1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
storchak [24]
2 years ago
11

Procedural programs specify instructions that a processor must execute to perform computations. These programs sometimes consist

of functions and procedures. Functions perform specific tasks and return values to the main procedure. Procedures do not return values. Programs written using declarative languages consist of inputs and desired outputs without any instructions. Declarative languages are also known as non-procedural languages. Structured Query Language (SQL) is an example of a declarative language.
Computers and Technology
1 answer:
Zarrin [17]2 years ago
7 0

Answer:

hk

Explanation:

You might be interested in
"Using the printf method, print the values of the integer variables bottles and cans so that the output looks like this: Bottles
Anika [276]

Answer:

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       

       System.out.println("Enter the number of bottles and cans:");

       int numberOfbottles = in.nextInt();

       int numberOfcans = in.nextInt();

       System.out.printf("Bottles: %8d\n", numberOfbottles);

       System.out.printf("Cans:    %8d\n", numberOfcans);

}

}

Explanation:

Ask user to input the number of bottles and cans using Scanner class

Print the results so that the numbers to the right line up (Since we know that the numbers have at most 8 digits, we can use %8d in printf. Also, be aware that how printf statements are written so that the numbers line up)

6 0
3 years ago
Problem 1. MST - Prim's and Kruskal's algorithms
Juli2301 [7.4K]
Or maybe not Encryption converts the data in a database to a format that is indecipherable to unauthorized users who attempt to bypass the DBMS.

a. True
b. False
7 0
3 years ago
What format are a setups program file in before executed?
UkoKoshka [18]
.EXE as they are executable programs.  However, it depends on the operating system
6 0
3 years ago
Suppose we have two threads inserting keys using insert() at the same time. 1. (5 points) Describe the exact sequence of events
Leona [35]

Answer:

Say you have a key in a dictionary, or a key in a 2-d list. When you insert(), you are destructively iterating the original list and modifying it to reflect the insert() component. In order for the key to get lost you would have to do say insert(len: :1) which would remove the second key and therefore cause it to get "lost" because it will be destructivsly removed from its assignment and replaced by whatever you choose to insert.

Rate positively and give brainlist

8 0
3 years ago
How many passes will it take to find the four in this list?
Vaselesa [24]
I don’t know what the heck is it true
3 0
2 years ago
Read 2 more answers
Other questions:
  • 3. Describe what a pre-processor does in a network-based IDS tool such as Snort. Demonstrate your understanding of this function
    6·1 answer
  • Write a client program that writes a struct with a privateFIFO name (call it FIFO_XXXX, where XXXX is the pid that you got from
    11·1 answer
  • True or false? If you’re posting the same content across different channels, make sure you post them simultaneously—on the same
    10·1 answer
  • Clicking on the cube that appears in the top right of the 3D view window will: (1 point)
    6·1 answer
  • write a script to check command arguments. Display the argument one by one (use a for loop). If there is no argument provided, r
    6·1 answer
  • Good information is characterized by certain properties. Explain how you understand these characteristtics of good information.
    14·1 answer
  • the volume of two similar solids are 1080cm and 1715cm .if the curved surface area of the smaller cone is 840cm .fond the curved
    5·1 answer
  • What is the binary conversion of 179.187.223.21?
    11·2 answers
  • What is a primary risk to the Workstation Domain, the Local Area Network (LAN) Domain, and the System/Application Domain
    10·1 answer
  • Data will zip through a 5G network much faster than through a 4G network because of the 10-fold difference in _____.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!