As part of the Sub statement, the ____ of a procedure is specified as private or public.

A. length
B. lifetime
C. scope
D. module

Answer: C

Computer Science & Information Technology

You might also like to view...

A(n) ________ list can be applied to bullet points in place of bullet symbols

Fill in the blank(s) with correct word

Computer Science & Information Technology

Internet connectivity for a company is mission critical. The technician must be notified if the Internet router has failed. Which of the following is the BEST method to monitor this device?

A. SLIP B. SFTP C. SMTP D. SNMP

Computer Science & Information Technology