answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir79 [104]
2 years ago
9

When ____ occur during preliminary debugging, dummy print statements—statements that are temporarily inserted into the code to d

isplay status information on the screen—can be used to help locate the error.
Computers and Technology
1 answer:
ANEK [815]2 years ago
4 0

Answer:

Logic error.

Explanation:

When a logic error occurs sometimes it becomes difficult to locate the error in the code.So to locate the error dummy print used to see which loop,if,else,switch case etc. is executing or not.

for example:-

for(int i=0;i<45;i++)

{

if(i!=1)

{

   continue;

}

cout<<i<<endl;

}

we wanted the loop to print all value of i except 1 but it is printing only 1.We can use dummy print statement for this code in if condition.for(int i=0;i<45;i++)

{cout<<"Loop"<<endl;

if(i!=1)

{

cout<<"Printing"<<endl;

   continue;

}

cout<<i<<endl;

}

We see that the loop is printed 45 times and printing 44 times.We found that the condition in if statement is wrong.It hould be '==' instead of '!='.

You might be interested in
Writing a program in a language such as c or java is known as _____ the program.
Angelina_Jolie [31]
<span>Writing a program in a language such as c or java is known as coding the program</span>
8 0
2 years ago
Two career fields that lack minority professionals and thus offer many grant opportunities to students are education and _____.
Ainat [17]
My answer is nursing hopes this helps

0 0
2 years ago
Read 2 more answers
List three functions that you can perform with a database that you cannot perform with a spreadsheet.
Delicious77 [7]
There are some function which can be performed with database but not with a spread sheet, these functions include: 
1. Enforcement of data type.
2. Support for self documentation.
3. Defining the relationship among constraints in order to ensure consistency of data.
5 0
2 years ago
Which are examples of copyrighted online materials? Check all that apply.
Stella [2.4K]
The answers are 1, 3, and 5.
7 0
2 years ago
Read 2 more answers
Cooper Technologies is a technology company that offers many IT services in Chicago. The company's services and products include
yuradex [85]

Answer:

d. broad needs and few customers.

Explanation:

This strategy is based on creation of unique and valuable persons.

Broad needs and few customers (Wealth Management )

Wealth management is a service that combines to address the needs of clients. Wealth Management utilizes financial discipline such as financial and investment , accounting and tax.This service is appropriate for individuals with broad array of diverse needs.

4 0
2 years ago
Other questions:
  • A slide contains three text boxes and three images that correspond to the text boxes. Which option can you use to display a text
    5·2 answers
  • Mr. Cooper would like to customize his Excel software so his students can create an electronic graph in Excel for their lab repo
    6·1 answer
  • Julie is working on a spreadsheet with data about the company's profits. They will be sharing this data with customers. She chec
    6·2 answers
  • Suppose that a scheduling algorithm (at the level of short-term CPU scheduling) favors those processes that have used the least
    10·1 answer
  • Write a static method, getBigWords, that gets a single String parameter and returns an array whose elements are the words in the
    15·1 answer
  • A(n) ____ attack is when a system is compromised and used to attack other systems. a. indirect b. direct c. object d. subject
    13·1 answer
  • PYTHON QUESTION
    15·1 answer
  • What is the Gain (dB) of a transmission if the Maximum Data Rate is 1 Gbps and the Bandwidth =7000 MHz? Group of answer choices
    6·1 answer
  • Section 6.9 of your textbook ("Debugging") lists three possibilities to consider if a function is not working. Describe each pos
    14·1 answer
  • In this problem, we want to compare the computational performance of symmetric and asymmetric algorithms. Assume a fast public-k
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!