1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
3 years ago
12

Which entry by the user will cause the program to halt with an error statement?

Computers and Technology
2 answers:
kicyunya [14]3 years ago
6 0

Answer:

A

Explanation:

ivanzaharov [21]3 years ago
6 0
Answer is A just going to say
You might be interested in
Suppose that the five measured SampleRTT values are 106 ms, 120 ms, 140 ms, 90 ms, and 115 ms.
jeyben [28]

Answer:

a) 100.75,   103.15,    107.756,    105.536,   106.72

b) 5.06,    8,       14.061,       14.43,    12.89

Explanation:

Measured sample RTT values : 106 ms, 120 ms, 140 ms,  90 ms,  115 ms

First estimated RTT value = 100 ms

∝ = 0.125

β = 0.25

First DevRTT value = 5 ms

<u>A)   Compute the EstimatedRTT after each of these SampleRTT values is obtained,</u>

Formula for estimated RTT = ( 1 - ∝ ) . estimated RTT + ∝.sample RTT

B). <u>Compute  the DevRTT after each sample is obtained,</u>

Formula for DevRTT = ( 1 - β ) . DevRTT + β. | sample RTT - Estimated RTT |

attached below is a detailed solution

5 0
3 years ago
Battery maker Duracell introduced a new product called the Duracell Powermat, which is a wireless charging pad for mobile device
lapo4ka [179]

Answer:

<em>Brand Extension </em>

Explanation:

Brand extension is using a brand name for a new product or class of product or service.

A brand extension takes advantage of a well-known product's prestige and success to start a new product.

There must be a logical link between the original product and the new item to be effective. The opposite effect, product dilution, may result from a weak or non-existent relationship.

7 0
4 years ago
Consider the following code segment:
Leni [432]

The code segment is an illustration of loops and arrays

<h3>What is a loop?</h3>

A loop is a program statement used to perform repetitive operations

<h3>What is an array?</h3>

An array is a variable used to hold multiple values

<h3>How to analyze the program?</h3>

The loop of the program adds the index 0 elements of the first and the second row of the 2-dimensional array.

From the program, the numbers to add are 1 and 100

The sum of 1 and 100 is 101

Hence, 101 will be displayed when the code segment is executed

Read more about code segments at:

brainly.com/question/26683418

7 0
2 years ago
Mecanismo que permite conocer si la persona que esta ingresando a un sistema es realmente quien deba y no un intruso
Tems11 [23]

Answer:

Sistemas de autenticación y seguridad de la información.

Explicación:

La seguridad de la información es un mecanismo que permite saber si la persona que está ingresando a un sistema es realmente quien debería y no un intruso. La seguridad de la información básicamente ayuda a prevenir el acceso no autorizado y permite que la única persona autorizada ingrese al sistema. Los sistemas de autenticación son el mecanismo de seguridad que se utiliza para proteger los datos y los sistemas. Estos sistemas de autenticación también ayudan a garantizar que los usuarios sean la persona autorizada o no.

4 0
3 years ago
Under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy. A given bank has just implemented its online banki
d1i1m1o1n [39]

Answer:

System/Application Domain and LAN-to-WAN Domain.

Explanation:

The Gramm-Leach-Bliley-Act is also referred to as the Financial Services Modernization Act of 1999. It was enacted by the 106th Congress of the United States of America and it requires that financial institutions explain to their customers the information sharing policies and ensure that customer sensitive data (privacy) is safeguarded.

This, under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy.

In this scenario, a given bank has just implemented its online banking solution that allows customers to access their accounts and perform transactions via their computers or personal digital assistant (PDA) devices.

Hence, online banking servers and their public Internet hosting would fall within the System/Application Domain and LAN-to-WAN Domain.

In an IT infrastructure, there are seven main domains and these are the: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application.

3 0
3 years ago
Other questions:
  • What commands will reset a network interface in Linux?
    13·1 answer
  • Maggie is preparing a document.she wants to open the help menu to sort out a formatting problem.which key should she press to op
    15·2 answers
  • Create a DisplayBox application that prompts the user for a height and width and then displays a box of that size. The DisplayBo
    8·1 answer
  • When you tap or click the ____ button for a selected graphic, Word provides options for changing how a graphic is positioned wit
    5·1 answer
  • To adjust the margins on a page, users will navigate to the _____ tab.
    13·2 answers
  • Which should be your first choice for the most efficient and successful job search method?
    10·1 answer
  • You must _____ the recording of the macro when you have completed the tasks it was designed to do
    10·1 answer
  • What do GUI use except​
    10·1 answer
  • Which of the following is not a valid C language<br>int​
    6·1 answer
  • I know nothing abt computers
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!