1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ExtremeBDS [4]
3 years ago
7

When you ____ an exception, you send a message that an error has occurred to another part of the program.

Computers and Technology
2 answers:
jekas [21]3 years ago
8 0
The correct answer is most definitely B
Dmitriy789 [7]3 years ago
8 0
B detect

When you DETECT an exception.
It’s the only answer that makes sense.

DEFECT means too find :))
You might be interested in
Which describes the safest way to sit at a desk while typing on the computer?
Anna35 [415]

Answer:

Keep the knees and hips at 90-degree angles and the wrists straight.

Explanation:

From computer ergonomics, sitting at a desk and typing can affect the back, cause discomfort and sometimes injury. To protect the back, always sit with the knee and hips positioned at 90 degree while keeping the wrist straight and also position the equipment appropriately to always suite this posture.  

7 0
3 years ago
Write steps of the following operations.<br>a. applying borders and spacing<br>b. create a folder​
slava [35]

Answer:

b

Explanation:

first right click on an empty space

click on new from the pop up menu

finally click on new folder

7 0
3 years ago
An engineer plans to connect three switches (SW1, SW2, and SW3) in a lab. Before connecting the switches, he starts by configuri
g100num [7]

Answer:

c. All use SW3's database because SW3 has the highest revision number.

Explanation:

In this particular configuration, the three switches will definitely be connected to one another by the presence of some path with the specific trunks. As a result, the database with the most revision number will ultimately win. The process of the STP election does not have any influence on the selection of the VTP.

4 0
3 years ago
The steps for moving data from one cell to another are _____.
swat32
The steps for moving data from one cell to another are : 
Select the cell by pointing on the cell clicking it, and dragging it to the new cell. <span>To move a cell or range of cells, point to the border of the selection. When the pointer becomes a move pointer , drag the cell or range of cells to another location.</span>
3 0
3 years ago
(Best Buy Part A) At a Best Buy store, the forecast for the annual demand of a Motorola cell phone is 15600. Demand forecasts ar
Nataly_w [17]

Explanation:

a. The computation of the economic order quantity is shown below:

= \sqrt{\frac{2\times \text{Annual demand}\times \text{Ordering cost}}{\text{Carrying cost}}}

= \sqrt{\frac{2\times \text{\15,600}\times \text{\$400}}{\text{\$5}}}

= 1,580 units

The carrying cost is

= $50 × 10%

= $5

b. The number of orders would be equal to

= Annual demand ÷ economic order quantity

= 15,600 ÷ 1,580

= 9.87 orders

Ordering cost = Number of orders × setup cost per order

= 9.87 orders × $400

= $3,949.37

c. The average inventory would equal to

= Economic order quantity ÷ 2

= 1,580 units ÷ 2

= 790 units

Carrying cost = average inventory × carrying cost per unit

= 790 units × $5

= $3,950

c. Now the total cost

= Setup cost + carrying cost

= $3,949.37 + $3,950

= $7,899.37

8 0
3 years ago
Other questions:
  • 1. Of which of the following is a box an example?
    10·2 answers
  • Joshua is creating his résumé, in which section will he add projects and trainings he was involved in?
    10·1 answer
  • Como puedo poner fondo a mi teclado​
    9·1 answer
  • What is a different paragph formatting tools
    6·1 answer
  • when a page contains function is loaded the browser by passes the function without running it - true or false
    7·1 answer
  • 8. How can you prevent your VMs receiving DHCP server messages from unauthorized virtual machine pretending to be DHCP servers?
    6·1 answer
  • How do you navigate multiple computer screen at one time?
    5·1 answer
  • what is the term for software that is exclusively controlled by a company, and cannot be used or modified without permission?
    6·1 answer
  • What microphone is this
    8·1 answer
  • failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!