1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lina20 [59]
4 years ago
8

An application calculates an ending inventory amount based on a beginning inventory amount, sales, and returns. You need to crea

te a function to calculate the ending inventory using three passed Integer variables: intBegin, intSales, and intReturns. Which procedure headers should be used?
Computers and Technology
1 answer:
Bogdan [553]4 years ago
8 0

Answer:

Private Function CalculateInventory(ByVal intBegin As Integer, ByVal intSales As Integer, ByVal intReturns As Integer) As Integer

Explanation:

In Visual Basic Programming language a function header begins with the access modifier, in this case private, this is followed by the keyword function then the name of the function in this case CalculateInventory. We specify that the function will take three parameters as stated in the question and the function will return an Integer value. When this function is called, the three parameters will have to passed to it as arguments.

You might be interested in
IVD. IIIcelTICISTUSTUSE LIICIULUI 1.12. Which of the two systems do you think will need the largest motor? Explain your answer.​
zhannawk [14.2K]
Transmission motor motor
8 0
3 years ago
You are designing an internet router that will need to save it's settings between reboots. Which type of memory should be used t
Phoenix [80]

Answer:

d. Flash

Explanation:

A flash memory can be defined as an electronic non-volatile memory chip (storage medium) that is typically used on computer systems and other digital devices such as routers, USB flash drives, switches, digital cameras, mp3 players etc. A flash memory is an electronically erasable programmable read only memory (EEPROM) and as such data saved (written) on it can be erased electronically. Also, a flash memory do not require a source of power (electricity) to save or retain data through the use of a floating gate MOSFET (FGMOS) or floating gate transistor.

In this scenario, you are designing an internet router that will need to save it's settings between reboots. The type of memory that should be used to save these settings is a flash memory because it does not require power to write or save data.

8 0
3 years ago
The Danger zone around a robot is?
mojhsa [17]

maybe a EMP. tell me if im right

3 0
3 years ago
Read 2 more answers
How are phishing, ransomware and distributed- denial of service attack alike and different?
Aleks04 [339]

Answer:

Phishing means cyber theft in which the cyber thief sends the target PC a malicious email, which looks like coming from some known source, and they ask for certain critical information, which must not be leaked. Similarly, In ransomware, they send the phishing email with malicious code, and they hack the computer system. They then ask for a ransom as a return for reactivating your PC. Distributed Denial of service attack happens when the traffic flood the bandwidth and the resources of a PC, and finally a lot of are denied of access to them. Ransomware, when it attacks a bank account, becomes a Denial of service attack, as multiple users are stopped from accessing their account. All of these are hence, almost the same and revolves around the phishing email.

Explanation:

Please check the answer.

8 0
3 years ago
Tony Stark wants to build a 1000 meter high tower as quickly as possible. He has unlimited resources and an unlimited budget and
Irina-Kira [14]

Answer:

bruh is this for real. Dang if it is im sorry for wasting an asnwer. if not ill give you what i think

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • Most keyboards today are in a
    8·1 answer
  • Question 2 of 5
    8·1 answer
  • When cleaning a computer, you need only worry about what you can see.
    11·1 answer
  • Access time is:________.
    11·1 answer
  • A _____ attack floods a network or server with service requests to prevent legitimate users' access to the system. phishing back
    5·1 answer
  • Benching system are prohibited in
    5·1 answer
  • True/False - According to CP-14 Sale of Modular Homes, a licensee who sells land and a modular home to be affixed to the land, t
    11·1 answer
  • If 2 people use my code D9R2M on fetch reward and scan receipts I will give brainliest ​
    13·2 answers
  • Web designers use programming languages to write websites. A True <br> B False​
    15·2 answers
  • One word for The characters typed by a user using a<br> keyboard.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!