1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mr_godi [17]
3 years ago
6

Which is the best programming practice?

Computers and Technology
1 answer:
irina [24]3 years ago
4 0

Answer:

Open a file when the program needs to work with it and close the file as soon as you have finished using it.

Explanation:

In programming, we have some files that are stored in memory, or created in some other section of the program to save information.

<u><em>for example</em></u>, we want to save the data of a class or school faculty to create a database. For this purpose I need to create a file.

As the files that we will create may contains data, these files will utilize computer resources such as, memory (RAM, Cache) and other resources. While programming, we need these resources as well.

<em>Therefore, It is necessary to open a file when the program needs to work with it and close the file as soon as we have finished using it. The reason is that, it takes computer resources which are limited.    </em>

You might be interested in
Which of the following enable unauthorized access to your network, and by extension, the sensitive documents, proprietary code,
oksano4ka [1.4K]

Answer:

(a) Weak passwords

Explanation:

Typically, a password is weak if it is easily discovered by all persons including unauthorized users. When passwords to a network are weak, the network is vulnerable to unauthorized access and may permit access to proprietary code, accounting files and other sensitive documents in the network.

Examples of weak passwords are;

i. those generated from the name of a user.

ii. those generated for a user by default.

iii. those generated from words from dictionary or other similar materials.

iv. those that don't include a combination of letters and numbers and even symbols.

v. those that are short in length e.g less than 8 characters.

3 0
3 years ago
Read 2 more answers
Why should technology be used. No plagiarism pls.
olga nikolaevna [1]

Answer:

Explanation:

mobile devices and the applications they help us in life devisec can individualize instruction. three specific reasons that technology is good is that it saves lives by improving medicine, keeps us connected to each other, and provides education and entertainment. One reason why technology is good is that it has saved many lives.

3 0
3 years ago
Read 2 more answers
What tools can you use to delete active directory users?
8090 [49]
Hi,

Every operating system haves its own terminal.
If you are on a Windows computer open command prompt as administrator and you can delete user directory by typing.

"net user <username> /delete"

This will delete the user from the computer including his/her data.

Hopefully this will help.
r3t40
5 0
3 years ago
Give a name of the part responsible for memorising a cell phone number​
erik [133]

cerebrum

Explanation:

it controls all voluntary actions and also controls all the higher thought processes such as memory, judgement and reasoning

4 0
3 years ago
How would be the human life in the absence of technology
Kipish [7]

Answer:

Horrible!

Explanation: this is because all of our food would go bad firstly. Refridegerators wouldn't work. Also NO social medie taking away social media  is like cutting off your O2 supply. No phones, no TV, no computers etc... but also our planet would be a better place. No pollution, no batteries harming the enviornment .

7 0
3 years ago
Other questions:
  • These things are commonly found on the front of desktop computer cases:
    12·1 answer
  • Please help!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
    12·2 answers
  • Pick the correct statements regarding cell references.
    8·2 answers
  • Full form of SMPT???
    15·1 answer
  • Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network serv
    5·1 answer
  • In order to use an object in a program, its class must be defined.
    9·1 answer
  • I am trying to write a c++ program like the game typeracer. When the player starts the program he will be asked to write a sente
    5·1 answer
  • A user has just reported that he downloaded a file from a prospective client using IM. The user indicates that the file was call
    11·1 answer
  • If Anyone can help me out that'll be great
    11·1 answer
  • I am trying to code a lifting simulator game on ro-blox. These problems listed in the third picture tells you the problems. If y
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!