1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
3 years ago
12

Which entry by the user will cause the program to halt with an error statement?

Computers and Technology
2 answers:
kicyunya [14]3 years ago
6 0

Answer:

A

Explanation:

ivanzaharov [21]3 years ago
6 0
Answer is A just going to say
You might be interested in
To access documents stored on a "cloud", you'll
gregori [183]

Answer:

B

Explanation:

5 0
3 years ago
During the data transmission there are chances that the data bits in the frame might get corrupted. This will require the sender
pashok25 [27]

1. Based on Scenario A, the packets should be encapsulated in multiple frames to minimize the re-transmission overhead.

This is because there will be the need to re-transmit the packets because the network environment is not reliable and accurate.  Therefore, a single frame may be too costly when the need for re-transmission arises.

2. Based on Scenario B, the packets should be encapsulated in a single frame because of the high level of network reliability and accuracy.  

There will not be further need to re-transmit the packets in a highly reliable and accurate network environment.  This environment makes a single frame better.

Encapsulation involves the process of wrapping code and data together within a class so that data is protected and access to code is restricted.

With encapsulation, each layer:

  • provides a service to the layer above it
  • communicates with a corresponding receiving node

Thus, in a reliable and accurate network environment, single frames should be used to enhance transmission and minimize re-transmission overhead.

Learn more about data encapsulation here: brainly.com/question/23382725

5 0
3 years ago
Is Using programming libraries is one way of incorporating existing code into new programs true
postnew [5]

Yes, Using programming libraries is one way of incorporating existing code into new programs  is a true statement.

<h3>What function do libraries provide in programming?</h3>

Programming libraries are helpful resources that can speed up the work of a web developer. They offer prewritten, reuseable portions of code so that programmers can easily and quickly create apps. Consider building a program that enables users to enroll in and pay for courses.

Therefore, Using a code library often saves developers from having to create everything from scratch. It can take less time to develop projects and have more reliable software if the catalog of programming resources is kept up well.

Learn more about libraries from

brainly.com/question/17960151
#SPJ1

6 0
2 years ago
For a parking payment app, what option would MOST likely connect a user to a third party/external gateway?
Alik [6]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Almost all app that is doing online business integrated third party payment gateway and login/services. But some apps, don't integrate the third party login/signin services such as go ogle or face book login/sign in services.

But in the context of this question, for a parking payment app, upon reservation of parking space, the pay option connects a user to a third party/external gateway. This gateway will accept payment from the user and upon confirmation of payment, the parking space will get reserved.

so the correct option to this question is:

  • Pay

While the other options are incorrect because:

The sign-in option does not connect the user to a third pay/gateway in case if the app has self-registration and sign-in functionality. Rate and Time remaining are features of the app that does not force the user to connect third-party gateway.

3 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
Other questions:
  • What type of devices are a keyboard and a mouse?
    7·1 answer
  • Which acronym describes technology in which all or most of a deviceâs electronic circuitry is on a single microchip?
    12·1 answer
  • Describe the objectives of e-commerce?​
    13·1 answer
  • URGENT!! Which graphic design tools help you draw circles and rectangles?
    12·2 answers
  • What function should be entered into B7 to calculate the total budget
    15·2 answers
  • tls Explain in your own words how, by applying both asymmetric and symmetric encryption, your browser uses TLS to protect the pr
    8·1 answer
  • How do i make a comment on brainly?
    15·1 answer
  • Device driver issues can come up if you . If this happens, .
    11·1 answer
  • I<br> What is a Watermark?
    9·2 answers
  • Why would a business consider using virtual machines?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!