1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mr_godi [17]
3 years ago
6

Which is the best programming practice?

Computers and Technology
1 answer:
irina [24]3 years ago
4 0

Answer:

Open a file when the program needs to work with it and close the file as soon as you have finished using it.

Explanation:

In programming, we have some files that are stored in memory, or created in some other section of the program to save information.

<u><em>for example</em></u>, we want to save the data of a class or school faculty to create a database. For this purpose I need to create a file.

As the files that we will create may contains data, these files will utilize computer resources such as, memory (RAM, Cache) and other resources. While programming, we need these resources as well.

<em>Therefore, It is necessary to open a file when the program needs to work with it and close the file as soon as we have finished using it. The reason is that, it takes computer resources which are limited.    </em>

You might be interested in
Inheritance enables an object, called a _____, to derive one or more of its attributes from a parent.
jarptica [38.1K]

Answer:

The answer is C.) child

I hope this helps! ^-^

6 0
2 years ago
A previously saved labels report can be accessed from the
Tcecarenko [31]

C. is the answer to that question

6 0
3 years ago
Why is Resnick skeptical of calling the young people of today ‘digital natives’? Do you agree? Explain.
Nezavi [6.7K]

For question one, Resnick skeptical of calling the young people of today 'digital natives' will have to be agree. For agreeable reasons is because people who are called "digital natives", is because they are in a technological state that they are familiar with. Which means that if young people are in a state of technology and they are really into it, you have this unbreakable string tied to the waist and it hangs into you from a tree.  And for reason two, is because coding can be helpful. In situations like people hacking you, with coding, now that is when it comes in.

And for the others, I'll have to look at some more information I might have. But, here is your first answer is up above, If it isn't good enough, then let me know.

Hope this helps.

~Karleif

3 0
4 years ago
If you experience database corruption, what should you do before performing a restore operation
Vinvika [58]
<span>If we experience database corruption, one thing we should do before performing a restore operation</span><span> is to backup the transaction log tail.</span>
3 0
4 years ago
A camera obscura is also called which of the following?
koban [17]

I believe it is (D) A pinhole camera

8 0
4 years ago
Read 2 more answers
Other questions:
  • When you record a macro, all of the actions are converted by the program to code
    5·2 answers
  • The home keys on the numeric keypad are?
    15·2 answers
  • A user receives a phone call from a person claiming to be from technical support. This person knows the users name and that the
    12·1 answer
  • Write an expression that evaluates to true if the value of the string variable s1 is greater than the value of string variable s
    7·1 answer
  • What is a benefit of using a combination of symmetrical and asymmetrical cryptography when transferring data across the internet
    6·1 answer
  • Which of the following is a correct statement about writing down passwords on a ""cheat sheet?""
    7·1 answer
  • To find out where a particular command is taken from, you can use the _____________ command.
    14·1 answer
  • Plz answer me will mark as brainliest ​
    8·1 answer
  • You CANNOT add text to any filled shape.<br> O True<br> False
    8·1 answer
  • A computer network is _____.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!