1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andre [41]
2 years ago
5

A friend asks you to look over the code for an adventure game and help figure out why it won’t work. Which of these options is s

omething that would cause a program to work improperly?
Computers and Technology
2 answers:
SpyIntel [72]2 years ago
8 0

Answer:

what options?

Explanation:

PtichkaEL [24]2 years ago
7 0

Answer:

The code is in the wrong placment

Explanation:

You might be interested in
Can someone answer this for me will award brainliest lol
Natasha2012 [34]

Answer: Without GUI's being developed, we most likely would still be using terminal systems. Terminals require command/text input rather than mouse or  other input. The invention of GUI's enabled people to use simpler input methods, rather then clunky text input systems. To sum, GUI's simplified the computer experience as we know today.

Hope this helped :)

6 0
3 years ago
Read 2 more answers
A news company is planning to use a Hardware Security Module (CloudHSM) in AWS for secure key storage of their web applications.
lakkis [162]

Answer:

you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

Explanation:

Hardware Security Module (CloudHSM) is a cloud-based hardware security module (HSM) that provides the user the opportunity to create and utilize your own encryption keys on the AWS Cloud. It is a fully managed service that takes care of time-consuming administrative activities such as software patching, backups, hardware provisioning, and high-availability for the user.

One of the key elements of the Hardware Security Module (CloudHSM) is that a copy of the keys stored must be kept somewhere because if keys are lost, they are lost forever and a new copy cannot be obtained if a copy is not kept.

Therefore, you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

5 0
3 years ago
A series of drawn pictures (like a comic) of key visual shots of planned production for video is a/an
Ne4ueva [31]

Answer:

The correct answer is <u>D) Storyboard</u>

Explanation:

A storyboard is used during the initial planning stage of filmmaking. You draw pictures to demonstrate the general idea of what shots you want to get before actually going out and filming on a set/studio.

4 0
3 years ago
The term ____ refers to a wide variety of different database technologies that were developed in order to overcome some of the l
ella [17]
Database management systems are used to store and to access information.
In <span>the Relational Database Management System </span>(RDBMS), all the data is in the form of simple columns and rows in a table. Structured Query Language (SQL) is is the standard query language for RDBMS. Some of the disadvantages of RDBMS are: not enough storage area to handle data such as images, digital and audio/video, do not provide good support for nested structures,not much efficient and effective integrated support.
<span>The term object oriented database management systems (OODBMS)  refers to a wide variety of different database technologies that were developed in order to overcome some of the limitations of relational databases.</span>





5 0
4 years ago
You will write a flowchart and C code for a program that does the following:Call three functions from main(). The functions are
Vitek1552 [10]

Answer:

#include <stdio.h>

void first() {

   printf("first\n");

}

void second() {

   printf("second\n");

}

void third() {

   printf("third\n");

}

int main() {

   first();

   second();

   third();

   printf("End of program.\n");

   return 0;

}

8 0
3 years ago
Other questions:
  • Samantha wants to create a network group that allows open sharing of data without restrictions. What type of network should she
    9·1 answer
  • Windows 1.0 was not considered to be a "true" operating system but rather an operating environment because _____.
    13·1 answer
  • ________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared po
    9·1 answer
  • Antifreeze is not considered a hazardous waste by the EPA unless it is used or otherwise becomes contaminated.
    13·2 answers
  • Green Field county stadium is planning to conduct a cricket match between two teams A and B. A large crowd is expected in the st
    6·1 answer
  • What is the definition of software? Group of answer choices an instruction that causes a single specific action to be performed
    11·1 answer
  • Gigantic Life Insurance is organized as a single domain. The network manager is concerned that dividing into multiple domains to
    15·1 answer
  • -Define three types of user mode to kernel mode transfers?
    11·1 answer
  • Wanna song to vibe to? Listen to Streets by Doja cat
    11·1 answer
  • Explain why the program did not print "clap", and how to fix it.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!