1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Travka [436]
3 years ago
12

When a statement within a try block causes an exception, the remaining statements in the try block Select one: a. are executed a

fter the statements in the catch block b. are executed before the statements in the catch block c. aren't executed
Computers and Technology
1 answer:
NikAS [45]3 years ago
3 0

In C++, 'Try block' comprises of a group of statements in which there is a probability of an exception to take place.

C). The statements that would be left in the try block in case a particular statement leads to an exception 'can't be executed.'

  • In case an exception takes place, the left statements in the try block fail to function.
  • This is the primary reason for which a catch block immediately succeeds a try block in order to deal with the exception and help close that code to allow the statements to work.
  • Thus, <u>option C</u> is the correct answer.

Learn more about 'Try block' here:

brainly.com/question/14186450

You might be interested in
Does group policy management matter without a server environment?
eimsori [14]

Answer:

The group policy management is one of the policy which used in the microsoft window that basically control the server working environment in the organization. It mainly control the user account and the personal computer account.

The group policy is the centralized management and the provide the various configuration of the operating system. It also manage and control the users setting in the active directory of the management.

Therefore, the group policy management matter in the server environment.

4 0
4 years ago
When making decisions, it is important to remember that ______.
Makovka662 [10]

Answer:

I think it's no choice is perfect but I don't know.

Explanation:

Definitely not the last one, because making decisions doesn't mean you're the boss lol.

4 0
3 years ago
Read 2 more answers
A computer professional who has access to sensitive information shares this information with a third party. Which professional c
Airida [17]

The correct answer is c

6 0
3 years ago
Read 2 more answers
An vector of  int named a that contains exactly five elements has already been declared and initialized. In addition, an  int va
Yakvenalex [24]

Answer:

The statement for the question is following:-

a[j]=a[j+1]*2;

Explanation:

We have to modify the element at the index j.Since the value of j is between 0 to 3 and the vector contains exactly 5 elements.So j will not exceed the size of vector a.

Now what we have to assign the value at index j is the value double at index next to j that is j+1.So the statement will be

a[j]=a[j+1]*2;

3 0
4 years ago
Any three types of financial assistance that can be applied for after grade 12 to Study​
Romashka-Z-Leto [24]
Grants and scholarships
3 0
3 years ago
Other questions:
  • Which company provides the Loki Wi-Fi mapping service?
    10·1 answer
  • Why is it important to use correct posture while typing
    7·1 answer
  • Developers and organizations all around the world leverage ______ extensively.
    9·2 answers
  • I am on windows 10 OS. I have been trying to figure this out for ages! I want to get my task bar (on the bottom of the screen) t
    14·2 answers
  • One major challenge in developing an international information system is to find​ a(n) ________ when there is so much cultural a
    11·1 answer
  • How much do high-end earners make as power plant operators? Type answer as numerical number.
    14·1 answer
  • What are the primary IP addresses for DNS servers hosted on the x128bit, iskytap and cloudparadox domains
    8·1 answer
  • spreadsheet solution Credit Score Current Rate First Name: Mary 500 6.50% Last Name: Bell 550 6.25% Address: 123 First Street 60
    11·1 answer
  • Which security protocol for wireless networks attempts to establish the same security for them as would be present in a wired ne
    10·1 answer
  • Using programming libraries is one way of incorporating existing code into new programs.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!