1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OLEGan [10]
2 years ago
10

Molly claims that she doesn’t have to proofread her code for typos because the interpreter will catch her mistakes for her. Is s

he correct?
A. Yes, the compiler will catch any syntax errors.

B. No, she is responsible for finding all errors herself.

C. Yes, the testing tool will find all errors.

D. Yes, the interpreter will catch any syntax errors.
Computers and Technology
1 answer:
yarga [219]2 years ago
4 0

Answer:

d. Yes, the interpreter will catch any syntax errors.

Explanation:

I just took the quiz and got the answer right, so I figured I'd share it here to help everyone out :3

Have a great day everyone, and keep those grades up!

You might be interested in
A cloud file system (CFS) allows users or applications to directly manipulate files that reside on the cloud.
Mademuasel [1]

Answer:

True is the correct answer for the above question.

Explanation:

A CFS(cloud file system) is used to create a spoke and hub method for the data distribution in which hub is a storage area situated on the central part of the cloud system. It is located in a public cloud provider like AWS.

It uses to manipulate the file for the purpose of data distribution so that it can store the file on the cloud easily with the available some spaces only.

It provides access to the user that they can manipulate the file for their needs if the files are available on the cloud.

The question scenario also states the same which is described above hence It is a true statement.

5 0
3 years ago
Does anyone know how to permanently delete photos on a dell computer? For my cousin.
strojnjashka [21]

Answer: If your trying to get rid of em. The best way to do that is to put them in the recyling bin and then empty it. Doing that will delete them off your computer so they can't be found.

Explanation: Also keep in mind that whether or not you delete them they'll still be on your hard drive.

6 0
2 years ago
You have stumbled on an unknown civilization while sailing around the world. The people, who call themselves Zebronians, do math
marshall27 [118]

Answer:

a. 6 bits

b. 1

Explanation:

Ans (a)

40 Characters need to be represent by binary coded Zebronian (BCZ) , So You will need 6 bits.

5 bits wold only give you 32 = 2 x 2 x 2 x 2 x 2 unique characters.

So 6 bits would allow you to represent 64 characters.

Ans(b)

BCD = Binrary Coded Decimal is very common in electronics, particularly it displays numerical data.

BCD Encodes each digit of a decimal number into 4 digit binary form.

Each decimal digit is indiviidually converted to oits binary equivalent

For Example : 146 , the decimal degits are replaced by 0001 , 0100 and 0110 respectively

Addition

1 0 = 10 is binary value of 2 2

+1 1 = 11 is binary value of 3 + 3

---------- -----------

1 0 1 5 Ans

Subtraction

1 1= binary value of 3 3

- 1 0 = binary value of 2 - 2

--------- -----------

0 1 1 Ans

6 0
3 years ago
Consider the following schema for customer: (id, name, street, city, state, zip, phone), in which customers are uniquely determi
Art [367]

Answer:

Super key is a set of attributes that uniquely identifies all attributes in a relation.Super keys are more than candidate key.

Explanation:

For example in the given schema where

Customer: (id , name , street , city,state,zip,phone)

We have a relation we check super keys by following dependencies

Functional Dependencies                          Super Key

id                                                                     YES

name                                                               YES

id , name -> street , city,state,zip,phone       YES

id , street  ->name , city,state,zip,phone       YES

id,city ->name , street ,state,zip,phone         YES

id,state ->name , street ,city,zip,phone         YES

id,phone  ->name , street ,state,zip,city        YES

id , name , street                                             YES

id , name , street , city                                    YES

id , name , street , city,state                          YES

id , name , street , city,state,zip,phone         YES

All these are uniquely identified

All these are super key but in reverse they are not super key such as

street , city,state,zip,phone->id , name        No

8 0
3 years ago
A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LA
amm1812

Answer:

Option (A) is the right answer.

Explanation:

According to the scenario, the user system is giving the error of invalid certificate while other users on the same network do not report any error, which means that there is some problem in a particular system.

Date and time can also be one of the main cause of this error because wrong date and time creates problem in surfing many websites by giving certificate error.

Hence the most appropriate answer is option (A).

While other option are wrong because of the following reasons:

  • UEFI boot mode is mainly used in booting the operating system and has no connection with network.
  • Logon time is also wrong because if the problem is with the login server, it can not give certificate error.
  • User access control is also not correct because it is used to control the access of the user.
7 0
3 years ago
Other questions:
  • Which is an example of a screenshot?
    7·2 answers
  • What do you call the process of translating statements written by a developer? What is the result of this process?
    6·1 answer
  • How is a technical certificate like a computer-related associate degree?
    12·2 answers
  • What is the other name of the horizontal column graph
    9·1 answer
  • WIRELESS DATA TRANSMISSION METHODS​
    8·1 answer
  • There are parallels between the trust models in Kerberos and Public Key Infrastructure (PKI). When we compare them side by side,
    15·1 answer
  • A ____________ is a collection of commands given a name.
    11·1 answer
  • True or false, USBs are slower than RAM.
    15·1 answer
  • Which tab should a user click to access the Page Borders feature of Word?
    13·2 answers
  • QUESTION 10
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!