If you and a partner are trying to find an issue with a code, what are the steps you would take to find the issue and correct the problem?

Answers

Answer 1

Answer:

first take a look which page have a problem. then find the problem in the page source code..usually just forgot to put ;


Related Questions

Who did Connie Macpherson think her visitor was?​

Answers

Connie Macpherson thought that her visitor was her husband,Jim!

I hope it will helps you!

Which of the following is recalling the main points of a text?

Answers

Answer:

Option A< Rote learning

Explanation:

Options for given question

a) Rote learning

b) memorizing

c) Adapting

d) Seeming

Recalling of facts is associated with rote learning in which the education is de-emphasized in the form of science

Hence, option A is correct

A dictionary is also known as

Answers

Answer:

wordbook, lexicon or vocabulary

Explanation:

learned, dunno what lesson ur doing tho


2. Which Interface uses
images/icons to make it easier for
the user? *
Command Line
Graphical
Voice Command
Textbased​

Answers

Answer:

Voice Command

Explanation:

correct me if I am wrong✔

statement
Looping
WAP to display
name 50 times.​

Answers

Answer:

can you specify what program you're doing this in? I can do qbasic and maybe python

You have been asked to install a WLAN for a small business. You centrally locate the WAP in a large room that contains about 15 cubicles where employees work with their mobile devices. You test connectivity from all locations and find that signal strength is good throughout the room. Several months later, you are called to troubleshoot connectivity problems at the site. You find that the large room was divided into two smaller rooms by a floor to ceiling wall with metal studs. What is the most likely reason for the connectivity problems

Answers

Answer:

interference

Explanation:

The most likely reason for the connectivity problems is interference. This interference can be caused by many factors but in this scenario the most likely factor would be the metal studs and all the metal used to create the ceiling/floor. Metal is a huge interference when it comes to wifi signals. Depending on the type of metal and the amount it can greatly diminish the signal strength or even completely prevent the signal from passing to it's destination, regardless of how close the destination device is located.

You started using a new Windows server three months ago. Since that time, you have found that the system slows down and crashes from time to time. You want to look at a report that shows important events for the server since it was installed. You'd like to see when software was installed and if there are any hardware or application failures. What is the simplest way to view this information

Answers

Answer: Open Reliability Monitor.

Explanation:

The simplest way to view this information is to open the reliability monitor.

The Reliability Monitor shows you the stability history of a system at a glance and also allows one to see the details of the events that has an effect on reliability on a daily basis.

The reliability and problem history chart which can be seen in the Reliability Monitor helps in keeping track of the overall health of the server on a daily basis.

Help please!!!!! Drivers ed

Answers

Answer: Away from the curb

Explanation: if the vehicles breaking system stops working while the vehicle is parked it will reverse into the curb instead of into traffic

Answer:

Away from the curb

Explanation:

by turning your wheels away from the curb if your breaks fail your car will roll back into the curb instead of into traffic.

If you have an ordered list of all the states in North America, and you want to add a title "States of North America", what tag will you use?

A.

B.

C.

D.

Answers

Answer:

B

Explanation:

I think that is the answer

Select the correct answer.
A student is browsing a website. While browsing, he clicks on a link that takes him to another website. Which code gives the correct format of the
external link?

Answers

Answer:

(B) because on a website IT HAS TO HAVE "WWW." first

Explain how the use of the internet has allowed people to achieve some
normalcy during the Current Pandemic

Answers

I don't know if this is going to help you or not because I'm only 13 but let me know if it helps people can now talk to one another more effectively because of things like zoom and it's become more efficient to work at home because we can have online meetings

Rinaldo and his game design team have

Answers

Answer:

HAVE DA baby

Explanation:LLLLLLLLLLLLLLLLLLLLLETS GOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO

Please help! Why is my windows homepage like this with no desktop pictures for apps? It has like a mail logo for everything. How do I fix it?

Answers

is your computer able to flip into tablet mode?? if not try restarting it and clearing all tabs

¿Como explicarian que es un programa y la diferencia con el concepto de software y aplicacion.

Answers

Answer:

Un programa de computadora es un conjunto de instrucciones que una computadora puede entender, escrito en un lenguaje de programación específico, en el caso de lenguajes de bajo nivel también en una arquitectura de computadora específica. En la mayoría de los casos, los programas se compilan en un formato que la computadora puede entender. A su vez, el conjunto de programas de una computadora es denominado software, mientras que una aplicación es un tipo específico de programa informático, especialmente utilizado en teléfonos móviles.

Match each with the correct answer.
1. Practice 4.2
Match the CPU part to its definition.
1. ________ arithmetic logic unit. (ALU)
2. ________ bus unit.
3. ________ cache.
4. ________ control unit.
5. ________ decode unit.
6. ________ regular unit.

-options
A. Decodes instructions and data and transmits the data to other areas in an understandable format.

B. Contains many separate, smaller storage units.

C. Connects all the other major components together, accepts data, and sends data through the input and output bus sections.

D. Control of the overall operations of the CPU.

E. Performs mathematical functions on data stored in the register area.

F. Small temporary memory area that separates and stores income data and instructions.

Answers

Answer:

1. E

2. C

3. F

4. D

5. A

6. B

Explanation:

CPU: this is known as the central processing unit and it is considered to be the brain of a computer system. It is the system unit where all of the processing and logical control of a computer system takes place.

A. Decode unit: decodes instructions and data and transmits the data to other areas in an understandable format.

B. Register unit: contains many separate, smaller storage units. Modern CPUs need only a few nanoseconds to execute an instruction when all operands are in its registers.

C. Bus unit: it is used to connect all the other major components together, accepts data, and sends data through the input and output bus sections.

D. Control unit: control of the overall operations of the CPU. The component of the central processing unit (CPU) that controls the overall operation of a computer is the control unit. It comprises of circuitry that makes use of electrical signals to direct the operations of all parts of the computer system. Also, it instructs the input and output device (I/O devices) and the arithmetic logic unit how to respond to informations sent to the processor.

E. Arithmetic logic unit (ALU): performs mathematical functions on data stored in the register area.

F. Cache: small temporary memory area that separates and stores income data and instructions.

5.What is returned by the call go(30)?
public static String go ( int x)
{
String s = "";
for (int n = x; n > 0; n = n - 5)
S = S + x +
return s;}

Answers

Answer:

The string returned is: 303030303030

Explanation:

Given

The above method

Required

The returned string

The method returns a string that is repeated x/5 times.

Take for instance;

x = 30

The method will return a string that contains x in 30/5 (i.e. 6) times

Hence, the result of go(30) is 303030303030

39 POINTS !
Okay so basically I have a 60 percent keyboard, and it’s LED perfect in shape jkeyboard okay.
I try connecting it to my ps4 and it’s detected but it won’t light up nor will any of the keys respond.
I have tried resetting my ps4
Iv’e tried unplugging and replacing in
I’ve tried holding FN and N to disable the n rollkey
I be tried plugging it into a pc
But nothing wors does anyone know how to fix it?

Answers

Answer:

Contact a service center electronics management

Answer:

take it back to the store with your the receipt and get a new one

The part of an HTML document where the CSS file is linked is the..?
A) body
B) footer
C) header
D) paragraph

Answers

Answer:

C) header

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head.

The head (header) contains information such as version of HTML, title of a page, metadata, link to custom favicons and cascaded style sheet (CSS) etc.

On the other hand, the body of a HTML document contains the contents or informations that a web page displays.

Hence, the part of an HTML document where the cascaded style sheet (CSS) file is linked is the header. A style sheet can be linked to an HTML document by three (3) main methods and these are;

I. External style.

II. Inline style.

III. Embedded (internal) style.

we use _____command to get data from the user? (python)

Answers

Answer:

INPUT

Explanation:

EXAMPLE PYTHON CODE

_______________________________________________________

INPUT CODE:

_______________________________________________________

foo = input('foo: ')#Have some text printed before the input field

bar = foo

print(bar)

_______________________________________________________

OUTPUT CODE:

_______________________________________________________

foo: Hello World!

Hello World!

>>> bar

'Hello World!'

>>>foo

'Hello World!'

What tab appears that allows for charts to be formatted when a chart is selected?

Answers

in the Design section you can format your selected Chart

for my assignment 2: Room area assignment, I keep getting a negative number for room 2, and I don't know why I'm getting the wrong answer because i copied a girl that got 100.

Answers

Answer:

The program in Python is as follows:

A = int(input("Side A: "))

B = int(input("Side B: "))

C = int(input("Side C: "))

D = int(input("Side D: "))

E = int(input("Side E: "))

A1 = A * B

A2 = (D - B - E)*(A - C)

A3 = 0.5 * E * (A - C)

Area = A1 + A2 + A3

print("Area:",Area)

Explanation:

One reason, you're getting a negative answer is that you probably entered a greater value for side C than A. Side A is meant to be greater than side C. Since the program do not need to be validated, you have to be careful with your inputs.

Another reason could be that your program is incorrect.

Get input for sides A to E

A = int(input("Side A: "))

B = int(input("Side B: "))

C = int(input("Side C: "))

D = int(input("Side D: "))

E = int(input("Side E: "))

Calculate rectangle area 1 (A1)

A1 = A * B

Calculate rectangle area 2 (A2)

A2 = (D - B - E)*(A - C)

Calculate the triangle area 3 (A3)

A3 = 0.5 * E * (A - C)

Calculate the total area

Area = A1 + A2 + A3

Print the calculated area

print("Area:",Area)

Ethan wants to change the font in his document. He should _____.

delete the text, select a font, and type
select a new font and highlight the text
highlight the text and select a new font
zoom in on the text, click on style, and make a selection

Answers

Answer:

C because it will work. I tried that a lot of time with documents.

Explanation:

Answer:

Ethan wants to change the font in his document. He should _____.

A. delete the text, select a font, and type

B. select a new font and highlight the text

C. highlight the text and select a new font

D. zoom in on the text, click on style, and make a selection

It is highlight the text and select a new font

Explanation:

Climax Medical Technology, a fast-growing global research firm, has accumulated so much client information that conventional database management systems cannot handle its customers' needs. Therefore, Climax purchased very sophisticated analysis software and supercomputing-level hardware. Climax Medical Technology is tapping the power of Group of answer choices mega IT. new age computing. super data. cyber-age databases. Big Data.

Answers

Answer:

big data.

Explanation:

It is correct to say that by implementing very sophisticated analytics software and supercomputing level hardware, Climax Medical Technology is harnessing the power of big data.

This is a tool capable of storing a large volume of data and making them available for organizational management in a structured, strategic and informative way, which helps an organization to achieve a competitive advantage in the market.

Big Data makes structured and unstructured data accessible to a company, so that they can use them intelligently for business solutions and to aid in the management and data collection process, helping to create more value and continuous improvement in an organization.

What are SmartArt graphics?

Graphics that were predesigned by Microsoft

Images that were hand-drawn and scanned in

Graphics that were downloaded from a camera

Images that were designed for different programs

Answers

Answer:

Option A

Explanation:

SmartArt graphic are nothing but the visual representation of ideas or information by using layouts that fits the context of the presentation. These smart art graphics include - sequence diagram, venn diagram, organizational chart etc. These smart art are part of MS office programs  i.e MS Word, MS Powerpoint, MS excel etc.

Hence, option A is correct

Write a loop that displays your name 10 times. 2. Write a loop that displays all the odd numbers from 1 through 49. 3. Write a loop that displays every fifth number from 0 through 100. 4. Write a code sample that uses a loop to write the numbers from 1 through 10 to a file. 5. Assume that a file named People.txt contains a list of names. Write a code sample that uses a while loop to read the file and display its contents in a ListBox control.

Answers

Answer:

Kindly check explanation

Explanation:

(1.)

n = 0

While n < 10 :

n+=1

print('fichoh')

# initiate counter n = 0 ; set condition, while n is not equal to 10 ; it print 'fichoh' and counter is increased by 1. This terminates once it reaches 10.

(2.)

for number in range(1,50):

if number%2 != 0 :

print(number)

#An odd number won't have a remainder of 0 when Divided by 2 ; so, for numbers 1 to 49 using the range function, if the number is divided by 2 and leaves a remainder other Than 0, such number is displayed

(3.)

for number in range(0,101,5):

print(number)

# Using the range function, starting from 0 to 100; it is number in the for loop is incremented by 5 and displayed.

(4.)

outfile = open('my_file.txt', 'w')

for n in range(0,11):

outfile.write(str(n))

outfile.close()

#open, 'w' creates a text file, my_text.txt and writes into it ; using the range function, numbers 0 to 10 is written into the created file.

5.)

name_file = open('People.txt', 'r')

While name_file:

out_file = name_file.readline()

if out_file = ' ' :

break

name_file.close()

names = name

#Open, 'r' ; opens and read from the file People.txt ;

#readline reads the content of the opened text file into a list out_file ; using the if ' ', the loop terminates once an empty content is read.

Q1. Which implementation of Network Access Control checks users' credentials to determine what level of access they should have to a top-secret file?

A. ACE
B. DAC
C. MAC
D. RBAC

Q2. Which physical access control uses a portable device that authenticates a person's identity electronically by storing some sort of personal information?

A. Infrared scanners
B. Hardware security tokens
C. Biometric devices
D. Keypads

Q3. Which implementation of Network Access Control grants access depending on a specific job role?

A. DAC
B. RBAC
C. MAC
D. PAC

Q4. Which implementation of Network Access Control is more relaxed, allowing users to determine file access privileges?

A. AAC
B. MAC
C. DAC
D. RBAC

Q5. Which type of access control sets the standard for the way security actions unfold?

A. Identity
B. Management
C. Physical
D. Technical

Answers

Answer:

1. MAC

2. Biometric Devices

3. RBAC

4. DAC

5. Management

Explanation:

Q.1) Option c) MAC

Q.2) Option c) Biometric devices

Q.3) Option b) RBAC

Q.4) Option c) DAC

Q.5) Option b) Management

What is MAC ?

The ability of individual resource owners to allow or refuse access to resource objects in a file system is constrained by the security measure known as mandatory access control (MAC).

What is a biometric device ?

An authentication and security identification tool is a biometric gadget.

What is RBAC ?

Role-based access control, often known as role-based security, is a method for only allowing authorized users to access a system.

What is DAC ?

The idea behind discretionary access control is to limit access to things based on who the subject is.

Therefore, MAC, biometric device, RBAC, DAC and Management access control sets are some of the measures for network security and access control.

You can learn more about network security from the given link

https://brainly.in/question/33317398

#SPJ2

When numbers are formatted in percent format, they are multiplied by _______ for display purposes.

1000
100
10
20

Answers

They are multipled by 100
They are multiplied by 100

the computer that communicate with each other are called ______please ask the answer in 15 minutes after 1 p.m. ​

Answers

The computers that communicate with each other are called [tex]\sf\purple{transmission \:control\: protocol\: (TCP)}[/tex].

[tex]\large\mathfrak{{\pmb{\underline{\orange{Happy\:learning }}{\orange{!}}}}}[/tex]

Mary recently read about a new hacking group that is using advanced tools to break into the database servers of organizations running public websites. In risk management language, what term is used to describe a hacking group? Group of answer choices Risk Threat Actor Vulnerability Standard

Answers

Answer:

Threat

Explanation:

In risk management, the hacking group would be considered a Threat. This is because a threat is anything that is able to analyze, find, and take advantage of vulnerabilities of your system. This applies regardless of the intentions of the group. In this case, the hacking group is using various tools to exploit specific existent vulnerabilities in Mary's companies database servers and would therefore classify as a Threat. In risk management, this is serious and is usually a priority that needs to be dealt with.

describe the third generation of computers​

Answers

Answer:

The period of third generation was from 1965-1971. The computers of third generation used Integrated Circuits (ICs) in place of transistors. A single IC has many transistors, resistors, and capacitors along with the associated circuitry.

The IC was invented by Jack Kilby. This development made computers smaller in size, reliable, and efficient. In this generation remote processing, time-sharing, multiprogramming operating system were used. High-level languages (FORTRAN-II TO IV, COBOL, PASCAL PL/1, BASIC, ALGOL-68 etc.) were used during this generation.

Third Generation

The main features of third generation are −

IC used

More reliable in comparison to previous two generations

Smaller size

Generated less heat

Faster

Lesser maintenance

Costly

AC required

Consumed lesser electricity

Supported high-level language

Some computers of this generation were −

IBM-360 series

Honeywell-6000 series

PDP (Personal Data Processor)

IBM-370/168

TDC-316

Other Questions
Which situation would be represented with the integer -72? Select all that apply. A hike of 72 feet.A gain of 72 yards, but a loss of 72 yards, ending back at 0.A withdrawal of 72 dollars.A height of 72 inches.A depth of 72 feet.HELP THIS IS THE LAST TEST OF THE YEAR PLZ HELPP QUICK!! A 0.20-kg block and a 0.25-kg block are connected to each other by a string draped over a pulley that is a solid disk of inertia 0.50 kg and radius 0.10 m. When released, the 0.25-kg block is 0.21 m off the ground. What speed does this block have when it hits the ground? You started using a new Windows server three months ago. Since that time, you have found that the system slows down and crashes from time to time. You want to look at a report that shows important events for the server since it was installed. You'd like to see when software was installed and if there are any hardware or application failures. What is the simplest way to view this information Juanita is decorating for a birthday party. She buys more than 30 balloons and attaches 6 of them to the chair for the birthday girl. She also wants to attach balloons to each of the 4 tables, with the same number of balloons at each table. If n represents the number of balloons at each table, this situation can be represented by the inequality 6 + 4n > 30. What does the solution to this inequality represent? A. She must attach fewer than 6 balloons to each table. B. She can attach more than 6 balloons to each table. C. She must attach fewer than 9 balloons to each table. D. She can attach more than 9 balloons to each table What is a claim of policy? A. An argument claiming that something is good or bad, right or wrongB. An argument claiming that something is or is not an accepted fact C. An argument claiming that a specific action should or should not take place D. An argument claiming that one thing causes another thing to happen What were the main ways that the Roman Empire and Roman republic differed Calculate the pKa of hypochlorous acid (HClO, a weak acid). A 0.015 M solution of hypochlorous acid has a pH of 4.64. Help whats the answer ! HELPPLS! BOTS STAY AWAY!! The mean amount of money withdrawn from a bank ATM on a particular day was $120. If Lauren withdrew $80 and her z-score was -3.2, what was the standard deviation for the amount withdrawn that day? Find (f o g)(0) *serious answers only* What are sustainable use practices?any materials that exist in nature and that are used by humansthe managed consumption of natural resources to prevent their depletion or environmental destructionthe deployment of fossil fuels to environments that previously did not have access to such resourcesways in which individuals are able to conserve native animal and plant species what is a claim/topic sentence for juvenile delinquency? I need help I will give brainliest Cesar Chavezs background included which of the following? Compute the measures of spread for the data collected for boys and girls. Describe their differences in detail using specific terms of spread. Based on your reading of the following passage, which applicant has the best chance of being hired by the city?At a civil service hiring fair, Benita, Chandra, Dre, and Ellen are applying for the same job as a port risk manager. Benitahas worked as a seaman and mechanic In a very busy port for two years; she has no college background. Chandra is arecent college graduate with high grades but no job experience. Dre has a degree in engineering and has worked forseveral years as a civil engineer. Ellen has a degree in criminal justice, has completed graduate work in risk assessment,and although she has never worked in a port setting, was an officer in the Navy.ChandraEllenO DreBenita the diagram shows the measurements of two fish. the difference in length between fish a and b is? Someone please help Cmo crees que han influido las relaciones y los tratados comerciales entre pases para la creacin o desaparicin de fronteras? President Bushs approval rating fell at the end of his presidency in part because he