____ provide a way to make a computation reusable.

A. Methods
B. Variables
C. Constants
D. Comments


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following types are not built into the C++ language:

a) bool b) real c) short d) int e) long f) double

Computer Science & Information Technology

________ requires multiple countermeasures to be defeated for an attack to succeed.

Defense in depth Weakest link analysis Both Defense in depth and Weakest link analysis Neither Defense in depth nor Weakest link analysis

Computer Science & Information Technology

A(n) ____________________, is an act of sabotage that attempts to flood a network server or Web server with so many requests for action that it shuts down or simply can no longer handle requests, causing legitimate users to be denied service.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following statements is false?

a. A Fragment typically represents a reusable portion of an Activity’s user inter-face, but may also represent reusable program logic. b. Like an Activity, each Fragment has its own layout that’s typically defined as an XML layout resource file (GUIs also can be created dynamically). c. You can create an XML file describing the user preferences, then class Prefer-enceFragment can use that file to build an appropriate preferences GUI. d. Fragments can be hosted by an Activity or they can execute independently.

Computer Science & Information Technology