1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
3 years ago
10

We _____to separate the code in sub programs from the main code Please help!!

Computers and Technology
2 answers:
natta225 [31]3 years ago
7 0

Answer:

Indent

Explanation:

Indenting the code in the subprogram separates it from the main program and simplifies the process, making it easier to do.

joja [24]3 years ago
5 0

Answer:

We Ident to separate the code in sub programs from the main code

Explanation:

We separate the main program from the subprograms by indenting the code in the subprogram. We call a method when we type its name. This moves the control of the program to the method.

You might be interested in
Which search strategy explores nodes from the initial state as well as the goal state?
Simora [160]
Pretty sure it’s c! I’m not 100% tho sorry if I’m wrong have a nice day:)
5 0
3 years ago
Read 2 more answers
You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attack
Strike441 [17]

Answer:

Intrusion Prevention System (IPS)

Explanation:

Firewall can be defined as a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Simply stated, a firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

A firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access.

Basically, it is a network security device or security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer

Thus, the tool you should use is an intrusion prevention system (IPS).

6 0
3 years ago
How do you change the name on your brainly account?
serg [7]

Answer:

For changing your username you can contact to administrator of the site. If you are using app then go to message option. Then search "rishilaugh" then you can message him. Hope it helps you!

8 0
4 years ago
In understanding "controlling for" a third variable, which of the following is a similar concept? a. Conducting a replication b.
nordsb [41]

Answer:

D) Identifying Subgroups

Explanation:

In data Analytics, a third variable also known as a confounding variable, is a variable that "sits in-between", it has influence on both the independent variable and dependent variable. If this "third variable" is not properly handled, the result of the anlysis will yeild incorrect values. identifying subgroups in a dataset is important for undertanding it

7 0
3 years ago
What is the different between image processing and machine vision? Please explain with an example.
HACTEHA [7]

Answer:

 The image processing is the method in which the image are get manipulated by using the electrical signals. It basically perform various types of operations in images to get some useful data or information and also for enhanced the image. It is basically a type of the signal processing where the input is image and the output is features and various characteristics of the image.

For example: Television images.

Machine vision is defined as the technology in which it provide various image based applications like system control, automatic inspections and also used in various industries. It basically refers to the hardware, software and integration system in the computer science.

For example: Analysis of various types of electronic components.

4 0
4 years ago
Other questions:
  • Write a program that determines the price of a movie ticket (similar to the one in the chapter). The program asks for the custom
    9·1 answer
  • An example of software is
    9·2 answers
  • When you are notified that a user’s workstation or system is acting strangely and log files indicate system compromise, what is
    5·1 answer
  • Clifford created a table using OpenOffice Writer and entered some information into the table. Later, he needed to add more rows
    15·2 answers
  • Me2540 week 5 assignment<br> what do i want to know?
    9·1 answer
  • E-mail is an temporary message medium.<br> a. True<br> b. False
    5·2 answers
  • If a small monster collector:- Has 16 small monster containment devices and intends to use all of them.
    10·1 answer
  • Bruh why is everyone skipping my question!!!!!!!
    6·1 answer
  • Which of the following correctly describes the reason for quality customer service?
    9·1 answer
  • The __________ was the first all electronic computer.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!