What are the difference between immediate window and view window.
(wrong answers will be reported)

Answers

Answer 1

Answer:

mmediate window is used to debug and evaluate expressions, execute statements, print variable values, and so forth. It allows you to enter expressions to be evaluated or executed by the development language during debugging.

The Command Window is used to execute commands or aliases directly in the Visual Studio integrated development environment (IDE).

Explanation:


Related Questions

what tasks should a laptop accomplish?

Answers

Answer:

general & personal used for computing.

Check My Work Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What should Sherri consider prior to taking the laptop apart

Answers

Complete Question:

Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What should Sherri consider prior to taking the laptop apart? (Select all that apply.)

Group of answer choices.

a. Try an external device before replacing the motherboard.

b. Make sure you have the correct processor for the motherboard.

c. Verify that the laptop is not under warranty.

d. Determine whether a teardown procedure is available.

Answer:

b. Make sure you have the correct processor for the motherboard.

c. Verify that the laptop is not under warranty.

d. Determine whether a teardown procedure is available.

Explanation:

In this scenario, Sherri is considering replacing a processor on her laptop because the laptop is running slower than she would like.

Hence, Sherri should consider the following informations prior to taking the laptop apart;

I. Make sure you have the correct processor for the motherboard. She can get the specifications of the motherboard and processor on the manufacturer's website.

II. Verify that the laptop is not under warranty because if it still under warranty, taking the laptop apart would void the warranty granted by the original manufacturer.

III. Determine whether a teardown procedure is available. She should ensure there is a guide available for dismantling and re-coupling of the laptop.

The word ____ at the end of several of the member functions in the accompanying class definition specifies that these functions cannot modify the member variables of a clockType object.

Answers

Answer:

Const.

Explanation:

In C++ programming language, if you wish to have your compiler deny or prevent access to a member function in modifying (changing) a calling object's private member variables in a line of code, you should declare the member as a const function. Therefore, the member function is simply declared as a constant by the compiler.

The word const at the end of several of the member functions in the accompanying class definition specifies that these functions cannot modify the member variables of a clockType object.

A security administrator is conducting a penetration test on a network. She connects a notebook system to a mirror port on a network switch. She then uses a packet sniffer to monitor network traffic to try and determine which operating systems are running on network hosts. Which process did the administrator use in the penetration test in this scenario

Answers

Answer:

Active fingerprinting

Explanation:

____ describes the concept of spreading applications over more than one computer system. Group of answer choices

Answers

Answer:

Distributed Computing.

Explanation:

Computing is the process of using computer hardware and software to manage, process and transmit data in order to complete a goal-oriented task. It can be classified into the following categories;

I. Autonomic computing: it comprises of systems which are self-managed. It is similar in operations with the autonomic nervous system in humans and is used in assembly lines for optimum automated production.

II. Grid computing: it is a collection of connected computing systems that function to achieve a common goal and are mainly located at various locations. It is commonly used for seismic analysis and weather forecasting.

III. Green computing: it is a programming concept that is based on the creation and use of technology in an environmentally friendly manner, thus, it focuses on the use of recyclable resources, power and resource management and energy efficiency management.

IV. Distributed Computing: it describes the concept of spreading applications over more than one computer system.

Binary Numbers and Conversion 1. Complete the following decimal-to-binary number conversions. a) 17 (10) b) 34 (10) c) 58 (10) d) 92 (10) e) 119 (10) f) 178 (10) g) 297 (10) h) 413 (10)

Answers

Answer:

a) 10001

b)100010

c)111010

d)1111100

e)1110111

f)10110010

g)100101001

h)110011101

Explanation:

Examples of email use that could be considered unethical include _____.


sending a quick message to your friend about last weekend

sharing a funny joke with other employees

denying receiving an e-mail requesting that you work late

sending your boss the monthly sales figures in an attachment

forwarding a chain letter asking for donations to a good cause

setting up a meeting with your co-worker

Answers

Answer:

"Denying receiving an e-mail requesting that you work late "

"Sending a quick message to your friend about last weekend "

"Sharing a funny joke with other employees"

Explanation:

Based off of the questions, I assume it means while you are at work. If you're at home or something, all of these are fine.

Answer:

"Denying receiving an e-mail requesting that you work late "

"Sending a quick message to your friend about last weekend "

"Sharing a funny joke with other employees"

Explanation:

PLEASE ANSWRR ALL ASAP

ILL GIVE BRAINLY PLEASE HELP

Answers

Answer:

2D from hexadecimal to denary is 13 + 2*16 = 45

68 from hexadecimal to denary, using the same logic as above, is 104.

AB from hexadecimal to denary, using the same logic as above, is 171.

Lastly, F9 from hexadecimal to denary is 249.

31 from denary to hexadecimal is 1F (notice that it is one less than 32, which is 2*16).

73 from denary to hexadecimal is 49.

184 from denary to hexadecimal is B8

Lastly, 255 is FF (notice that it is one less than 256, which is 16*16)

yo can someone hook me up with some uranium

Answers

bet where u stay at?

Answer:

now how we gon do dat

Explanation:

...

When you open your word-processing program, it opens in a
field
menu

Answers

B- menu...... hope this helps

Answer:

B

Explanation:

Which of the following behaviors does not harm a company if your employment is terminated?
A. getting a copy of word-processing software before leaving
B. selling trade secrets to competing companies or to your future employer
C. creating a username and password so you can access company information after you have left
D. notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave

Answers

Answer:

Notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave.

Answer:

its D

Explanation:

took the test

You are finally at the stage of the software life cycle where you begin programming. What is this stage called?
Group of answer choices

analysis

development

coding

implementation

Answers

You are finally at the stage of the software life cycle where you begin programming. What is this stage called?

development

ANSWER ASAP, I'LL MARK THE BRAINLIEST
A designer has created a doorbell that rings when it is pressed. What is the input in this system?

a) ringing sound
b) push-to-make switch
c) motion sensor
d) temperature sensor​

Answers

Answer:

Push to make switch

Explanation:

The sound is created after you push it. Pushing it is the input and the sound is the output

A computer is performing a binary search on the sorted list of 7 numbers below.

What is the maximum number of iterations needed to find the item?

[1, 5, 20, 50, 51, 80, 99]

A. 1

B. 3

C. 6

D. 7

Answers

Answer:

B

Explanation:

Binary search will start in the middle of the list, find which side the value is at, then look at the middle of those values.  This is incredibly efficient for larger values (Although it needs to be sorted) and practical in many instances.  Let's say that the desired number is 1, the binary search would look at "50" first, then proceed to compare with "5" and finally on it's third iteration, pick 1.

The maximum number of iterations needed to find the item is; Option B: 3

We are given the list of numbers as;

[1, 5, 20, 50, 51, 80, 99]

Now, when conducting binary search, it usually starts in the middle of the list of given numbers.

Thereafter, the next step is to find the side that the value being searched for is located before looking at the middle of those values.

Now, if the number being searched for in the given list is 1, it means that the binary search would first look at the middle number which is 50. Thereafter, it will proceed to compare it with the second number 5 and the lastly with the third iteration, will be 1.

Thus,the number of iterations needed to find the item is 3 iterations.

Read more about binary search at; https://brainly.com/question/24786985

Which of the following sentences use personification 


A. The stars in the sky are bright


B. The tree had leaves of green, yellow, and brown,


C. The truck pulled the heavy trailer out of the mud.


D. The snowflakes danced through the air.

Answers

Answer:

D

Explanation:

snowflakes cant dance.Its a human things.

Which external reference is formatted correctly?

=[My_Sales.xlsx]!Quarter1:C12

O ='(My_Sales.xlsx)!Quarter1':C12

O ="[My_Sales.xlsx]Quarter1'!$C$12

O =(My_Sales.xlsx)!Quarter1:$C$12


C on edge.

Answers

Answer:

= '[My_Sales.xlsx]quarter1'!C12

Explanation:

The formula gets the value of the cell C12 in the quarter worksheet of the  My_Sales.xlsx workbook.

Answer:

C

Explanation:

got it right on edge

What happens when a bookmark is added to a document?

-An item is added to the index.
-The list of citations becomes longer.
-The content that the bookmark links to appears.
-A shortcut for navigating to a specific location appears.

Answers

Derslerinde başarılar dilerim

Answer:

The content that the bookmark...

use this (Find the surface area of a cylinder.)

Write a pseudocode plan for your program.
Write the code for your program.
Test your program. Run it at least three times with different inputs.
Save your program as a .txt file for you cannot upload a .py file.
Evaluate your project using this rubric.

Answers

Answer:

What's the best to use Microsoft Word or PowerPoint

Explain the applications software that you use everyday

Answers

Answer:

Game software e.g PES, Star wars

373 + 891 = 891 + ____ find the whole number​

Answers

Answer:

373

Explanation:

Answer:

373

Explanation:

Commutative property, If my answer helped, kindly mark me as the brainlest!!

Help


Which of these lines of code will increment a variable?


A.

print(variable)


B.

count(variable)


C.

inc(variable)


D.

variable = variable + 1

Answers

the answer is A :) hope it’s right have a nice day

How can I watch you-tube on my school computer without it being blocked on the computer when it uses Lightspeed Systems Relay or do you know any playback sites that aren't blocked ?

Answers

Answer:

if u use chrome u can probably look on chrome extensions and search you-tube unblocker and add it to ur chrome

which category does this fall in identity theft​

Answers

Answer:

A crime.

Explanation:

It's illegal.

How do I make someone "Brainiest".
First person to reply will get "Brainiest"

Answers

Answer:

Usually when someone answers a question there would be an option to mark the brainliest. However, you only get one every like 24 hrs so if you already gave someone brainliest you can't give it to someone else for a while

Explanation:

Answer:

Brainiest

Explanation:

A Floppy Disk is an example of:
a) Primary Storage Device
b) Secondary Storage Device
c) Software Device
d) All the above

Answers

Answer:

B I think-

Explanation:

Its either Primary or Secondary :) pretty sure its secondary tho

Answer: Answer is B Heart if this was helpful

Explanation: Alternatively referred to as a floppy or floppy disk, a floppy diskette is a storage medium capable of holding electronic data, like a computer file.

Militarism is the belief that a country should have a strong military capability and be prepared to use it aggressively to defend or promote its interests.

Answers

Yes this true you should look up Maga

Kyra is teaching a photography class. She would like her students to share photos. She would also like the students to be able to review other students' photos and offer feedback. What technology should Kyra use?

a blog
a wiki
a domain
e-mail

Answers

Answer:

A blog.

Explanation:

A blog can be defined as an informative or discussion-based website that is updated regularly and published over the internet. The informations that are posted on a blog are usually done chronologically and it includes pictures, videos, music, movies, novels, etc.

In this scenario, Kyra is teaching a photography class. She would like her students to share photos, be able to review other students' photos and offer feedback.

Hence, the technology Kyra should use is a blog because it would avail the users (students) to post photos, make comments on blog posts and review items posted by others.

Sean is considering a career in construction but is worried about job security. Which of the following arguments might help convince him to
enter the construction industry? (Select all that apply.)
Because it is site specific, construction work is impossible to outsource.

Even when the economy is poor, demand for building maintenance remains high.

The educational requirements vary depending on the specific construction job.

Construction work varies by season, but all workers have come to expect this.

Answers

Answer:

Because it is site specific, construction work is impossible to outsource.

Even when the economy is poor, demand for building maintenance remains high.

Construction work varies by season, but all workers have come to expect this.

Explanation:

Answer:

Even when the economy is poor, demand for building maintenance remains high.

Because it is site specific, construction work is impossible to outsource.

Explanation:

witch is it?

i got it rong

Answers

Explanation:

first u need to learn spelling second theres no picture

While you are working on your computer, it shuts down unexpectedly, and you detect a burning smell. When you remove the case cover, you notice a distended capacitor. What can you do to fix this problem

Answers

Answer:

fire

Explanation:

hydrant

Answer:

Replace the motherboard

Explanation:

Other Questions
14k -14m - 23k + 59m Animals like lions and wolves reproduce using sexual reproduction.O TrueFalse Use the quadratic formula to solve the equation.2x2 7x - 3=0Enter your answers, in simplified radical form, in the boxes A new novel is selling for $17.95. If it is on sale at 40% off, find the amount of discount and the sale price. A. Discount: $10.77; Sale Price: $7.18 B. Discount: $4.39; Sale Price: $13.56 C. Discount: $13.56; Sale Price: $4.39 D. Discount: $7.18; Sale Price: $10.77 The area of the school's lake is 7,539.14 m.1. What is the radius of the lake?2. What is the diameter of the lake?3. What is the circumference of the lake? During the new Moon phase, the Moon moves between Earth and the Sun. At this point, the Sun is m kilometers from the moon and e kilometers from Earth. Which absolute value expression represents the distance between the Moon and Earth? es A) le - ml B) mel Im-el D Cannot be determined I really need help marking Brainliest if its right please explain your answer Make sure its correct:D I dont Understand it..... 10 points - What is the 9th term of the sequence?2, 8, 32, 128... Why were many British colonists forced to move out of colonies like Virginia? what was the reason for Kenyatta's call for independence In the section "Tourists Flock Here," how does the author develop the idea that people enjoy the cherry trees?By specifying that the cherry trees do not bear fruit, the author highlights that people who visit the trees do not do so for personal gain.By inventing a scene of police chasing away cherry-picking boys, this creates a mental picture connecting the cherry trees to fun.By noting that three railroads have advertised the cherry blossom season, the author highlights that the companies want to make the trees a tourist attraction.By saying that few Washingtonians know about the cherry trees in their city, the author highlights that the attraction has the potential to become more famous. The function y = 5.45 + 1.05(x + 7) can be used to determine the cost in dollars for a prepaid cell phone plan of x minutes. What is the rate of change of the cost, in dollars, with respect to the number of minutes purchased? Read this excerpt from "It's My Constitutional Right!"The officer ordered her to get up. Again Claudette refused. He returned to the driver and explained that as a transit policeman he lacked the authority to make an arrest. The doors closed behind him as he stepped down into the street and the bus pulled away again. One block north, at the intersection of Bibb and Commerce streets, a squad car was waiting. This time, when the Highland Gardens bus door opened, two Montgomery city policemen climbed aboard. Passengers held their breath. CLAUDETTE: One of them said to the driver in a very angry tone, "Who is it?" The motorman pointed at me. I heard him say, "That's nothing new . . . I've had trouble with that 'thing' before." He called me a "thing." They came to me and stood over me and one said, "Aren't you going to get up?" I said, "No, sir." He shouted "Get up" again. I started crying, but I felt even more defiant. I kept saying over and over, in my high-pitched voice, "It's my constitutional right to sit here as much as that lady. I paid my fare, it's my constitutional right!" I knew I was talking back to a white policeman, but I had had enough.What differences can be found when contrasting the mood of the third-person account with that of Claudette's first-person account?The mood of the third-person account is less emotional and more matter-of-fact. The mood of Claudette's account is more emotional and heated.The mood of the third-person account is less emotional and more matter-of-fact. The mood of Claudette's account is more emotional and joyous.The mood of the third-person account is more emotional and heated. The mood of Claudette's account is less emotional and more matter-of-fact.The mood of the third-person account is more emotional and dramatic. The mood of Claudette's account is less emotional and more detailed. Carbon-14 tests are often performed to determine the age of an organism that died a long time ago. Carbon-14 has a half-life of 5730 years. If a turtle shell is found and tested to have 65% of its original carbon-14, how old is it whats an example of geographic context ? Triangles angles from largest to smallest Can somebody plz help me plz!!! ASAP 20 points PLEASE HELP VERY URGENT1. a) All of the balloons should be moved to the center of the floor. b) Each balloon should be inflated more so that they are all increasing in size. c) Each balloon should be deflated so that there is more distance between the surface of each balloon. d) All of the balloons should be moved away from each other so there is more distance between them.2. a) All matter and energy were contained inside the small point. b) Matter and energy came from dark areas of the universe and were attracted to the small point. c) Matter and energy fell into the small point the same way a black hole attracts matter and energy. d) Matter was condensed into a single point until energy was attracted to the matter from dark areas of the universe. Priscilla was building a circuit that used copper wires to connect a battery to a light bulb. As she connected the final wire from the light bulb back to the battery, the light bulb turned on. Priscilla knew that current was now flowing through her closed circuit. What makes the current in the circuit flow? Your TaskThink of an area that interests you: sports, arts, entertainment, international relief efforts, government, careers, or the weather. Think of a question you would like to answer. Is it better to wait until the battery is low before you recharge your smartphone? How does a streaming service like Netflix or Hulu decide which shows to offer? Look for a website where someone already collected a large quantity of data to answer that question. While commercial big data sets may have tens of thousands of values, for this project, look for a data set with at least 100 values. You are not going to write a program to analyze these data because you have not yet covered how to read data files. You can describe how the researcher(s) who collected the data used them to answer your question.