One advantage to using a named constant is that the statement becomes ____.

A. self-perpetuating
B. self-documenting
C. self-referencing
D. self-mitigating


Answer: B

Computer Science & Information Technology

You might also like to view...

How many data files can be opened at the same time using Microsoft Word?

A. only one B. not more than three C. as many as needed D. not more than four

Computer Science & Information Technology

Which of the following web server attacks can uncover passwords, web design, or business logic?

a. Buffer overflow attack b. Source disclosure attack c. File system traversal attack d. Vulnerability attack

Computer Science & Information Technology

The file that contains code written by the programmer is the ____.

A. Application file B. Executable file C. Object file D. Source file E. Text file

Computer Science & Information Technology

A computer operator was in a hurry and accidentally used the wrong master file to process a transaction file. As a result, the accounts receivable master file was erased. Which control would prevent this from happening?

A. header label check B. expiration date check C. version check D. validity check

Computer Science & Information Technology