1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
chubhunter [2.5K]
2 years ago
13

What is a return statement used for?

Computers and Technology
1 answer:
Aleonysh [2.5K]2 years ago
4 0

Answer:

Exiting a function

Explanation:

Return simply returns a specified value at the end of a def function (if you're in python). It does not print or do anything else. You could set variables equal to a def function that returns or you could put the def function in a print statement to print the returned value.

You might be interested in
What is ransomware<br>я​
Novosadov [1.4K]

Answer:

Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again. It has the ability to lock a computer screen or encrypt important, predetermined files with a password.

Explanation:

:)

5 0
2 years ago
In Linux, when logged in as a normal user with root privileges, which command must precede the apt-get command in the command li
siniylev [52]

Answer:

"sudo" is the command to get super user or root privileges in linux.

Explanation:

in order to install package with root privilege in linux, the command would be

sudo apt-get install <package name>

8 0
3 years ago
How I can learn writing code?
slavikrds [6]

A good website to learn coding is called Lynda.com. It costs money but its well worth it!

3 0
3 years ago
Read 2 more answers
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
KatRina [158]

Answer:

Advanced persistent threat.

Explanation:

Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.

It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.

7 0
3 years ago
The pseudoinstructions that are available in an assembly language programming environment usually found in the Select one: a. CP
mafiozo [28]

Answer:

b

Explanation:

CPU manual provides guides to use a CPU.

Assembler manual provides guide on how to use an assembler and so is the case for compiler.

For a particular machine, it set of instructinos are available with the programmer.

6 0
3 years ago
Other questions:
  • Allan needs to ensure that an object is in a very precise location on a slide. He decides to use the Ruler option to achieve thi
    5·2 answers
  • Using the __________ option, you can change the state of a model back to where a particular feature or features weren`t yet crea
    7·1 answer
  • ____ is the code of acceptable behaviors users should follow while on the internet; that is, it is the conduct expected of indiv
    10·1 answer
  • What is the term used for a set of programs that acts as an interface between the applications that are running on a computer an
    13·1 answer
  • you have a small network in your business with just a few network devices connected along with 22 linux computers and you want t
    7·1 answer
  • What type of maintenance is required of a computer’s power supply to ensure that it remains in working order?
    15·2 answers
  • Only technical managers needs to know about programming, web view source code and about technology issues.
    12·1 answer
  • Ok so this question is kinda weird but does anyone know what google drive is. If so how do you upload a video to it?
    11·2 answers
  • What do you do when you have computer problems? Check all that apply. PLEASE HELP
    9·2 answers
  • Why is monitor called softcopy output device?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!