Answer:
The correct answers are:
make their websites more user-friendlyorganize informationreturn to their designs over time to make editsExplanation:
Adding web pages helps designers to improve the user experience by providing more content and making it easier to find information. Designers can also use additional pages to organize the website's structure and create a clear hierarchy of information. Finally, adding web pages enables designers to revisit their designs over time and make changes or updates as needed. However, adding web pages does not necessarily mean creating multiple websites, as multiple web pages can be part of a single website.
#define DIRECTN 100
#define INDIRECT1 20
#define INDIRECT2 5
#define PTRBLOCKS 200
typedef struct {
filename[MAXFILELEN];
attributesType attributes; // file attributes
uint32 reference_count; // Number of hard links
uint64 size; // size of file
uint64 direct[DIRECTN]; // direct data blocks
uint64 indirect[INDIRECT1]; // single indirect blocks
uint64 indirect2[INDIRECT2]; // double indirect
} InodeType;
Single and double indirect inodes have the following structure:
typedef struct
{
uint64 block_ptr[PTRBLOCKS];
}
IndirectNodeType;
Required:
Assuming a block size of 0x1000 bytes, write pseudocode to return the block number associated with an offset of N bytes into the file.
Answer:
WOW! that does not look easy!
Explanation:
I wish i could help but i have no idea how to do that lol
i need the full code for 6.1.3 code hs circles and squares please answer please help
In this exercise we have to use the knowledge in computational language in python to write a code with circles and squares.
how to draw geometric figures in python?inputs = 100
radius
draw_circle(radius);
pendown()
begin_fill()
circle(radius)
end_fill()
penup()
left(90)
forward(radius*2)
right(90)
penup()
setposition(0,-200)
color("gray")
bottom_radius = int(input("What should the radius of the bottom circle be?: "))
draw_circle(bottom_radius)
draw_circle(bottom_radius)
See more about python at brainly.com/question/18502436
How does so called marshalling solve the problem of different byte ordering of sender and receiver? 8. What is the purpose of a portmapper? How does so called marshalling solve the problem of different byte ordering of sender and receiver ?
8 . What is the purpose of a portmapper ?
Marshalling solve the problem of different byte ordering of sender and receiver by:
By the use of Common Object Request Broker Architecture (CORBA): What is Marshalling?Marshalling is the act of moving and formatting a group of data structures into an external data depiction type good for transmission in a message.
A port mapper is known to be a kind of protocol that tells or map the number or the kind of version of any type of Open Network Computing Remote Procedure Call (ONC RPC) program to a port that is often used in the work of networking by that version of that given program.
Learn more about portmapper from
https://brainly.com/question/879750
#SPJ1
Which code snippet could be used to print the following series?
What is the HIE? What is its purpose?
Answer:
Electronic health information exchange (HIE) allows doctors, nurses, pharmacists, other health care providers and patients to appropriately access and securely share a patient's vital medical information electronically—improving the speed, quality, safety and cost of patient care.
Explanation:
Answer:
HIE is a system that helps tansport patients when it becomes overwhelmed.
Explanation:
At the point when medical services suppliers approach total and exact data, patients get better clinical consideration. Electronic wellbeing records (EHRs) can improve the capacity to analyze illnesses and lessen risks. Doing this helps patients get timely care. More severe cases can be treated quickly.
Plzz helps me with hw
Answer:
1. not statistical
2. statistical
3. statistical
4. not statistical
5. statistical
6. not statistical
7. statistical
Explanation:
The statistical can compare more then 1 thing to make it reasonable.
Choose the correct term to complete the sentence.
For most operating systems, the _______ function returns the number of seconds after January 1, 1970, 0:00 UTC.
O localtime()
O time()
O epoch()
Answer:
time() or time.time()
Explanation:
The time() method from the time module gives the amount of seconds after epoch, or Jan 1, 1970. Running this in the Python shell would return a number like this:
>>> time.time()
1652747529.0429285
For most operating systems, the time() function returns the number of seconds after January 1, 1970, 0:00 UTC. Thus, the correct option is B,
What is the time() function?In python, the time() function is the function which returns the number of seconds that have been passed since an epoch. It is the point where time actually begins. For the Unix system, the time such as January 1, 1970, 00:00:00 at UTC is an epoch.
The time() method from the time module is used widely to give the amount of seconds which have been passed after the time period of an epoch, or Jan 1, 1970. Running this in the Python shell would return a number like the one listed in the question.
Therefore, the correct option is B.
Learn more about time() function here:
https://brainly.com/question/12174888
#SPJ2
3. (5pts )Given an unweighted undirected graph G, and a vertex pair u and v, please give out a pseudo code returning T if v is reachable from u. Otherwise return F. Analyze the time complexity of your algorithm.
The time complexity of your algorithm in the graph is given:
function isReachable(u, v, visited, graph):
if u == v:
return True
visited[u] = True
for neighbor in graph[u]:
if not visited[neighbor]:
if isReachable(neighbor, v, visited, graph):
return True
return False
How to explain the graphHere, graph is the adjacency list representation of the graph, visited is an array that stores whether a vertex has been visited or not, and u and v are the source and destination vertices respectively.
Learn more about graph on
https://brainly.com/question/25184007
#SPJ1
type the correct answer in the box. Spell all words correctly. Which element of the presentation software can you use to add callouts and banners? using ____, you can add callouts and banners to a slide
Answer:
The element of the presentation software that can be used to add callous and banners is SHAPES
Using the INSERT TAB, you can add callouts and banners to a slide.
Explanation:
If you want to add callouts and banners to a slide, the presentation software that can be used is PowerPoint.
The element that is used to add it is called shapes and can be found in the Insert Tab.
Answer:
using shapes , you can add callouts and banners to a slide
Explanation:
Java Eclipse homework. I need help coding this
Project 5A - Mixed Results
package: proj5A
class: MixedResults
Create a new project called MixedResults with a class called Tester. Within the main method of Tester you will eventually printout the result of the following problems. However, you should first calculate by hand what you expect the answers to be. For example, in the parenthesis of the first problem, you should realize that strictly integer arithmetic is taking place that results in a value of 0 for the parenthesis.
double d1 = 37.9; //Initialize these variables at the top of your program
double d2 = 1004.128;
int i1 = 12;
int i2 = 18;
Problem 1: 57.2 * (i1 / i2) +1
Problem 2: 57.2 * ( (double)i1 / i2 ) + 1
Problem 3: 15 – i1 * ( d1 * 3) + 4
Problem 4: 15 – i1 * (int)( d1 * 3) + 4
Problem 5: 15 – i1 * ( (int)d1 * 3) + 4
Your printout should look like the following:
Problem 1: 1.0
Problem 2: 39.13333333333333
Problem 3: -1345.39999999999
Problem 4: -1337
Problem 5: -1313
Introduction This lab uses things you learned in your introductory programming class. Some of those things are: - constants - random numbers - overloaded methods - passing/returning arrays - filling and printing a one-dimensional array - filling and printing a two-dimensional array Just for fun, we'll include a GUI to visualize your
QR
code! Specifications You will create a class
QRC
code that fills a grid with values that can be interpreted to visualize a QRCode image. (This is not a true QRCode but a pattern similar to one.) Required elements 1. QRCode class methods are instance methods. 2. Your program will contain a main method that creates an instance of QRCode and calls its methods such that the result output is a grid dim
x
dim with Finder values in the upper left, lower left, and upper right corners. 3. The dimension for the grid and the seed for the Random object must be passed in from the command line. 4. If two arguments are not passed in from the command line, your program should use constants defined below: - DEFAULT_DIMENSION 30 - DEFAULT_SEED 160 5. Methods that return a value must pass unit tests that will not be made available for view, that is, those methods should be thoroughly tested by you prior to submitting your program. 6. Only the print methods may have output to the console. 7. Class members must conform to the UML diagram below: Q=============== Class Name ================ QRCode ============ Private Variables ============ - grid : int[] [] ============ Public methods ============== + createPattern(dim : int, seed : int) : int[] + setGrid(dim : int, pattern : int []) : void + getGrid() : int[][] + setFinder(xpos : int, yPos : int) : void + addFinders(dimension : int) : void - fillSquare(startX : int, startY : int, width : int, color: int) : void // possible helper method + print() : void + print (pattern : int [] ) : void + print(matrix : int[][]) : void Method specifications You will create an outline called a stub program where the method headers are the only implemented part of the class and all methods only return default values. In a later lab, you will complete the class to have full functionality. You can get all the information you need from the UML outline above. Testing Things to test for are the correct number/type of arguments, and the return values (void or null). Grading Your code will be evaluated for correctness of being able to call each function and the default return value (if any) will be checked. Upload your files below by dragging and dropping into the area or choosing a file on your hard drive. Coding trail of your work History of your effort will appear here once you begin working on this zyLab.
To create a class QRC, code that fills a grid with values that can be interpreted to visualize a QRCode image, check the code given below.
What is class?A class in object-oriented programming is a blueprint for creating objects (a specific data structure), providing initial values for state (member variables or attributes), and implementing behaviour (member functions or methods).
//CODE//
Announcement and Launch List:
Syntax: data_type array_name [] [] = new data_type [n] []; // n: no. of lines array_name [] = new data_type [n1] // n1 = no. of columns in row-1 array_name [] = new data_type [n2] // n2 = no. of columns in row-2 array_name [] = new data_type [n3] // n3 = no. of columns in row-3 . . . array_name [] = new data_type [nk] // nk = no. of columns in row-n
Also, ways to start a rough list:
int arr_name [] [] = new int [] [] { new int [] {10, 20, 30, 40}, new int [] {50, 60, 70, 80, 90, 100}, new int [] {110, 120} }; OR
int [] [] arr_name = { new int [] {10, 20, 30, 40}, new int [] {50, 60, 70, 80, 90, 100}, new int [] {110, 120} }; OR
int [] [] arr_name = { {10, 20, 30, 40}, {50, 60, 70, 80, 90, 100}, {110, 120} }; The following are the Java applications for displaying the above concept.
// 2-D rough list display program in Java class Main { public static void main (String [] args) { // Announces the same 2-D members with 2 rows int arr [] [] = new int [2] [];
// To make the above list Jagged
// The first row has 3 columns arr [0] = new int [3];
// The second row has 2 columns arr [1] = new int [2];
// Starting list int count = 0; because (int i = 0; i <arr.length; i ++) because (int j = 0; j <arr [i] .duration; j ++) arr [i] [j] = count ++;
// Displays the values of the 2D Jagged array System.out.println ("2D Jagged Array Contents"); because (int i = 0; i <arr.length; i ++) { because (int j = 0; j <arr [i] .duration; j ++) System.out.print (arr [i] [j] + ""); System.out.println (); } } } Output Content of 2D Jagged Array 0 1 2 3 4 The following is another example where the i line has i-columns, that is, the first row has 1 element, the second row has 2 elements, and so on.
// Another Java program for displaying jagged 2-D // list in such a way that the first row has 1 element, the second // row has two elements and more. class Main { public static void main (String [] args) { int r = 5;
// Announces the same 2-D members with 5 rows int arr [] [] = int [r] [] new;
// Creating a 2D list that matches the first line // has 1 element, the second row has two // elements and more. because (int i = 0; i <arr.length; i ++)
arr [i] = new int [i + 1];
// Starting list int count = 0; because (int i = 0; i <arr.length; i ++) because (int j = 0; j <arr [i] .duration; j ++) arr [i] [j] = count ++;
// Displays the values of the 2D Jagged array System.out.println ("2D Jagged Array Contents"); because (int i = 0; i <arr.length; i ++) { because (int j = 0; j <arr [i] .length; j ++) System.out.print (arr [i] [j] + ""); System.out.println (); } } } Output Content of 2D Jagged Array 0 1 2 3 4 5 6 789 10 11 12 13 14
Learn more about class
https://brainly.com/question/29727220
#SPJ4
What is the best way to deal with a spam
Simply ignoring and deleting spam is the best course of action. Avoid responding to or engaging with the spam communication because doing so can let the sender know that your contact information is still live and invite additional spam in the future. Additionally, it's critical to mark the email as spam using your email program or by reporting it to the relevant authorities. Make careful to report the spam to the proper authorities for investigation if it appears to be a phishing scheme or contains hazardous content.
Cyclic Redundancy Check (CRC) is an effective error detection mechanism. Suppose you have data bits of 10010011011 and divisor is 10011. As per the given information, what is encoding bits at the sender side? Similarly, at the receiver end ensure syndrome value is zero. Follow all necessary steps to complete calculation at both ends
Answer:
The appended bits are 1100, the sender sending the data after adding is 100100110111100.
Note: Kindly find an attached document to part of the solution for the necessary steps to the complete calculation at both ends is attached below.
Explanation:
Solution
Given that:
We have the data bits of 10010011011 and the divisor is 10011
Thus,
We have to append four 0's at the end of data bits
The appended bits are 1100
At the receiver side the bits are 0000
Therefore sender sending the data after adding is 100100110111100
what is python programming?
Answer:
Explanation:
Python is a popular programming language that lets you work quickly and integrate systems more effectively. It can be used for a wide range of tasks, including web development, data analysis, artificial intelligence, and more. Python is known for its readability and ease of use, making it a great language for beginners to learn. It has a large and supportive community of developers who contribute to its development and provide resources for learning and using the language.
Design a software system for a bookstore that keeps an inventory of two types of books: Traditional books and books on CD. Books on CD may also contain music. The bookstore purchases books from publishers and sets a price for each book. Customers can purchase books from the bookstore, using either cash or a credit. The bookstore keeps track of which books it has in its inventory, and the books purchased by each customer
a. What are the objects in your object- oriented Solution?
b. What are the interactions between objects in your solution?
c. Which objects "have" other objects?
d. Which Objects "Use" other objects?
e. Which objects are other objects?
Answer:
Explanation:
a. In this scenario, the best solution would have an Object of Traditional Books, CD, Music, Bookstore and Customer.
b. All five objects would be able to be called by the main program loop and the Customer Object would call upon and use either the Books or CD object, While the Bookstore object would call upon all of the other objects.
c. Both the Bookstore object and Customer object will "have" other objects as the Bookstore needs to hold information on every Book or CD in the Inventory. While the Customer object would call upon the Book and CD object that they are purchasing.
d. The Music Object will extend the CD object and use information on the CD object as its parent class.
e. Since the Music Object extends the CD object it is also considered a CD since it is in CD format like the Books on CD and therefore is both objects.
how i want to be good in coding for subject c programming? anyone has a suggestion?
Answer:
Get more details about Standard Library Functions in C.
Use logical variable names to avoid any confusion.
Don't forget to check a complete guide for Variables in C.
Explore how Escape Sequence in C make your coding better.
( PLEASE I NEED THIS LIKE REALLY FAST- )
which integer is greater -50 or 25? which has the greatest absolute value
You are tasked with designing the following 3bit counter using D flip flops. If the current state is represented as A B C, what are the simplified equations for each of the next state representations shown as AP BP CP?
The number sequence is : 0 - 1 - 2 - 4 - 3 - 5 - 7 - 6 - 0
In the given 3-bit counter, the next state of A, B, and C (represented as A', B', and C') depends on the current state ABC.
The sequence is 0-1-2-4-3-5-7-6 (in binary: 000, 001, 010, 100, 011, 101, 111, 110).
The simplified next state equations for D flip-flops are:
A' = A ⊕ B ⊕ C
B' = A · B ⊕ A · C ⊕ B · C
C' = A · B · C
This counter follows the mentioned sequence and recycles back to 0 after reaching the state 6 (110). These equations can be implemented using XOR and AND gates connected to D flip-flops.
Read more about XOR and AND gates here:
https://brainly.com/question/30890234
#SPJ1
Interactive media professionals are unique among other Information Technology professionals because they have very good job prospects and are highly paid. are categorized as artistically gifted design professionals. design components which end users interact with directly. use software programs and computer programming.
Answer:
B please drop a like<3
Explanation:
You just purchased a single license for the latest Microsoft Office Suite. Your friend has asked to borrow the CD, so he can install it on his computer, too.
Is it okay for him to install it?
No; acts of piracy are legal; however, I paid for it. If he wants it, he can pay for it, too.
No; this would be considered piracy, so he should buy his own license.
Yes; I purchased the single license, so I can install it on as many computers as I want.
Yes; this would only be considered piracy if my friend paid me to install it on his computer too.
Answer:
B
Explanation:
No, this would be piracy. If he would want to install it, he would have to buy it himself.
Hope this helps :D
Based on The given information, No; this would be considered piracy, so he should buy his own license. Thus the correct option is B.
What is the license?A license is referred to as access rights or permission granted to an individual to operate any activity. This license acts as an approval method. For example, the approval license for driving is a driving license that allows individuals to drive vehicles.
Piracy is the act of producing more duplicates of a piece of software than the license allows for, either for individual use or business purposes, and using those copies for illegal purposes. In the given case, it is explained that
In the given case, it is explained that you recently bought a single license for the most recent version of the Microsoft Office Suite. To install the CD on his computer as well, your friend has asked to borrow it. He ought to get his own license since doing this would be piracy.
Therefore, option B is appropriate.
Learn more about Piracy, here:
https://brainly.com/question/870393
#SPJ6
When performing overhead work on scaffolding, what protective measures must be taken to prevent objects from falling and striking a person below?
a
Fall arrest systems are used.
b
Alarm systems should be enabled.
c
Toeboards, debris nets, or canopies must be applied
d
Warning tags are posted on the scaffold
The correct option is c. Toeboards, debris nets, or canopies must be applied when performing overhead work on scaffolding as a precautionary measure.
What is scaffolding?It is a term often used in building construction that describes a structure set up temporarily to allow workers reach higher heights so as to make needed repairs, or carry out construction in those areas.
Becuase of the nature of such structure, it comes with certain risk of injuiry on site, such as objects falling and striking a person below. When toeboards, debris nets, or canopies are applied, this measures can help to prevent objects from falling and striking a person below.
You can learn more about the benefits of scaffolding here https://brainly.com/question/20726451
#SPJ1
Three actions that databases can take when autocorrecting foreign key insertions and updates are listed below, as are the additional limitations on databases for each action. Match each action to its associated limitation.
Instructions: Choose your responses from the drop-down menus below. Response options cannot be used more than once.
Find the cash account's balance on the bank statement. List any unrecorded deposits and any banking mistakes.
Databases could be set up with four steps to address engine violations, despite being labour-intensive or error-prone mechanical alterations to both the referential. Inserts, updates, and removals are the only operations that the restricted action denies. Set Default to a certain core consideration supplied in SQL sets a default foreign key, while Set Null to NULL sets the invalid external key. The primary modifications in external keys are dispersed by its cascading operation. A bank statement is a summary of all transactions for a given time period for a particular bank account. The statement shows the beginning and ending balances for the period as well as deposits, charges, and withdrawals.
Learn more about Databases here:
https://brainly.com/question/20923170
#SPJ4
3
Drag each label to the correct location on the image.
An organization has decided to initiate a business project. The project management team needs to prepare the project proposal and business
justification documents. Help the management team match the purpose and content of the documents.
contains high-level details
of the proposed project
contains a preliminary timeline
of the project
helps to determine the project type,
scope, time, cost, and classification
helps to determine whether the
project needs meets business
needs
contains cost estimates,
project requirements, and risks
helps to determine the stakeholders
relevant to the project
Project proposal
Business justification
Here's the correct match for the purpose and content of the documents:
The Correct Matching of the documentsProject proposal: contains high-level details of the proposed project, contains a preliminary timeline of the project, helps to determine the project type, scope, time, cost, and classification, helps to determine the stakeholders relevant to the project.
Business justification: helps to determine whether the project needs meet business needs, contains cost estimates, project requirements, and risks.
Please note that the purpose and content of these documents may vary depending on the organization and specific project. However, this is a general guideline for matching the labels to the documents.
Read more about Project proposal here:
https://brainly.com/question/29307495
#SPJ1
And office now has a total of 35 employees 11 were added last year the year prior there was a 500% increase in staff how many staff members were in the office before the increase
There were 5 staff members in the office before the increase.
To find the number of staff members in the office before the increase, we can work backward from the given information.
Let's start with the current total of 35 employees. It is stated that 11 employees were added last year.
Therefore, if we subtract 11 from the current total, we can determine the number of employees before the addition: 35 - 11 = 24.
Moving on to the information about the year prior, it states that there was a 500% increase in staff.
To calculate this, we need to find the original number of employees and then determine what 500% of that number is.
Let's assume the original number of employees before the increase was x.
If we had a 500% increase, it means the number of employees multiplied by 5. So, we can write the equation:
5 * x = 24
Dividing both sides of the equation by 5, we find:
x = 24 / 5 = 4.8
However, the number of employees cannot be a fraction or a decimal, so we round it to the nearest whole number.
Thus, before the increase, there were 5 employees in the office.
For more questions on staff members
https://brainly.com/question/30298095
#SPJ8
Which tag denotes the end of an element in HTML?
Α. /
Β.
*
C.
>
Ο Ο Ο Ο
Ο D. )
Ο Ε.
Answer:
A. /
Explanation:
When creating a line in HTML, you start with a <ELEMENT> ENTER TEXT </ELEMENT>
Example:
<title> Mark me brainliest! </title>
Hope this helps!
-Isa
Attendees who are also board members receive a discount off the registration fees. The discount amount varies based on the type of event. In cell J11 enter a formula that will return the discount amount if the registrant is a board member and return a blank value ("") if they are not.
Use a VLOOKUP function to retrieve the EventType from the EventDetails named range.
Use an INDEX function, with the cell range A5:B8 on the ClientRegistration worksheet as the array and the result of the VLOOKUP as the lookup_value for the MATCH function needed for the row_num argument.
Use an IF function so that the discount only applies to board members and all others will display as a blank ("")
Format the result as Percentage with 0 decimal places.
Copy the formula down through J34.
Initially, the formula verifies whether or not the attendee is a board member using the COUNTIF function.
How to explain the informationThis counts how many times their name appears in the "BoardMembers" named range. If the count exceeds zero, then the VLOOKUP operator within the formula retrieves the EventType of the current attendee from the "EventDetails" named range.
Then, via usage of the MATCH and INDEX functions, the formula identifies the matching row number in the registration worksheet for the retrieved EventType. The identified row number will be positioned as an argument (row_num) for the INDEX formula. As it executes, the INDEX formula can retrieve the relevant discount percentage value from column B.
Finally, by executing multiplication between the extracted discount percentage and 0.1 (as this expresses the respective reduction), the newly achieved outcome -a properly formatted percentage with no decimal points is returned by the original formula.
Learn more about formula on
https://brainly.com/question/657646
#SPJ1
Cual es la constante de proporcionalidad de la función f(x)= 4x-6
Given below are some facts and predicates for some knowledge base (KB). State if the unification for either variable x or y is possible or not. If the unification is possible then show the unified values for variables x and y.
a. American (Bob), American (y)
b. Enemy (Nono, America), Enemy(x,y)
c. Weapon (Missile), soldTo (Missile, y), Weapon (x), soldTo (x, Nono)
d. L(x, y), (L(y, x) ^ L(A, B))
Answer:
Unification may be a process by which two logical individual atomic expressions, identical by replacing with a correct substitution. within the unification process, two literals are taken as input and made identical using the substitution process. There are some rules of substitution that has got to be kept in mind:
The predicate symbol must be an equivalent for substitution to require place.
The number of arguments that are present in both expressions must be equivalent.
Two similar variables can't be present within the same expression
Explanation:
a. American (Bob), American (y):-
In this scenario, Unification is feasible consistent with the principle. The substitution list is going to be [y/Bob].
b. Enemy (Nono, America), Enemy(x,y):-
In this scenario, the Unification is feasible consistent with the principles. The substitution list is going to be [x/Nono, y/America].
c. Weapon (Missile), soldTo (Missile, y), Weapon (x), soldTo (x, Nono):-
In this scenario, the Unification isn't possible because the predicate is different i.e. Weapon and soldTo.
d. L(x, y), (L(y, x) ^ L(A, B)):-
In this scenario, Unification isn't possible because the number of arguments is different within the given expression
Transmissions in wireless networks do not allow for collision detection but try to avoid collision. Briefly describe this process and explain why it is termed as unreliable.
Transmissions in wireless networks do not allow for collision detection but try to avoid collision and also It is especially crucial for wireless networks since wireless transmitters desensing (turning off) their receivers during packet transmission prevents the option of collision detection using CSMA/CD.
What are the different types of wireless transmission?Wireless transceivers are unable to send and receive on the same channel simultaneously, hence they are unable to identify collisions. This is because the send power (which is typically around 100mw) and the receive sensitivity have such a huge disparity (commonly around 0.01 to 0.0001mw).
Therefore, Infrared, broadcast radio, cellular radio, microwaves, as well as communications satellites are examples of wireless transmission media that are used in communications. Infrared (IR), which is a wireless transmission medium that uses infrared light waves to transmit signals, was covered previously in the chapter.
Learn more about collision detection from
https://brainly.com/question/14775265
#SPJ1
10+2 is 12 but it said 13 im very confused can u please help mee
Mathematically, 10+2 is 12. So your answer is correct. However, if you are trying to write a code that adds 10 + 2, you may need to troubleshoot the code to find where the bug is.
What is troubleshooting?Troubleshooting is described as the process through which programmers detect problems that arise inside a specific system. It exists at a higher level than debugging since it applies to many more aspects of the system.
As previously stated, debugging is a subset of troubleshooting. While debugging focuses on small, local instances that can be identified and fixed in a single session, troubleshooting is a holistic process that considers all of the components in a system, including team processes, and how they interact with one another.
Learn more about Math operations:
https://brainly.com/question/199119
#SPJ1