1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mixer [17]
3 years ago
10

Why procedures are used and what must be the lastexecutable instruction in a procedure?

Computers and Technology
1 answer:
Art [367]3 years ago
4 0

Answer:

Procedure are used to create and modifying the programs. Basically, it is grouping of instruction that can be used give direction of the flow of program. Control are given to the next term once the execution of the instruction get over. The steps of procedure are:

procedure are first executed the declaration instruction and then coding the procedure, then it will return to the directories and the last executable instruction is the termination of procedure.

You might be interested in
Bullet points on a slide should be limited to _____.<br><br> A. 2<br> B. 4<br> C. 8<br> D. 10
Brums [2.3K]
<span>Bullet points on a slide should be limited to _____.</span>

B. 4 !
6 0
3 years ago
How would someone know if their were communication devices placed in their homes illegally. Cameras and USB controlling devices?
Licemer1 [7]

<u>Explanation:</u>

Among the recommended options often suggested by IT experts includes:

  • In the case of cameras, using a cell phone around the home switch results in unusual signal interference possibly indicates a special radio frequency coming from the illegally implanted device.
  • The use of a mobile app designed for detecting hidden cameras. For example, the ”detect hidden cameras” app available on iPhone or Android mobile devices is a good tool. This app automatically senses  the radio frequencies of any hardware within the device range.
3 0
3 years ago
You want to transfer a document from one computer to another, and you want the document to be encrypted. The destination compute
Alex_Xolod [135]

Answer:

Check the explanation

Explanation:

This document transfer ought to work smoothly. Due to the IEEE standards and Principles, the presentation layer is expected to encrypt/decrypt the data on both part of the network. The session layer creates a mutual coordination among the applications while the transport layer is there to ensures delivery. Immediately the segments hit the network, routers control and handle the routing process of the packets to the distant end. Layers 6, 3 & 1 are straightly involved in the italicized parts of the question; however, the entire layers play a role when looking at the transfer as a whole.

5 0
3 years ago
Earth's current era is the _______ era.
natita [175]
We are in the Cenozoic Era
6 0
4 years ago
Read 2 more answers
Write any two features of Guided media​
BaLLatris [955]

Answer:

<h3>Guided media, which are those that provide a conduit from one device to another, include twisted-pair cable, coaxial cable, and fiber-optic cable. Guided Transmission Media uses a "cabling" system that guides the data signals along a specific path. The data signals are bound by the "cabling" system.</h3>

pa brainliest po thank you

6 0
3 years ago
Other questions:
  • Refer to the exhibit. A network administrator configures a named ACL on the router. Why is there no output displayed when the sh
    7·1 answer
  • What does it mean for a school to be “accredited”?
    5·1 answer
  • How many check boxes from the following code can be selected at any given time? Home Address Federal Express UPS
    13·1 answer
  • Various units used to measure computer memory
    13·1 answer
  • Design a class named Person with fields for holding a person’s name, address, and telephone number. Write one or more constructo
    12·1 answer
  • Having friends who cause you stress can decrease your happiness, which can in turn
    13·2 answers
  • What is indexing ? How does it make search engines work more efficiently?
    15·1 answer
  • Anyone know how to fix black screen of death on computer​
    6·1 answer
  • Code Problem 2 in Python 2.
    5·1 answer
  • Which factors have increased the need for the latest cybersecurity technologies?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!