1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GarryVolchara [31]
2 years ago
9

When we look for errors inside of our code on our own or with a partner , what is that called?

Computers and Technology
2 answers:
lutik1710 [3]2 years ago
6 0
It’s called that he is cheating
Arada [10]2 years ago
4 0
Debugging or troubleshooting
You might be interested in
I need major help. Word processing
Pie

Answer:

I do Word processing in computing, but I use a computing textbook for studies.

I also don't have any idea about the flashcards.

I'm sorry.

Explanation:

But if you want me to help, I may.

3 0
2 years ago
What is a functional simulation?
Anika [276]
D) a type of training that allows...
4 0
4 years ago
Choose all of the items that accurately describe an operating system.
Simora [160]

Answer:

provides the platform that application software runs on, manages a computer's hardware, and implements features like file and folder management.

Explanation:

6 0
3 years ago
You manage 20 windows workstations in your domain network you want to prevent the sales team members from making system changes
Rainbow [258]

Answer:

You should configure the user account control.

Explanation:

Behavior of the elevation prompt for standard users setting in Group Policy to Prompt for credentials.

4 0
3 years ago
History of computer from difference engine <br>​
harkovskaia [24]

Answer:

Charles Babbage (1791-1871), computer pioneer, designed two classes of engine, Difference Engines, and Analytical Engines. Difference engines are so called because of the mathematical principle on which they are based, namely, the method of finite differences.

Explanation:

4 0
2 years ago
Read 2 more answers
Other questions:
  • Write the importance of cyber law? In point .<br>​
    10·2 answers
  • . Stress can affect not only your health, but also other aspectsof your
    15·1 answer
  • Consider the partially-filled array named a. What does the following loop do? (cin is a Scanner object)int[] a = {1, 3, 7, 0, 0,
    6·1 answer
  • A motherboard has four DIMM slots; three slots are gray and the fourth is black. What type of memory is this board designed to u
    6·1 answer
  • Which is an example of a student practicing ethical behavior online??
    7·2 answers
  • A person who wants to buy a compact disc (cd) has just enough money to buy one, and chooses cd a instead of cd
    10·2 answers
  • Which port-authentication network access control standard forces devices to go through a full authentication, authorization, and
    13·1 answer
  • James, a technician, needs to format a new drive on a workstation. He will need to configure read attributes to specific local f
    5·1 answer
  • Which function of a word processing program enables you to apply a preset formatting
    5·1 answer
  • Please answer me fast ​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!