1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maslowich
2 years ago
5

This is how you debug code ​

Computers and Technology
1 answer:
Bogdan [553]2 years ago
4 0

Answer:

thanks for teaching us how to debug

Explanation:

You might be interested in
Which of the following can you not code in a subclass? Select one: a. a method with the same signature as a method in the superc
Ray Of Light [21]
<h2>Option D: a call to a private method of the superclass</h2>

Explanation:

Option a: a method with the "same signature" is allowed in the subclass. There will not be any confusion because the object which is trying to call the method will decide whether to call the sub class or super class.

Option b: a call to a super class constructor is possible because, when you create an object of sub class automatically the super class constructor will be called. Even the sub class constructor can call the super class constructor explicitly.

Option c: A subclass can create method that's not defined by the super class

Option D: a private method is private inside the class and hence even the object of that class cannot access.

8 0
3 years ago
Which is the last line of defense in a physical security sense?
Deffense [45]

Answer: (A) People

Explanation:

 The physical security system is the basically used in the information system. It is used in the technical and the administrator element in the security system. This is the technology oriented system that is basically used to prevent from the hacking attacks in the system.

So, the people is the last statement of the defense in the physical security as the various security system is basically used by various people.

4 0
3 years ago
Which of the following is not an advantage of a dbms?
vovikov84 [41]
I looked it up and A seems to be it
7 0
3 years ago
Read 2 more answers
Which of the following is not hardware?
Pachacha [2.7K]

Answer:

A

Explanation:

I think it would be A because i have never heard of a virus scanner

6 0
3 years ago
The date function to apply when you want to display only the current date in the worksheet is the _____ function.
QveST [7]
The answer would be today
4 0
4 years ago
Read 2 more answers
Other questions:
  • The _____ is the mechanism inside a computer that actually does the arithmetic and logical operations.
    15·1 answer
  • The tiny memory cards used by digital cameras and mobile devices are an example of ____ storage.
    15·1 answer
  • What should a system administrator use to disable access to a custom application for a group of users?
    5·1 answer
  • Code
    7·1 answer
  • Mobile devices need to work within limited screen space ? true or false
    9·2 answers
  • Why are websites operated by recognized print publishers, such as newspapers and journals, generally accurate and reliable?
    10·2 answers
  • The data type that can hold decimal or fractional values
    14·1 answer
  • In the lungs,blood picks up carbon dioxide and releases oxygen true or false
    7·1 answer
  • When was the first computer made?
    8·1 answer
  • Businesses that conduct telemarketing are required to access the Do-Not-Call Registry every _______ in order to maintain an upda
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!