1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wariber [46]
3 years ago
7

What is a BUG in terms of computer programming?

Computers and Technology
1 answer:
diamong [38]3 years ago
4 0

Answer:

C

Explanation:

You might be interested in
Anna always has a hard time finding files on her computer because she does not know where she saved them. This also affects her
mart [117]
The answer to this question is: Organization Skills

7 0
3 years ago
Read 2 more answers
Using tracking code, Google Analytics can report on data from which systems? A. E-commerce platforms.B. Mobile Applications.C. O
Allushta [10]

Answer:

E-commerce platforms

Mobile Applications

Online point-of-sales systems

Explanation:

Google Analytics provide users with a deeper understanding of their customers. It provides them with the free tools needed for analyzing data for your business. Google Analytics uses tracking code to report data on some systems. Some systems that Google Analytics use tracking code for are: E-commerce platforms , Mobile Applications , and Online point-of-sales systems.

3 0
4 years ago
What does it mean to design,<br> implement, and maintain computer<br> systems?
docker41 [41]

Answer:

Let's take an example of the embedded system, which is a perfect example of this question as a computer system. Suppose we want the embedded system to record the details related to soil of agricultural land. We will take an IoT device which will be a sensor that can register soil properties, and get connected to the computer system through the internet. And we design an embedded system that registers these values and then copy them like somewhere in DB space on Amazon cloud or Google cloud. And finally display on some LCD or a big projector, or whatever, and like we design. Thus we have designed, and now when we install this on agriculture land, we implement it, and since check regular for correct performance, we maintain this embedded or a mini-computer system as well. This is what design, implement and maintain computer systems mean.

Explanation:

Please check the answer section.

8 0
3 years ago
WILL MARK BRAINLIEST!!!!!!!!!!!
zysi [14]

Answer:

a bit on the lighter side

Explanation:

6 0
3 years ago
Read 2 more answers
brielle is researching substitution ciphers. she came across a cipher in which the entire alphabet was rotated 13 steps. what ty
kogti [31]

Caesar cipher is a very common type of substitution cipher where each letter in the plaintext is moved or shifted to a known number of places down the alphabet.

The type of cipher is this is ROT13

  • ROT13ROT13 is a simple letter substitution cipher. It functions by the replacement of a letter with the 13th letter after it in the alphabet. It is commonly known as Caesar cipher used in ancient Rome

Conclusively we can say that ROT13 is a commonly known Caesar cipher that replaces a letter with the 13th letter after it in the alphabet.

Learn more from

brainly.com/question/15300028

3 0
3 years ago
Other questions:
  • Canadian Tire is one of Canada’s largest companies. They operate four large distribution centers service over 470 tire retail ou
    5·1 answer
  • Suppose you use Batch Gradient Descent to train a neural network and you plot the training error at every epoch. If you notice t
    7·1 answer
  • Research and discuss the LAMP (Linux, Apache, MySQL, and PHP) architecture. What is the role of each layer of this software stac
    14·1 answer
  • An extract report lists ____________.
    14·1 answer
  • Define foreign key. What is this concept used for?
    6·1 answer
  • When do we use SAVE and SAVE AS in saving artwork in adobe illustrator?<br> PLEASE HELP ASAP
    11·1 answer
  • When designing code, which of the following best describes the purpose of a Post Mortem Review?
    13·1 answer
  • Help me! I’ll mark you brainly
    13·1 answer
  • Can rank u r guys in rocket leagye
    13·1 answer
  • It is recommended that systems administrators analyze logs in order to determine if they have been altered because monitoring ca
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!