1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11111nata11111 [884]
2 years ago
15

What is the difference between a syntax error and a logical error?

Computers and Technology
1 answer:
RoseWind [281]2 years ago
5 0
A syntax error can be a simple mistake as a typo or an extra space. A logical error has to do with the code structure, and if it makes sense.

Hope this helps!
You might be interested in
Olivia wants to add buttons and clickable features to her website. Which language should she use?
Feliz [49]

B. HTML. I hope this helps!!!

8 0
3 years ago
Read 2 more answers
The benefits for a cad proram is: (points : 2) 1 accuracy 2 repeatability 3 simplicity 4 all of the above
NARA [144]
<span>ALL OF THE ABOVE. The benefits for a CAD program is accuracy, repeatability, simplicity.</span>
4 0
2 years ago
Which of these port transmits digital video
DaniilM [7]

Answer:

uhm

Explanation:

theres nothing there

7 0
2 years ago
Read 2 more answers
How do you handle sensitive data?
arlik [135]

  1. <em>Take stock. Know what personal information you have in your files and on your computers.</em>
  2. <em>Scale down. Keep only what you need for your business.</em>
  3. <em>Lock it. Protect the information that you keep.</em>
  4. <em>Pitch it. Properly dispose of what you no longer need.</em>
  5. <em>plan </em><em>ahead</em>

<em>hope </em><em>it</em><em> helps</em>

7 0
2 years ago
Which two statements describe benefits of a block-based coding language
gladu [14]
Answer D and B I think
8 0
2 years ago
Read 2 more answers
Other questions:
  • AMSCO networks plans to conduct a poll of viewers during the SuperBowl. They will conduct analysis to determine which area of th
    6·2 answers
  • Tell me the shortcut keys used in Ms PowerPoint ?​
    6·2 answers
  • A(n) __________ employs a method called "tunneling" in which each packet from the sending computer is encapsulated within anothe
    8·1 answer
  • . One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is t
    11·1 answer
  • A nonpipelined system takes 300ns to process a task. The same task can be processed in a 5-segment pipeline with a clock cycle o
    10·1 answer
  • Which of the following is a good precaution to take when making online purchases? (1 point)
    15·1 answer
  • While your hands are on home row, your left hand rests lightly on _____.
    13·2 answers
  • What does the following process describe?
    10·1 answer
  • Why isn't image display working on wacom tablet.
    8·1 answer
  • GIVING BRAINLIEST
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!