bug ​

Computers and Technology
1 answer:
Leni [432]3 years ago
3 0

Answer:

A bug happens when a tool does not do what it should do. For example, the famous Y2K bug had the potential of showing the wrong time. GIGO, which stands for Garbage In Garbage Out, is a different situation in which the tool performs what it should do but it is applied in a place that does not make sense.

Explanation:

When test engineer find any error in the application they called it as bug. Bug is informal name to Defect which is flaws or misatkes in the Code or Design. Error is any mistake done by the user while using the Apllication or Software. Failure due to any error or defect if the software will not work properly .

You might be interested in
A slide can have which of the following?
Margarita [4]

Answer:

D all of them mofos

Explanation:

7 0
3 years ago
Unused neural connections in the brain are reduced through a process of
OLEGan [10]

Answer:

Pruning or remodeling

Explanation:

The brain is the major control system of animals. It acts just like the processor in a computer system. Brain development starts before childbirth and progresses to adulthood.

During the first few year of life, the neural and synapse connection multiply by millions, when the brain is mature enough, the brain begins to cut off connections of synapses, neurons and axons that are not used through the process called pruning or remodeling, which is very vital for brain development.

6 0
3 years ago
Write a program that calculates and displays a person’s body mass index (BMI). The BMI is often used to determine whether a pers
GuDViN [60]

Answer:

<em>This program is written using C++</em>

<em>Comments are used to explain difficult lines</em>

<em>Program starts here</em>

#include<iostream>

using namespace std;

int main()

{

//Declare variables

float BMI, Height,Weight;

// Prompt user for inputs

cout<<"Ener Height (in inches): ";

cin>>Height;

cout<<"Enter Weight (in pounds): ";

cin>>Weight;

//Calculate BMI

BMI = (Weight * 703)/(Height * Height);

cout<<"Your Body Mass Index (BMI) is "<<BMI<<endl;

//Test and print whether user is underweight, overweight or optimal

if(BMI>=18.5&&BMI<=25)

{

 cout<<"You have an optimal weight";

}

else if(BMI<18.5)

{

 cout<<"You are underweight";

}

else if(BMI>25)

{

 cout<<"You are overweight";

}  

return 0;

 

}

<em>See attachment for .cpp source file</em>

Download cpp
6 0
3 years ago
(2-2) In relatives.pl file, write and add the following rule. ancestor(X, Y) : X is an ancestor of Y Run ancestor(brown, X). Sub
alukav5142 [94]

Answer:

Check the explanation

Explanation:

relatives.pl

/* Facts */

male(ace).

male(john).

male(jack).

male(bill).

male(david).

male(brown).

male(daniel).

female(cecil).

female(aba).

female(cathy).

parent(john,ace)

parent(tom,john)

parent(jack,john)

parent(bill,aba)

parent(brown,aba)

parent(cecil,bill)

parent(david,cecil)

parent(cathy,brown)

parent(daniel,cathy)

parent(ellen,daniel)

/* parent(X,Y) -> Y is parent of X */

wife(ceceil,jack) /* wife(X,Y) -> Y is wife of X */

Answer of 2-2

Considering all facts and rules answer will be daniel,ellen.

Answer 2-3

Considering all facts and rules answer will be bill.

Answer 2-4

Considering all facts and rules X will be john and y will be cecil.

Answer 2-5

Considering all facts and rules X will be tom and y will be david.

4 0
3 years ago
Describe three ways to protect the computer and all peripheral devices from damage
omeli [17]

Here are three ways:

Cleaning: as applied to most things in our lives, cleaning also applies to protecting peripheral devices. To ensure the smooth running of such devices one needs to clean the dust and dirt from these devices once in a while. Make sure you disconnect the device before you eject it from the system.<span>

Follow instructions: Most devices come with a safety guide and instructions manual, always use the recommended settings for the smooth running of your system. These recommendations usually come from the manufacturer and are reliable.

<span>Surge suppressor/protector: One of the major issues faced by the users is faults caused by power surges. One needs to make sure to use a Surge Suppressor/Protector connected with the system to make sure it will not damaged with power fluctuations. </span></span>

3 0
4 years ago
Other questions:
  • Which piece of information is most useful to an identity thief? *
    6·1 answer
  • A(n) ____ is a primary key that consists of a column that uniquely identifies an entity, such as a person's social security numb
    14·1 answer
  • The rectangular marquee tool can select an area to be used as a pattern?<br> True<br> False
    5·1 answer
  • Can I get some help thank you
    8·2 answers
  • What is the answer to in Microsoft Word you can access the blank from the command command from the mini toolbar what is the corr
    10·2 answers
  • Algorithms for solving perimeter of a rectangle
    12·1 answer
  • The attacker sent data that was able to manipulate the return address that is reserved to store expected data
    5·1 answer
  • Given the following word addresses: 3, 180, 43, 2,191, 88, 190, 14, 181, 44, 186, 253
    15·1 answer
  • What is computer system ?​
    9·2 answers
  • Which two extensions in scratch are correctly matched to their accessibility goals
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!