1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRISSAK [1]
3 years ago
11

Which task might be suitable for moving into a separate function so you can re-use it from multiple places in your code?

Computers and Technology
1 answer:
Fudgin [204]3 years ago
8 0

Answer:

The answer is "All of these could make good functions ".

Explanation:

In the given question some information is missing, that is options which can be described as follows:

a. Ask the user to confirm an input with a yes/no answer

b. Sort some input data into an ordered list

c. All of these could make good functions

d. Calculate a complex mathematical expression

A method is a collection of ordered code and provides a generic code, that is used to execute a single, connected operation.

  • A good function is a function, which takes values from the user and it will sort all the data and store in memory, and whenever we call the function, it will give the values.
  • It is also used to calculate some complex values,
You might be interested in
It is easier to make an object move across the screen by using the tweening function rather than creating each individual frame
Vesna [10]
Uhhhh I believe it’s true if it’s wrong I’m srry ....
3 0
3 years ago
The max-age attribute of a cookie is specified in
defon

Answer:

seconds.

Explanation:

max-age attribute of a cookie is specified in seconds.It sets the time when the cookie will be deleted.max-age attribute is not supported by all the browser.Internet Explorer does not support max-age.Son expires is used more than max-age because it supports almost all the browsers.

6 0
3 years ago
In command prompt, Whats a command that will list only .ini files in C:\Windows\System32 directory?
Ber [7]

Answer:

The dir command is a Command Prompt command that's used to display a list of the files and subfolders contained in a folder.

hope it helps

3 0
4 years ago
Read 2 more answers
Which account type is require to join the computer to the domain?
yulyashka [42]

Answer:

the computer must have an account in the domain which, like a user account, includes a logon name (sAMAccountName), a password, and a security identifier (SID) that uniquely represent the computer as a security principal in the domain.

Explanation:

-Hailey:

4 0
3 years ago
Regarding the Internet of Things (IoT), a business involved in utilities, critical infrastructure, or environmental services can
love history [14]

Answer:

The answer is False

Explanation:

IOT or Internet of things refers to the multiple devices in the world today, which are connected to the internet, they gather and share specific information. Any physical object can become an IOT device once it can be connected to the internet to control its data.

Since, the business is involved in utilities, critical infrastructure, or environmental services, it will not benefit from traffic-monitoring applications.

7 0
4 years ago
Other questions:
  • Implement the function unique that takes as a parameter a two-dimensional list and returns a one-dimensional list containing all
    6·1 answer
  • Which of the following Office Online apps is most effective for creating spreadsheets?
    14·2 answers
  • 1) Why is angle of view important? What are some of the ways that you can do this?
    6·1 answer
  • Write a program that prompts the user to input the number of quarters, dimes, and nickels. The program then outputs the total va
    10·1 answer
  • The language C was originally developed by​
    11·2 answers
  • What should you do in order to have access to the header and footer tools? Open the View tab. Open the Page Setup dialog box. Op
    6·1 answer
  • Write an essay about yourself based on the dimensions of ones personality​
    9·1 answer
  • A form of encryption that uses only one key to encrypt and decrypt a file. This is a less
    14·1 answer
  • Which item best describes fiber optic transmission?
    14·1 answer
  • 8.10 Code Practice Question 1
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!