1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mixer [17]
3 years ago
10

Why procedures are used and what must be the lastexecutable instruction in a procedure?

Computers and Technology
1 answer:
Art [367]3 years ago
4 0

Answer:

Procedure are used to create and modifying the programs. Basically, it is grouping of instruction that can be used give direction of the flow of program. Control are given to the next term once the execution of the instruction get over. The steps of procedure are:

procedure are first executed the declaration instruction and then coding the procedure, then it will return to the directories and the last executable instruction is the termination of procedure.

You might be interested in
A certain database has numerous tables, but they do not share any fields in common. this database will not be as powerful as oth
bija089 [108]
<span>A certain database has numerous tables, but they do not share any fields in common. this database will not be as powerful as others because it is not relational.  In </span><span>a relational database the data elements are dividing the data elements into related tables. Once ready to start working with the data, one can rely on relationships between the tables to pull the data together in meaningful ways.</span>
4 0
2 years ago
Read 2 more answers
An invisible path determining the way of travel from one place to another.
WARRIOR [948]

Answer:

i dont really like computors

Explanation:

im not good at it

3 0
3 years ago
The most effective technique of malware propagation among the following list
iVinArrow [24]

Question Completion with Options:

A. Embedding & packing malcode in application programs

B. Replacing the Import-Address-Table (IAT)

C. Appending & prepending malcode into application programs

D. Embedding malcode in documents, such as MS O Office & PDF

Ε. Replicating malcode's source code

Answer:

The most effective technique of malware propagation among the following list is:

A. Embedding & packing malcode in application program

Explanation:

Malware propagation becomes effective and replicates effortlessly when malicious codes (otherwise called malcodes, which are self-replicating malicious programs) are embedded and packed in application programs.  These usually take many years before they start to manifest, making them very difficult to detect.  They are often triggered by some set events.  Given the nature of malcodes and the culprits behind them, they are very dangerous to applications and pose substantial business risks.

6 0
3 years ago
My name Jeff <br><br> what movie is this off of
Zielflug [23.3K]

Answer:

there is no movie name off of

4 0
3 years ago
Read 2 more answers
Danica is creating a flyer for her cookies that she will sell during her school fair. She wants to add a registered
White raven [17]

Answer:

Putting the insertion point where she wants the symbol.

Hope this helps!

3 0
3 years ago
Other questions:
  • Which ones are right
    15·1 answer
  • Obtain a file name from the user, which will contain data pertaining to a 2D array Create a file for each of the following: aver
    5·1 answer
  • The principle of time preference requries a larger payment in the future than the present. Which situation best illustrates this
    12·1 answer
  • Which osi/iso layer is responsible for determining the best route for data to be transferred?
    5·1 answer
  • Translation of a file into a coded Format that occupies less space than the original file is called
    6·1 answer
  • What is the output?<br> &gt;&gt;&gt; phrase = "hello mom"<br> &gt;&gt;&gt; phrase upper()
    6·2 answers
  • What is the long tube on a microscope called​
    15·1 answer
  • Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser on
    6·1 answer
  • I want to start a debate about something
    9·2 answers
  • An IP address specifically belongs to:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!