1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mama L [17]
2 years ago
15

Basics of visual basic

Computers and Technology
2 answers:
Scilla [17]2 years ago
5 0
Visual Basic (VB) is an object-oriented programming language, and it supports the concepts of encapsulation, abstraction, polymorphism, etc. In VB, all the variables, methods, and application entry points are encapsulated within the class definitions.
Mazyrski [523]2 years ago
3 0
Visual Basic (VB) is an object-oriented programming language, and it supports the concepts of encapsulation, abstraction, polymorphism, etc. In VB, all the variables, methods, and application entry points are encapsulated within the class definition
You might be interested in
3.What is the difference between SODIMM and UniDIMM?
lorasvet [3.4K]

Answer:

Small Outline Dual Inline Memory Module and Unbuffered Dual Inline Memory Module are two terms that describe types of computer memory. While UDIMM is a generic term that applies to most memory modules, SO-DIMM modules are used almost exclusively in notebook computers

Explanation:

6 0
4 years ago
How do network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS) differ?an NIDS focuses more
balandron [24]

Answer:

a. NIDS focuses more on analyzing incoming traffic, while an HIDS monitors valuable OS files

Explanation:

Intrusion detection system is used in analyzing, detecting, and raising alarm on suspicious network activities used by hackers to access unauthorized sites. Network intrusion detection system is meant to work in real-time, so as to analyze incoming traffic. Packets moving across the network are evaluated for threats.

Host intrusion detection system work within the operating system of the device to evaluate the history of system files that could contain threats, or unusual file permission changes, and then raise an alarm.

3 0
3 years ago
Which line in the following program will cause a compiler error? 1 #include 2 using namespace std; 3 4 int main() 5 { 6 int numb
KATRIN_1 [288]

Answer:

Line 8 gives a compiller Error

Explanation:

In line 8, the statement: if (number >= 0 && <= 100) will give a compiller error because when using the logical and (&&) It is required to state the same variable at both sides of the operator. The correct statement would be

if (number >= 0 && number <= 100). The complete corrected code is given below and it will display the output "passed"

#include <iostream>

using namespace std;

int main()

{

   int number = 5;

   if (number >= 0 && number <= 100)

       cout << "passed.\n";

   else

       cout << "failed.\n";

   return 0;

}

3 0
4 years ago
Susan is working with an IT company. She has been asked to make sure that all of the functions in the company are in place and p
MrMuchimi

According to Henri Fayol, it can be said that there are five functions of management: planning, organizing, staffing, directing, and controlling. From the description in the question, it seems that Susan should employ the controlling management function – which is defined as ensuring that all the ongoing process are proceeding as planned.

It is clear that this definition is precisely what Susan needs to do to fulfill the request that she was given.

7 0
3 years ago
(1) Nolan attempted to open a Word document that contains a macro and received a security warning stating, "Macros have been dis
Julli [10]

Answer:

1. Check where the file originates from, and if it is a trusted source or his own document, click Enable Content.

2. photo Album feature

3. Outer Join

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • What is telepresence
    8·1 answer
  • _______ are created under ________, similar to how you create individual files within a broader file folder
    9·2 answers
  • "where is a cookie that is created during a web site visit​ stored?"
    9·1 answer
  • Sukant’s professor asks her to take over his online class while he is away because she is an effective digital communicator. Whi
    11·2 answers
  • After an entry in the medical record has been written or keyed and an error is discovered, what procedure should be followed to
    7·1 answer
  • Compare Fibonacci (recursion vs. bottom up)
    12·1 answer
  • Desirable workplace habits and skills include:
    14·1 answer
  • What is the output?
    12·1 answer
  • How long is prison time for someone who commits copyright infringement for the first time ?
    7·1 answer
  • which of the following will not be considered in improved business performance planning ? A. bussines profitability B.. Ignoring
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!