As part of the Sub statement, the ____ of a procedure is specified as private or public.
A. length
B. lifetime
C. scope
D. module
Answer: C
Computer Science & Information Technology
You might also like to view...
A(n) ________ list can be applied to bullet points in place of bullet symbols
Fill in the blank(s) with correct word
Computer Science & Information Technology
Internet connectivity for a company is mission critical. The technician must be notified if the Internet router has failed. Which of the following is the BEST method to monitor this device?
A. SLIP B. SFTP C. SMTP D. SNMP
Computer Science & Information Technology