1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksano4ka [1.4K]
3 years ago
14

A(n) _____ causes a value to be sent from a called method back to the calling method.

Computers and Technology
1 answer:
Amanda [17]3 years ago
3 0
<span>A return statement causes a value to be sent from a called method back to the calling method.
</span>When used in computer programming the return statement causes execution to leave the current subroutine and resume at the return address, where the term return address denotes the point <span>in the code immediately after where the subroutine was called.</span>
You might be interested in
What is mean by computer ?where it is used?​
dem82 [27]

Answer:

computer is a set consisting of hardware and software that perform specific set of instructions

Explanation:

thy are used in hospitals, institute,hotels

4 0
3 years ago
TLS is not generally compatible with SSL because:__________. 1. SSL is proprietary while TLS is open 2. SSL can interact with it
kodGreya [7K]

Answer:

2. SSL can interact with its earlier versions which is a vulnerability

Explanation:

TLS (Transport Layer Security) and SSL (Secure Sockets Layer) are both used for providing data authentication and encryption between networking devices  (such as servers, PCs and applications) operating over a network. The iterations of SSL were versions 1.0, 2.0 and 3.0. But then, all these iterations had security issues and so TLS 1.0 was released to improve on those security flaws. And seeing that SSL can interact with its earlier versions which are all vulnerable, downgrading TLS to SSL for compatibility sake will abuse the essence of TLS in the first place.

6 0
3 years ago
Examine the following class definition:
strojnjashka [21]

Answer:

The answer is "Option B"

Explanation:

In the given code, a class "DateType" is declared, inside the class, four methods "Initialize, GetYear, GetMethod, and GetDay" is defined, in which the "Initialize" method does not return any value and other methods return a constant type value, which means it value can't be changed.

Inside the class three integer variable is defined, that is"year, month, and  day".  In the "GetDay" method call, it first creates the class object "day1", which is already defined in question and call the method by dot (.), that's why only choice b is correct.

7 0
3 years ago
When making any change to the database structure, we may need to check for effects of the change on ________.?
IrinaVladis [17]
Data, foreign keys, constraints & triggers .
7 0
4 years ago
Which pair of Information Technology career fields may require work to be done outside of normal office hours? interactive media
scZoUnD [109]

Answer:

The answer to this question is "information services and support and network system administration".

Explanation:

The information support and service and network system administration is used to outside work, which can be explained as follows:  

  • The information support and service process is using information processing that is defined as the system for record-keeping, forms, figures and data in a business.  
  • A network or device system administrators are responsible for the day-to-day deployment of all these networks. They arrange, restore, and promote the computer systems of the company, which include local area networks, WANs, system sections, web services, and other wireless communication systems. The system provides local area networks.

6 0
3 years ago
Read 2 more answers
Other questions:
  • IF YOU GET THIS RIGHT U GET BRAINLIEST
    14·2 answers
  • Which formula best expresses your monthly ending balance?
    12·1 answer
  • Anyone know the name of this font? and what site i can find it on so i can type it????
    8·1 answer
  • Describe how an attacker can use whois databases and the nslookup tool to perform reconnaissance on an institution before launch
    8·1 answer
  • Which staff member takes a set of plans and supervises their construction?
    6·1 answer
  • 1.what is a computer?
    5·1 answer
  • Write a method, including the method header, that will receive an array of integers and will return the average of all the integ
    7·1 answer
  • Write a function writel that will write the length of a side of a square. If only one argument is passed to the function, it is
    10·1 answer
  • PLEASE HELP I WILL GIVE BRAINLIEST!!
    8·1 answer
  • Marcus creates a HTML webpage on his favourite game, football. On clicking the word “football” another website containing the in
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!