1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rodikova [14]
3 years ago
7

Describe in detail what each step would look like if you ran into a software error.

Computers and Technology
1 answer:
denis23 [38]3 years ago
7 0

Answer:

First you have to identify the problem.

Second Gather information.

Third iterate through potential solutions.

Fourth Test your solution.

Explanation:

There are many different ways to handle errors in software but this is the way I do it.

Hope this helps :)

You might be interested in
Suppose you were assigned to develop a logical model of the registration system at a school or college. Would you be better off
BaLLatris [955]

Answer:

top down approach

Explanation:

Top down approach is process of breaking down system into sub-system which helps in formulating the overall system. At the end every sub system can be refined with more details.

While bottom up approach is process of gathering systems to design large complex system.

Top down is better as basic information is present and resources can be utilized effectively without impacting maintennance and operations.

6 0
3 years ago
A Program is an Algorithm – a set of directions for the computer to follow.<br><br> True<br> False
d1i1m1o1n [39]

Answer:

True

Explanation:

5 0
3 years ago
Give a big-O estimate for the number additions used in this segment of an algorithm.
rjkz [21]
Big-O notation is a way to describe a function that represents the n amount of times a program/function needs to be executed. 

(I'm assuming that := is a typo and you mean just =, by the way) 

In your case, you have two loops, nested within each other, and both loop to n (inclusive, meaning, that you loop for when i or j is equal to n), and both loops iterate by 1 each loop.

This means that both loops will therefore execute an n amount of times. Now, if the loops were NOT nested, our big-O would be O(2n), because 2 loops would run an n amount of times.

HOWEVER, since the j-loop is nested within i-loop, the j-loop executes every time the i-loop <span>ITERATES. 
</span>
As previously mentioned, for every i-loop, there would be an n amount of executions. So if the i-loop is called an n amount of times by the j loop (which executes n times), the big-O notation would be O(n*n), or O(n^2). 

(tl;dr) In basic, it is O(n^2) because the loops are nested, meaning that the i-loop would be called n times, and for each iteration, it would call the j-loop n times, resulting in n*n runs.

A way to verify this is to write and test program the above. I sometimes find it easier to wrap my head around concepts after testing them myself.
3 0
4 years ago
Linux implements _________ to determine how a user is to be authenticated and whether there are password policies associated wit
ira [324]

Answer:

Pluggable authentication modules (PAM).

Explanation:

These are schemes that are seen to be used in API authentication. It is relyed on to provide high authentification protocool in any correct form it is seen to be in use. also its ability to grant access to each other within two people interface are reasons big user clients refer to it in most of their policies that deals with their working system passwords and their database passwords to most of their files. This is why the company in the context which is a big firm rely on it for its services.

6 0
3 years ago
Select the first ICMP Echo Request message sent by your computer, and expand the Internet Protocol part of the packet in the pac
Luba_88 [7]

Answer:

You have to do that on your computer not someone elses....

Explanation: you have to do it

6 0
3 years ago
Other questions:
  • What computer system was the first to run the unix operating system?
    11·1 answer
  • When public relations professionals make provocative statements in newsgroups to get people to visit an organization's website o
    10·1 answer
  • Which type of computer operating system would be best for a large corporation?
    7·2 answers
  • What is one way to improve the upward flow of information?
    12·1 answer
  • A working model of a new product for testing purposes.
    15·1 answer
  • Which programming language uses objects?<br> O C++<br> O ALGOL<br> O Pascal<br> O BASIC
    14·2 answers
  • Sarah has to add a picture from her computer file and add a caption to it. Arrange the steps in a correct sequence.
    15·1 answer
  • Attach 2 screen shots demonstrating an understanding of file management tools, such as keyboard shortcuts, copy, paste, delete,
    8·1 answer
  • What is the purpose of application software policies? Check all that apply.
    9·1 answer
  • I was just called a man in a wig ugh <br><br> Any tips for doxxing someone?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!