1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
skelet666 [1.2K]
3 years ago
11

Kerry is debugging a program. She identifies a line of code to begin execution and a line of code to end execution so that she i

s only running part of the computer program. Which is she using
Computers and Technology
1 answer:
Serhud [2]3 years ago
8 0

Answer:

breakpoints.

Explanation:

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Debugging and maintenance.

In this scenario, Kerry is debugging a program and identifies a line of code to begin execution and another line of code to end execution so that she is only running part of the computer program. Thus, Kerry is using breakpoints.

Basically, one of the fundamental debugging techniques used by software developers and programmers are breakpoints. They are generally set at any point where a pause debug-ger execution or an execution of a code is required based on certain conditions.

At every breakpoint address, a debug-ger temporarily stores a set of instruction and overwrites it with another special instruction.

You might be interested in
What does the term measure refer to in typography
olchik [2.2K]

You're right, the correct answer is C.


6 0
3 years ago
Read 2 more answers
Is windows CUI operating system??<br><br><br>What is the main purpose of folder ????<br><br><br>​
Likurg_2 [28]
Answer: yes and main purpose of folder can help in storing and organizing files and data in the computer.

Hope this helped!
8 0
3 years ago
1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
puteri [66]

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

6 0
3 years ago
HURRY MY COMPUTER IS ABOUT TO DIE ILL GIVE BRAINLYESTn
loris [4]

Answer: D, C, E, are the answers! good luck.

Explanation:

5 0
3 years ago
We assume that ABC Corporation has two business offices. These offices are in the cities of Orlando and Miami. These cities are
murzikaleks [220]

Answer:

The following are the answer to the given points:

Explanation:

In point (a):

Calculating the long-distance call cost:

= 4 \times 5 \times 0.40 \\= 20 \times 0.40\\= 8

Calculating the local call cost:

= 10 \times 3  \times 0.05\\ = 30 \times 0.05\\= 1.5

Calculating the overall cost of PSTN:

= 25 + (4 \times 5 \times 0.40) + (10 \times 3 \times 0.05) + 2000 + 275 \\= 25 + 8 + 1.5 + 2000 + 275 \\=   2309.5

In point (b):

Calculating the call rate per second and the average arrival rate:

\to (\lambda) = 0.2

The call average length:

\to (T_s) = - 8  \\\\ = (8  \times 60) \ seconds \\\\ = 480 \ seconds  

The complete agent number:

\to  (m) = 9

The strength of traffic:

\to u = \lambda \times  T_s  \\\\  =   (0.2  \times 480) \\\\ = 96    

The occupancy of the agent:

\to  p = \frac{u}{m}  \\\\

      = \frac{96}{9}  \\ \\= 10.66  

Calculation of obtained:

= \frac{(\frac{um}{m!})}{(\frac{um}{m!})} + (1-p) \sum {m-1} _{k=0}  \ \frac{uk}{k!}

We get = 0.329 to substitute values.  

In point (c):

The rate of blocking = 5 \%

average call time (T_s) = 480 \ seconds

                                    = 0.05 \times  480 \ seconds \\  = 24 \ second

In point (d):

Calculating the number of link, which is required:  

= \frac{275}{5} \\\\ =55

In point (e):

Calculating the Line Number:

= \frac{275}{5} \\\\ =55

PSTN line number:

=  (\frac{2000}{55}) \\\\ = 36.3636\\\\= 37

In point (f):

The gross design expense = $ 2309. 5

5 0
4 years ago
Other questions:
  • What is heat sink?what is its use?If it is not in the system what will happen?
    12·1 answer
  • How do you make Thumbnails and outros on Youtube for free?
    8·1 answer
  • This statement lets the value of a variable or expression determine where the program will 1. switch 2. select 3. associative 4.
    11·1 answer
  • Psychographics may also be called A. personality analytics. B. social group dynamics. C. lifestyle analysis. D. opinion insight.
    6·1 answer
  • Host to IP address lookup and its reverse lookup option are very important network services for any size network. It is also how
    9·1 answer
  • Write a program that reads a list of integers, and outputs those integers in reverse. The input begins with an integer indicatin
    6·1 answer
  • How can using Prezi software for a presentation allow the presenter to better respond to audience needs?
    10·1 answer
  • Help<br> SOS<br> Quick <br><br><br><br><br> Hurry
    5·1 answer
  • How was kapilvastu named​
    11·1 answer
  • How to resize an image in photoshop without losing quality.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!