1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
juin [17]
3 years ago
11

Sarah is a detail-oriented programmer. While testing her program, what other skill would she have to apply in order to detect al

l bugs?
A.
troubleshooting
B.
business skills
C.
managerial skills
D.
concentration
E.
time management
Computers and Technology
1 answer:
Talja [164]3 years ago
3 0

Answer:

A. troubleshooting

Explanation:

Troubleshooting is the process of trying to detect problems with a software or hardware component so as to apply solutions to it.

Therefore, Sarah would need troubleshooting skills to help her test her program to detect all bugs and fix it.

You might be interested in
Sukant's professor asks her to take over his online class while he is away because she is an effective digital communicator.
Otrada [13]

Answer:

b is the right answer. she posts messages that avoid slang and text language

6 0
2 years ago
Read 2 more answers
bilmain manufactures has recruited you as a network administrator to handle the organization's network operations. you want to s
Art [367]

Since Bilmain manufactures has recruited you as a network administrator to handle the organization's network operations, the subnet mask for this class A address is 255.0.0.0.

<h3>Why is a subnet mask of 255 usually used?</h3>

The 255 address, or host address of all ones in binary notation, is used to send a message to every host on a network. It's important to keep in mind that no host can be given the first or final address in a network or subnet. You ought to be able to assign IP addresses to 254 hosts at this point.

A subnet mask is a 32-bit integer that is produced by setting all host bits to 0 and all network bits to 1. The subnet mask does this by dividing the IP address into network and host addresses. The "0" address is always a network address, but the "255" address is always allocated to a broadcast address.

Hence, The subnet mask for a class C network would be 255.255.255.0, which indicates that 24 bits are being used for the network. This is shown in CIDR notation by adding a /24 after the IP address.

Learn more about subnet mask from

brainly.com/question/28256854
#SPJ1

5 0
1 year ago
The NSA could be hiding small snooping programs in, let's just say, a picture of a cute kitten or a fun Android game." So how ca
grin007 [14]
One way could be to check the code of the program.
But of course this might not be possible... Not everyone knows a programming language. And even if you did, you might not know the programming language they used.

Another way is to download a program that monitors your incoming connections and outgoing connections from your computer/android/iphone.

When someone or something connects to your device, the program should alert you. Or when the computer makes a connection to a website/device.
8 0
3 years ago
Language: C
Vikentia [17]

The .cpp code is avaiable bellow

Code:

#include <stdio.h>

#include <string.h>

int main()

{

    char **kW;

    char *fN;

    int nW = 0;

    kW = malloc(5000 * sizeof(char*));

    for (int i = 0; i<5000; i++)

    {

         kW[i] = (char *)malloc(15);

    }

    fN = (char*)malloc(25);

    int choice;

    while (1)

    {

         printf("1) File text to use as cipher\n");

         printf("2) Make a cipher with the input text file and save result as output file\n");

         printf("3) Decode existing cipher\n");

         printf("4) Exit.\n");

         printf("Enter choice: ");

         scanf("%d", &choice);

         if (choice == 1)

         {

             nW = readFile(kW, fN);

         }

         else if (choice == 2)

         {

             encode(kW, fN, nW);

         }

         else

         {

             Exit();

         }

         printf("\n");

    }

    return 0;

}

int readFile(char** words, char *fN)

{

    FILE *read;

    printf("Enter the name of a cipher text file:");

    scanf("%s", fN);

    read = fopen(fN, "r");

    if (read == NULL)

    {

         puts("Error: Couldn't open file");

         fN = NULL;

         return;

    }

    char line[1000];

    int word = 0;

    while (fgets(line, sizeof line, read) != NULL)

    {

         int i = 0;

         int j = 0;

         while (line[i] != '\0')

         {

             if (line[i] != ' ')

             {

                  if (line[i] >= 65 && line[i] <= 90)

                  {

                       words[word][j] = line[i]; +32;

                  }

                  else

                  {

                       words[word][j] = line[i];

                  }

                  j++;

             }

             else

             {

                  words[word][j] = '\n';

                  j = 0;

                  word++;

             }

             i++;

         }

         words[word][j] = '\n';

         word++;

    }

    return word;

}

void encode(char** words, char *fN, int nwords)

{

    char line[50];

    char result[100];

    if (strcmp(fN, "") == 0)

    {

         nwords = readFile(words, fN);

    }

    getchar();

    printf("Enter a secret message(and press enter): ");

    gets(line);    

    int i = 0, j = 0;

    int w = 0, k = 0;

    while (line[i] != '\0')

    {        

         if (line[i] >= 65 && line[i] <= 90)

         {

             line[i] = line[i] + 32;

         }

         w = 0;

         int found = 0;

         while (w<nwords)

         {

             j = 0;

             while (words[w][j] != '\0')

             {

                  if (line[i] == words[w][j])

                  {

                       printf("%c -> %d,%d \n", line[i], w, j);

                       found = 1;

                       break;

                  }

                  j++;

             }

             if (found == 1)

                  break;

             w++;

         }

         i++;

    }

    result[k] = '\n';

}

void Exit()

{

    exit(0);

}

3 0
3 years ago
what happens to a local variable when a function call completes (and control returns to the calling statement)
Liono4ka [1.6K]

When a function call completes (and control returns to the calling statement) the local variable is undefined.

After the function call is finished, the local variable can be utilized outside of the function at any time. Until the function is called again, a local variable holds onto its value.

While local variables are those that are defined inside a function and have a scope that is specific to that function only, global variables are those that are defined outside of function having global scope.

Local variables are exclusive to a given function and are produced within that function. It cannot be accessed elsewhere other than the function.

Since there are no local variables, the value from the global variables will be used; however, you must ensure that the names of the local and global variables match.

If a variable is modified or created inside of a function but isn't declared a global variable, it is considered local variable.

To learn more about local variable click here:

brainly.com/question/27840441

#SPJ4

7 0
1 year ago
Other questions:
  • What is log in and log out?
    5·1 answer
  • If a user wished to insert a triangle or a callout figure in a document, he or she should select the _____ option.
    8·1 answer
  • 2. How do upgrading and retraining help you cope with change?
    5·1 answer
  • The operating system’s application programming interface (API) provides software developers with tools they use to build applica
    5·1 answer
  • 2. A host computer with an IP address of 172.16.29.155 using a subnet mask of 255.255.255.0 and a gateway of 172.16.29.1 pings a
    7·1 answer
  • give an example of a technical issue you were not able to resolve on your first attempt. What troubleshooting steps did you take
    13·1 answer
  • Write an if statement to test if a number stored in y is between 6 and 10 inclusive.
    12·1 answer
  • Is spin to win paying or is a scam app​
    6·2 answers
  • What is a typical use for a MAN?
    13·1 answer
  • In his article, “How to Publish Without Perishing,” what does James Gleick believe most people do when they really read a book?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!