1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GuDViN [60]
4 years ago
13

In your own words, explain at least one reason why programming languages have functions.

Computers and Technology
1 answer:
Nataly [62]4 years ago
5 0
Programming languages have functions because, they are the set of operations that may be applied to objects of that particular class.
for an example I will attach a function, you just check it

brainliest pls

You might be interested in
How to design remote access policy using the appropriate access controls for systems,applications, and data access
nata0808 [166]

Answer:

All remote access users connect to the network and maintain all security standards on the device including

Valid and virus protection

Malware protection

Maintain the OS

Explanation:

The remote access policy applies to employees and other affiliates who owned devices to remotely access the Network CCC. The remote policy access connection is used to perform the work activities on the behalf of CCC. Remote access system, application and can be accessed with the internal CCC network. Example of application are as follow:

Internal Academic System

Internal websites

Documents files on internal file

Local colleges resources

Servers

Remote access will be managed by System Data Center and use security measures based on requirements.

Remote access is provided as an extension of the normal work environment.

Review the CCC information technology for protecting information via the remote method.

The employee will use remote procedures. Employees disclose the passwords and if the business is conducted from home.

All remote access includes a "time-out" system. In accordance with CCC and will time out the specified period of inactivity.

The access users accept the access and connection to networks and monitored to record dates, time. Identify accounts and have been compromised by external parties.

The remote access user may be listed in the remote access application.

4 0
3 years ago
which software is used to mimic intricate hand drawings into digital paintings? _____ is used to replicate hand drawings into di
bixtya [17]

Answer: Graphics tablet

hope this helps

6 0
3 years ago
Information is a valuable asset and not everyone in the world can be trusted with it. Therefore, we need to protect our valuable
sergey [27]

Answer:

True.

Explanation:

6 0
4 years ago
(fill in the blank) <br><br> ____ is when data is formatted, transmitted and received in a network.
nadya68 [22]
I think it’s data transmission
3 0
3 years ago
Which is the process that a wireless router uses to translate a private ip address on internal traffic to a routable address for
luda_lava [24]
<span>The process that a wireless router uses to translate a private ip address on internal traffic to a routable address for the internet is </span>Network address translation<span> (NAT).  It is a method of relabeling one </span>IP address<span> space into another by altering network </span>address<span> information in IP header of packets while they are in transit across a </span>traffic routing<span> device. </span>
7 0
3 years ago
Other questions:
  • Molly wants to make some cells in her balance spreadsheet different colors so that she can more quickly find important data. Wha
    13·2 answers
  • If johanna wants to label the x- and y-axes, she should click Layout, then
    8·1 answer
  • 4.17 LAB: Varied amount of input data ( C++)
    5·1 answer
  • When referring to hard drives, access time is measured in
    11·1 answer
  • The construction of a mixed media assemblage would be considered
    9·1 answer
  • If you copy a drawing from the Internet and use it in a report, you might be violating the artist's
    8·1 answer
  • Which of the following examples can be solved with unsupervised learning?
    8·1 answer
  • Lol fortnite really going UwU and anime
    12·2 answers
  • Which of the following is not considered essential for an electronic device to be called a computer?
    15·1 answer
  • What is a software program for navigating the web and displaying websites and pages?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!