1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
egoroff_w [7]
3 years ago
15

A(n) ________ statement specifies the value that is returned from the function when the function ends.

Computers and Technology
1 answer:
tia_tia [17]3 years ago
6 0

Answer:

The appropriate answer is "return ". A further explanation is given below.

Explanation:

  • The return seems to be a statement or declaration throughout the programming that instructs a program to consider leaving the subroutine as well as then go up later to either the return address. The return address wherever another subroutine becomes named is found.
  • This statement has either been returning and perhaps return value in certain computer languages.
You might be interested in
Which of the following allows you to view and access important information about your document all in one location?
Serjik [45]
I believe that the options are:

A. Menu bar
B. Help icon
C. Status barb
D. Backstage view

both status bar and backstage view have information about your document that you can view, but backstage view has more information and also information that you can also edit- so i believe that this is the best answer.

4 0
3 years ago
Who made computer ? Which year?
myrzilka [38]

Answer:

The first computer that resembled the modern machines we see today was invented by Charles Babbage between 1833 and 1871.

8 0
3 years ago
Read 2 more answers
The first row of a table is often called the _____ row.
satela [25.4K]

ANSWER:

The first row of a table is often called the header row.

~batmans wife

7 0
3 years ago
Read 2 more answers
In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in
kap26 [50]

<u>Explanation:</u>

a.

  • One user can read the private data of another user-privacy.
  • One user can prevent another user from getting anything done-denial of service.

Indeed, in any multiprogramming and time-sharing environment since the computers of users are networked together, then it is very possible for a bad actor to read the private data of another user, or even prevent another user from accessing their computer by employing a denial of service attack on the network. In other words, the network would be unable to handle the request of users since has been overloaded by another user.

b. a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing and fairly shares the computer, then we can achieve the same level of security.

7 0
3 years ago
Which of the following help departments organize unique access controls for access to folders and data files within a department
never [62]

Answer:

B. Role-based access controls

Explanation:

Roll-based access control is a way to control access to the network and to data which depends on the position of employees in a department. This way the permission to access information are granted according to roles that are assigned to employees. This type of access control allows access privileges to employees only to the folders and data files which they need in order to perform their tasks and it does not allow them to access the data or information which is not relevant to them. This helps the department to secure the sensitive information and data files and reduces the risk of data breaches.

6 0
3 years ago
Other questions:
  • 7. Write a program in C to display the string "ARRAY" in the following format : A AR ARR ARRA ARRAY
    5·1 answer
  • You created a vm and installed windows server 2008 r2 over the network, using pxe boot. when you start the vm, it doesn't attemp
    7·1 answer
  • Write 2-3 lines about the Basic operations of computer
    5·1 answer
  • To make a black and white image out of a color image, you would use which option?
    7·1 answer
  • What technology is being used instead of Adobe flash player​
    8·1 answer
  • List at least five smaller behaviours you could break the complex behaviour ""brushing my teeth"" into.
    6·1 answer
  • Code in Java:
    6·1 answer
  • 9 Which of these words is used to begin a conditional statement? ​
    8·1 answer
  • To uncompress the data back into its original binary state, you simply reverse the process. This technique is an example of what
    7·1 answer
  • Carl wants to add two new characters to the extraterrestrial battleship game he's
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!