1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mars2501 [29]
4 years ago
14

When you compile your program, the compiler identifies the logic errors and suggests how to correct them?

Computers and Technology
1 answer:
Rainbow [258]4 years ago
6 0
Nope. You're on your own to find them and fix them. This why testing is so important, otherwise they won't show up until the customer finds them and that's embarrasing.
You might be interested in
Multiple client switches and routers have been set up at a small military base. The network team decided to implement Terminal A
Vikentia [17]

Answer:

a. device administration

Explanation:

Device Administration is a powerful API feature on the Android framework which was first introduced in Android version 2.2. It offers some features at the system level that enables some other key features such as the storage on a device, remotely wiping or enforcing password policies.

It is also utilized in uninstalling your application from the device or to capture a picture by the use of camera when screen is lock.

7 0
3 years ago
A block signature indicating that a text message was typed on a mobile device is an example of ____________.
Katarina [22]

A block signature indicating that a text message was typed on a mobile device is an example of  <u>impression management</u>.

The correct option is A.

<h3>What is  impression management?</h3>

Impression management is a conscious or unconscious process whereby individuals strive to regulate and control information in social interactions in order to affect how others perceive a person, an item, or an event.

<h3>What is the main goal of impression management?</h3>

The actions people take to influence others' perceptions of a notion are referred to as impression management. Depending on their objectives, people can work to reinforce existing beliefs or make an effort to change them.

<h3>What is block signature?</h3>

A signature block is the text that surrounds a signature and offers context for the signature as well as additional details. An email message, Usenet article, or forum post's signature block is a customized block of text that is automatically attached at the bottom of these types of documents.

To know more about  block signature visit:

brainly.com/question/2123747

#SPJ4

I understand that the question you are looking for is :

A block signature indicating that a text message was typed on a mobile device is an example of ____________.

A. impression management

B. convergence

C. evaluative language

D .pragmatic rules

6 0
2 years ago
Analyzing an algorithm with Big O notation is useful for predicting:_______.
seropon [69]

Answer:

C. The performance of the algorithm as different amounts of inputs are processed

Explanation:

Analyzing an algorithm with Big O notation is useful for predicting:

The performance of the algorithm as different amounts of inputs are processed

7 0
3 years ago
User defined blocks of code can be created in
lys-0071 [83]
D....................
8 0
3 years ago
1. In the space below, explain how the Table Tools can be accessed in Word.
Dvinal [7]

Answer:

Creating a Table

1) Click the Insert tab on the Ribbon

2) Click on Table

3) Highlight the number of columns and rows you’d like

OR

4) Click Insert Table

5) Click the arrows to select the desired number of columns

6) Click the arrows to select the desired number of rows

7) Click OK

3 0
3 years ago
Other questions:
  • After a break, always review your work to
    12·2 answers
  • What happens when you click the house icon on the right side of the screen?
    7·1 answer
  • Write a program that converts or calculates values. Use the following guidelines to write your program:
    8·1 answer
  • What is the generic term for a mode or method of malware infection?
    8·1 answer
  • How does video conferencing change the way we work today?
    6·1 answer
  • Individuals who break into computer systems with the intention of doing damage are called​ _____________.
    5·1 answer
  • Select three physical forms of storage. USB drive Primary cache Magnetic storage Secondary cache Dynamic RAM Optical drive
    7·2 answers
  • Gina, an IT professional, noticed that the servers were running very slowly. She evaluated the system and made a recommendation
    9·2 answers
  • To print photographs in color.​
    7·1 answer
  • Which display technology was developed by apple, produces vibrant colors, and supports viewing from all angles?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!