1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blsea [12.9K]
3 years ago
6

You designed a program to create a username using the first three letters from the first name and the first four letters of the

last name. Usernames cannot have spaces. You are testing your program with a user whose name is Jo Wen. What step in the program plan do you need to revisit
Computers and Technology
1 answer:
Pavel [41]3 years ago
7 0

Answer:

See Explanation

Explanation:

The question would be best answered if there are options to select from; since none is provided, I will provide a general explanation.

From the question, we understand that, you are to test for Jo Wen.

Testing your program with this name will crash the program, because Jo has 2 letters (3 letters are required), and Wen has 3 letters (4 letters are required)

So, the step that needs to be revisited is when the username is generated.

Since the person's name cannot be changed and such person will not be prevented from registering on the platform, you need to create a dynamic process that handles names whose lengths are not up to the required length.

You might be interested in
Which two statements describe the Functions of a modem
cupoosta [38]

Answer:

A modem is the internal or external device its function is to transfer data over communication lines

modems use two different types of data transmission

synchronous and asynchronous

The functions of modem have changed over years it was first used for telegrams and to transmit data in 1950s.

Modems were used with computers in  1977 for first time to transmit data between computers  firstly it was used for small amount of computers

As modem improves day by day and were able to transmit information fastly between two or more hosts and the internet network slowly spreads

There are four types of modems ,

1 Fax Modems which solely transfer data between fax machines

2 The traditional ISDN modem

3 the Digital Subscribers Line

4 the Cable Modem

Explanation:

3 0
3 years ago
Online banking tools allow you to pay bills from your computer. <br> a. True<br> b. False
Vaselesa [24]
On your online bank you can add bills from your computer. 
5 0
3 years ago
Read 2 more answers
In terms of salary and wages, an applicant should:
Roman55 [17]
Address the issue to the employer after being hired.
7 0
4 years ago
Which of the following team members are involved in transporting goods directly to customers?
olganol [36]

Answer:

Dave is a regular shopper at Colric Inc., an online company that sells T-shirts. He placed an order for five T-shirts, however when the order arrived, Dave discovered the T-shirts were defective. He returned the order and requested replacements from Colric. This scenario shows an exception to which aspect of a supply chain?

3 0
3 years ago
Is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the com
antoniya [11.8K]
Yes there are such programs/viruses.

5 0
4 years ago
Other questions:
  • An engineer is assigned the task of reducing the air pollutants being released from a power plant that generates electricity by
    9·1 answer
  • What is the keyboard command that allows you to copy text
    12·2 answers
  • How do you turn off the mic in Google?!?!?!?
    11·1 answer
  • Select the correct answer from each drop-down menu.
    8·1 answer
  • What is a different paragph formatting tools
    6·1 answer
  • Why does world of tanks keep downloading when I'm not even at the computer
    9·1 answer
  • An attacker has obtained the user ID and password of a data center's backup operator and has gained access to a production syste
    12·1 answer
  • Having one password for all accounts is an easy way to remember passwords, but it will expose you to what risk?
    15·1 answer
  • 8.7 lesson practice question 1
    13·1 answer
  • what is required to successfully establish a connection between two routers using chap authentication?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!