A ____ procedure returns a single value to the calling procedure.

A. Form
B. Sub
C. Function
D. Splash


Answer: C

Computer Science & Information Technology

You might also like to view...

The clone method return type is:

a. the same as the cloned object b. Object c. String d. none of the above

Computer Science & Information Technology

Existing snapshots are listed in the ____.

A. History panel B. Layers panel C. Actions panel D. Status bar

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The form of cubic equation appropriate for cryptographic applications for elliptic curves is somewhat different for GF(2m) than for Zp. 2. An encryption/decryption system requires that point Pm be encrypted as a plaintext. 3. The security of ECC depends on how difficult it is to determine k given kP and P. 4. A considerably larger key size can be used for ECC compared to RSA. 5. Since a symmetric block cipher produces an apparently random output it can serve as the basis of a pseudorandom number generator.

Computer Science & Information Technology

An Ethernet LAN has several trunk links passing near heavy machinery resulting in EMI. Which of the following Ethernet media types should be used to avoid interference?

A. 10Base5 B. 100BaseT C. 10Base2 D. 100BaseFX

Computer Science & Information Technology