Answer:
D)One big superclass can be used instead of many little classes.
Explanation:
Inheritance could be described as getting new class on another existing class with almost same execution,
inheritance allows codes to be re-used. It should be noted that inheritance bring about the code sharing among class.
The advantages of using inheritance includes but not limited to
✓ Code that is shared between classes needs to be written only once.
✓Similar classes can be made to behave consistently.
✓ Enhancements to a base class will automatically be applied to derived classes.
A major disadvantage of inheritance is that child/children classes depends on parent class, hence a change in the parent class will affect the child class, therefore option C is the correction option.
Inheritance is a type of programming concept where by a class (Child) can inheritance methods, properties of another class (Parent).
Inheritance allows us to reuse of code, one advantage of Inheritance is that the code that is already present in base class need not be rewritten in the child class.
The different types of Inheritance are:
Single Inheritance.Multiple Inheritance.Multi-Level Inheritance.Hierarchical Inheritance.Hybrid Inheritance.Learn more:
https://brainly.com/question/4560494
which check the functioning of all the connected hardwares including primary and secondary storage devices
Answer: The computer processor
Explanation:
The computer processor is also called the central processing unit and it's function is to analyzes data and also disperses data. It is the computer's brain as it tells the computer the kind of programs to do at a particular time.
The computer processor checks the functioning of all the connected hardwares including primary and secondary storage devices.
The question is in the picture
Answer:
nordthaf
Explanation:
nofth
What does an output allow a computer to do
Output devices allow the computer system to interact with the outside world by moving data into and out of the system.
Answer:
the previous answer belowed me looked it up online LOL
but im taking this quiz rn and the answer is either Display information or Recieve information thanks bye
Explanation:
Write a MATLAB function named average_of_scores_with_drops The function will have two inputs and two return values. The first input will be a list of scores. The second input will be a postive integer representing the number of scores to drop. It will not be larger than the length of the list. Your function should determine the average of the scores after dropping the specified number of lowest scores. The first return value must be a real number equal to the average score. The second return value must be the number of items that were averaged. Notes: Example Test Case: SCORES
Answer:
-%Define the function.
function [avg, ele_left] = average_of_scores_with_drops(input_list, drop_element)
%Sort the list.
input_list = sort(input_list);
%Compute the length of the list.
len_list = length(input_list);
%Declare and initialize the variable.
sum = 0;
%Increase the element to be drop by 1.
i = drop_element + 1;
%begin the for loop.
for k = i : length(input_list)
%Add the elements.
sum = sum + input_list(k);
%End of the for loop.
end
%Compute the elements left after dropping the dropped element.
ele_left = length(input_list) - drop_element;
%Compute the average of the elements left.
avg = sum/ele_left;
%End of the function defined.
end
%Run the following code in the command prompt.
%Call the function and return the average
%score and the number of elements
%whose average is computed.
[average_score , number_of_items] = average_of_scores_with_drops([8 6 1 2 3 5 10], 2)
SAMPLE OF OUTPUT
average_score = 6.40000000000000
number_of_items = 5
A stop sign is a example of:
A. An advertisement
B. An animated text
C. An audio text
D. A visual text
Answer:
A visual text
Explanation:
This is because it is used to send information through something you can see. Visual text is an image, word or picture that doesn't move used to share information. So because a stop sign can't move and it uses words to share information it is an example of a visual text.
HOPE IT HELPED
that is Entrepreneur ? ?
Answer:
An entrepreneur is an individual who creates a new business or, an organization. An entrepreneur combines these to manufacture goods or provide services and provides leadership and management for the business. That is entreprenuer.
Hope this helps...!
Explanation:
_______tools enable people to connect and exchange ideas.A) Affective computing. B) Social media. C) Debugging D) Computer forensics.
Answer:
B) Social media.
Explanation:
Social media is well, a media, that allows you to share things with people and have discussions.
An ISP is considering adding additional redundant connections to its network. Which of the following best describes why the company would choose to do so?
Answer:
Redundant networks are generally more reliable.
Explanation:
The complete question is in this brainly link;
https://brainly.com/question/18302186
This is based on knowing the importance of a redundant network.
C. Redundant networks are more reliable
A redundant network is one that helps to increase the reliability of a computer system. Now, this is possible because the more critical the ISP NETWORK is, the more important it will be for the time it takes to resolve from a fault would be reduced. This implies that, by adding one redundant device to their connection, the time it will take to resolve from a fault would be drastically reduced and this will lead to a far more reliable system.Thus, redundant networks are more reliable.
Read more at; brainly.com/question/17878589
Web pages are accessed through a software program called a _____.A) web crawlerB) web browserC) web serverD) web app drawer
Answer: B) web browser
Explanation: A web browser may be explained as a software program or application available on various operating systems such as windows, Mac, Android, iOS among others. This program acts as an interface between information available on websites or pages and users. This application takes a specified uniform resource locator or web address as input and outputs the information available on a web page. Google Chrome, Internet Explorer, Microsoft edge, opera mini, Safari, Firefox and so on.
When following maintenance procedures, it is important to carefully read the procedures and to complete
each step before moving to the next step.
True or
False
When does the VB.NET programming environment start to operate?
A. once a VB.NET project is compiled
B. once a VB.NET project is created in the Microsoft Visual Studio environment
C. once a VB.NET project is debugged
D. once a VB.NET project folder is opened
E. All of the above are correct
Answer:
B. once a VB.NET project is created in the Microsoft Visual Studio environment.
Explanation:
Visual Basic . Net is a programming language which is used to run complex software and projects. The VB projects which are created in Microsoft Visual Studio are run by console application. These computer applications run complex and technical software.
How many pins are in the power supply connector that is typically used on most motherboards today?
Answer: 4 pins
Explanation:
The __________ utility has the capability to manage users, create and administer user groups, and apply user rights to those users and groups. Active Directory Administrative Center Active Directory Domains and Trusts Active Directory Sites and Services Active Directory Users and Computers
Answer:
Active Directory Users and Computers
Explanation:
Active Directory Users and Computers is a term that describes Microsoft Management Console that is utilized in conducting and managing Active Directory, the objects; which comprises of the users and computers, the Organizational Units, together with their characteristics.
Hence, the Active Directory Users and Computers utility has the capability to manage users, create and administer user groups, and apply user rights to those users and groups.
What are three things to consider in programming design?
the problem being addressed, the goals of the project, and the programming language that will be used
the problem being addressed, the goals of the project, and the age of the end users
the age of the end users, the programming language that will be used, and the programming style of the
programmers working on the project
the age of the end users, the goals of the project, and the programming style of the programmers working on the
project
The issue being solved, the project's objectives, and the users' ages. The project's programmers' programming styles, the programming language they will use, and the age of the intended customers.
What is programming language?Programming language is defined as a computer language used to converse with computers by programmers (developers). Orthogonality or simplicity, available control structures, data types, and data structures, syntactic design, support for abstraction, expressiveness, type equivalence, strong versus weak type checking, exception handling, and limited aliasing are among the characteristics of a programming language.
Clarity, simplicity, and unity offer a way to express algorithms as well as a framework for thinking about them. Every possible feature combination has value thanks to orthogonality. Surprisingly, it may frequently be reduced to three basic programming constructs known as loops, selects, and sequences.
Thus, the issue being solved, the project's objectives, and the users' ages. The project's programmers' programming styles, the programming language they will use, and the age of the intended customers.
To learn more about programming language, refer to the link below:
https://brainly.com/question/12696037
#SPJ5
How many different Microsoft Windows file types can be infected with a virus?
The point-of-view of a game is influenced by the player role and game camera. Give an example of a game that uses omniscient player role. Explain what the game camera perspective looks like for that game and how that camera perspective assists in the omniscient immersive experience.
Answer:
REWORD
Explanation:
Having choices within a game gives the player a certain amount of control over the game,and can keep them immersed. When a choice is “meaningful” it is so because what you decide will have different outcomes, one such example being the game(s) Skyrim or Fallout 4. With these games, you are presented a multitude of choices, mainly within dialogue, and depending on how you choose to react, you can gain certain quests,.
paragraph on how atms work
Discuss the main characteristics of the database approach and how it differs from traditional file systems.
The database system allows the creation of a single depository of information, which is updated periodically and which can be used simultaneously by many users, since this type of system allows the effective sharing of all data stored in its depository . In addition, this is a secure system and is very difficult to break into. This is because of the efficiency of the software used to maintain it. However, the use of these softwares can be a little complicated for users, in addition to requiring a high economic cost to obtain them.
The traditional file system, in turn, each user must obtain their own file related to the application they want to run. This may seem dull in comparison to the database, but it is advantageous as it does not require any spending on software, as it is simple and there are several cheap and efficient tools and editors on the market. However, this system is not so safe, it can cause isolation of data and even data inconsistency, which disrupts the entire system.
6. Write pseudo code that will perform the following. a) Read in 5 separate numbers. b) Calculate the average of the five numbers. c) Find the smallest (minimum) and largest (maximum) of the five entered numbers. d) Write out the results found from steps b and c with a message describing what they are.
Answer:
Pseudo CODE
a)
n= Input “Enter 5 integer value”
b)
sum=0.0
For loop with i ranging from 0 - 5
Inside loop sum=n[i]+sum
Outside loop avg= sum/5
Print avg
c)
small=n[0] # assume the first number in the list is smallest
large= n[0] # assume the first number in the list is largest
For loop with i ranging from 0 - 5
Inside loop if n[i]<small #if any another number is smaller than small(variable)
Inside if Then small=n[i]
Inside loop if n[i]>large # if any another number is larger than large(variable)
Inside if then large=n[i]
Print small
Print large
d)
print avg
print small
print large
Pseudocodes are used as a prototype of an actual program.
The pseudocode is as follows:
input n1, n2, n3, n4, n5
avg = (n1 + n2 + n3 + n4 + n5)/5
small = n1
large = n1
for i = 2 to 5:
if n1 > ni then:
small = ni
if n1 < ni: then:
large = ni
print("Average:", avg)
print("Smallest:", small)
print("Largest:", large)
The pseudocode starts by getting inputs for the 5 valuesNext, the average of the 5 values is calculatedThe fourth line iterates through the numbersWithin the iteration, there are 2 conditional statements that calculate the smallest and the largest valuesThe last three lines print the average, the smallest and the largest inputRead more about pseudocodes at:
https://brainly.com/question/24735155
One of the simplest and best known polyalphabetic ciphers is _________ cipher. In this scheme, the set of related monoalphabetic substitution rules consists of the 26 Caesar ciphers with shifts of 0 through 25. Each cipher is denoted by a key letter which is the ciphertext letter that substitutes for the plaintext letter a.
Answer:
Vigenere
Explanation:
Vigenere Cipher is an encryption method of alphabetic symbols that utilizes an easy form of polyalphabetic exchange which is carried out through Vigenere table.
Hence, in this situation, the correct answer is VIGENERE Cipher because it is the form of cipher whereby the set of related monoalphabetic substitution rules comprises of the 26 Caesar ciphers with shifts of 0 through 25. Each cipher is indicated by a key letter which is the ciphertext letter that substitutes for the plaintext letter.
Which of the following could be defined as a general-purpose computing device that enables workers to create, manage, store, search for, and process information? MP3 player. Hard drive. Flash drive. Personal computer.
Answer:
It's personal computer
Explanation:
I got it right on my assignment
The next four octal numbers after 36 is:________.
a. 36, 37, 40, 41
b. 37, 40, 41, 42
d. 36, 37, 38, 39
c. none of the Above
Answer: b. 37, 40, 41, 42
Explanation:
The next four octal numbers after 36 is 37, 40, 41, 42.
The octal numeral system, which is also referred to as "oct" for short, is simply base-8 number system.
It is a number system whereby only digits from 0 to 7 are used and there are no letters or numbers that are above 8 that are used.
In this case, after 36, the next number will be 37 after which we go to 40 as we can't write 38 in the octal system. Therefore, the next four octal numbers after 36 is 37, 40, 41, 42.
true false) keybord has two shift keys.
Answer:
True, looking at 'em right now!
Explanation:
You’ve been given a new cell phone with a 2 gigabyte data plan. You plan to use your phone for text messages, images, video, and music. Which of these categories are best compressed using lossless compression? Which of these categories are best compressed using lossy compression? Why?
Answer:
texts and music are best compressed using lossy compression and videos are best compressed using lossless compression
Explanation: texts and music are best compressed using lossy compression because there are not many details to leave out while pictures and videos are best compressed using lossless compression because they need to be in good quality
Lossy compression should be applied to text messages and music while lossless compression should be applied to images and videos
A lossy compression of a file implies that the quality of the file is reduced in order to get the file compressed.
This type of compression can be applied to text messages and music because a reduction in the size and quality will only reduce few details about the text messages and music file.
However, a lossless compression is such that even after the file size is reduced, the quality remains unchanged. This type of compression can be applied to video and pictures because even if the size is reduced, the quality of the files are not expected to change.
Hence;
Lossy compression should be applied to text messages and musicLossless compression should be applied to images and videosRead more about file compressions at:
https://brainly.com/question/13663721
Why should we care about information being represented digitally? How does this impact you personally?
information digitally represented shows a level of understanding i.e it eases the stress of complexity. It is more interpretable.
it has a great impact on users personal since use can use and interpret information well as compared to other forms of represention
Reasons why the adoption of digital information representation should be made paramount include ; large storage, accessibility and retrieval among others.
Digital information may be explained to collection of records and data which are stored on computers and other electronic devices which makes use of digital storage components such as memory cards, hard drive and cloud services.
The advantages of digital data representation include :
Large storage space : Digital data representation allows large chunks of information to be kept and stored compared to traditional mode of data storage. Easy accessibility : Digital information representation allows users to access and transfer data and stored information more easily and on the go as it is very easy to access and transfer information seamlessly to other digital devices.Data stored digitally allows for easy manipulation and transformation of data as digital information allows for more orderly representation of information.The personal impact of digital information from an individual perspective is the large expanse of storage it allows and ease of retrieval.
Learn more : https://brainly.com/question/14255662?referrer=searchResults
Which color indicates the private, trusted segment of a network?
A. Green.
B. Orange.
C. Red.
D. Blue.
Answer:
A. Green.
Explanation:
In order to distinguish or represent different levels of networks, SmoothWall open source firewall solution, made use of three distinct colors to indicate different meanings. These are:
1. The red color is used to reveal that, there is no connection or network
2. Orange color reveals the untrusted segment of the network but shares the Internet connection
3. Green color indicates the private, trusted segment of a network
Hence, in this case, the correct answer is option A. Which is GREEN
can someone explain to me what coom means? kekw
If it is espanish it is como and it means how.
Answer:
Outside of referring to the image and meme, Coomer, often lowercased as coomer, is used online as a general insult for an overshrexed young man. The term implies such a person is a sleazy loser, obsessed with masturbatling to pronography because he can't find shrexual partners.
What device to use when downloading a large file?
Question #1
What do you use to navigate through a file by moving the view
up and down or side to side?
O Title bar
O Ribbon
O Document area
O Scroll bar
Answer:
Answer is the Scroll Bar
Explanation:
When you are in a document, the way you move around or navigate in it is by dragging the scroll bar that is to the left of your screen or at the bottom of your screen. Hope this helps!
cellular digestion associated by what organelles?
Answer:
lysosomes
Explanation:
Cell Digestion and the Secretory Pathway. The primary sites of intracellular digestion are organelles known as the lysosomes, which are membrane-bounded compartments containing a variety of hydrolytic enzymes.