Object oriented programming is categorized by use of:.

Answers

Answer 1

Answer:

OOP stands for Object Oriented Programming, a style of programming that incorporates the three features of encapsulation, polymorphism and inheritance.

Explanation:


Related Questions

What is the name for data generated by a computer using an algorithm?
A. Output
B. Input
C. Income
D. Outcome

Answers

The Answer is:
A) Output

The name of data that is generated by a computer using an algorithm is output. The correct option is A.

What is algorithm?

A set of instructions or rules that must be followed in order to complete a task or solve a problem is referred to as an algorithm.

Output is the name given to data generated by a computer using an algorithm.

Any data produced by a computer programme, including text, images, sound, and other forms of digital media, is referred to as output.

In this context, output is the result of the program's execution and is generated by the computer following the instructions specified in the algorithm.

The data or instructions provided to a computer programme by the user or other programmes are referred to as input.

The money earned by an individual or organisation is referred to as income. Outcome refers to the outcome or result of a specific action or event and can be used in a variety of contexts other than computer programming.

Thus, the correct option is A.

For more details regarding algorithm, visit:

https://brainly.com/question/22984934

#SPJ7

Jack is a forensic specialist who wants to examine a network router for potential evidence in a case. What is the first step he should take to safely examine the router

Answers

The step that can be carried by Jack for the safe examination of the router as the case evidence is connecting the router to the network.

What is a network router?

The network router is given as the connection between the two networks that mediate the delivery of the packed information.

The safety of the router in the forensic evidence is important as the incorrect connection resulting in corruption and deletes all the data.

Being the specialist, to check the router, the first step to be followed by Jack was connecting the router to the network.

Learn more about routers, here:

https://brainly.com/question/15851772

#SPJ1

What is the full form of MPEG?
The full form for MPEG is ________.

Answers

Answer:

Moving Picture Experts Group

Explanation:

Answer:

The full form of MPEG is Moving Picture Experts Group

Explanation:

MPEG is a group of working experts to determine video or audio encoding and transmitting specifications/standards.

Write a function that receives a StaticArray and returns an integer that describes whether the array is sorted. The method must return:

Answers

Answer:

is_sorted(arr: StaticArray) -> int: Write a function that receives a StaticArray and returns an integer that describes whether the array is sorted. The method must return: 1

Explanation:

To reposition the legend to the left-hand side of a chart, click the _________ button, point to legend, click the right arrow icon, and click left.

Answers

Answer:

To reposition the legend to the left-hand side of a chart, click the chart elements button, point to legend, click the right arrow icon, and click left. the

Explanation:

Chart Element button is used to add and remove chart elements. It is located in the Charts Layout group on the Chart tools design tab

Consider Parameters with Referencing Environment. One complication with parameters that are subprograms appears only with languages that allow nested subprograms. The issue is what referencing environment for executing the passed subprogram should be used. One option is ____.

Answers

In Consideration of Parameters with Referencing Environment, the option is All of the above are options.

What is referencing environment?

The referencing environment of any kind of statement is the composition of the full names that can be found or seen visible in that given statement.

Note that  in any kind of  static-scoped language, the local variables with the addition of all  seen variables can be placed in an enclosed scopes and as such, in the scenario above, all the options are correct.

See options below

A. Shallow binding with the environment of the call statement that enacts the passed subprogram.

B. Shallow binding which is most natural way for dynamic-scoped languages

C. Deep binding - with the environment of the definition of the passed subprogram.

D. Ad hoc binding with the environment of the call statement that passed the subprogram.

E. All of the above are options.

Learn more about Environment from

https://brainly.com/question/17413226

The purpose of assigning a number to each of the consequences in a grid analysis is to _______.

Answers

Answer: Allow the consequence to be weighed and measured

Answer: I took the test

You have been hired as a security administrator. While analyzing your organization's personnel policies, you notice the presence of multiple orphaned accounts. How should you handle this situation

Answers

To deal with presence of multiple orphaned accounts as a security administrator in an organization, the user accounts should be disabled.

What is orphaned accounts?

The orphaned accounts are the accounts which do not have any valid business owner but provide the access to the services and corporate systems. One best way to deal with such account is to disable the user account.

Steps to deal with orphaned accounts-

Using the automated provisioning and deprovisioning can save the Control the accounts with micro-certification.Regular check of account to prevent the hidden access risk.

You have been hired as a security administrator. While analyzing your organization's personnel policies, you notice the presence of multiple orphaned accounts.

In such case, one should disable these accounts.

Thus, to deal with presence of multiple orphaned accounts as a security administrator in an organization, the user accounts should be disabled.

Learn more about the orphaned accounts here:

https://brainly.com/question/11211623

#SPJ1

why aren't my skullcandy bluetooth headphones connecting to my school chromebook if I turned on both the headphones and the bluetooth on the chromebook???

I am so confused!! Please help!!! Will give you brainliest if answered correctly. Thank you!

Answers

The school could have a block on what’s allowed to be connected to the chrome books. If they don’t let you charge your phone on it then you can’t listen to music with it- My experience at least.

Answer:

It's most likely blocked.

Explanation: I don't know why they would need to block it, but okay.

3 of 10 Taking more than four years to graduate will increase costs and may impact a return on investment. What could you check to see how long most students take to finish at an institute of higher education?

Answers

The things to check is Why would finding graduation rates be useful in knowing an institution's ROI?

What is an institution of higher education?

The term “institution of higher learning” is known to be often called a college, university, or other kind of institution.

Note that it is one that takes about 4 years to complete or more. By answering the question of Why would finding graduation rates be useful in knowing an institution's ROI?., one can be able to know the reasons for the above.

Learn more about institute from

https://brainly.com/question/6947486

#SPJ1

which dual-stack architecture allows ipv4 and ipv6 at the network layer to access a single tcp/udp stack

Answers

The dual-layer-IP allows ipv4 and ipv6 at the network layer to access a single tcp/udp stack.

What is the dual IP layer?

The word dual-stack is a word that connote a full or total duplication of all stages in the protocol stack ranging from its applications to the network layer.

Note that the dual-layer-IP method often gives room for a computer to run IPv4 and IPv6 simultaneously  at the network layer, and all of the IP stack can access a different TCP/UDP stack.

Learn more about  architecture  from

https://brainly.com/question/9760486

A network administrator wants to authenticate server machines using Transport Layer Security (TLS). What can the administrator install on the servers to validate the server's identity and establish a secure transmission channel

Answers

Answer:

When enabling TLS 1.2 for your Configuration Manager environment, start by ensuring the clients are capable and properly configured to use TLS 1.2 before enabling TLS 1.2

Explanation:

When enabling TLS 1.2 for your Configuration Manager environment, start by ensuring the clients are capable and properly configured to use TLS 1.2 before enabling TLS 1.2

The smith family has five children who work in a variety of careers. they include a building designer, an astrophysicist, a computer programmer, a heating and ventilation expert, and an animal researcher. which career cluster do all these jobs belong to? science, technology, engineering, and mathematics science and mathematics engineering and technology research and experiments

Answers

The career cluster for the smith family is Science, Technology, Engineering and Math career cluster.

What are career clusters?

The career cluster is known to be a kind of set of  occupations that is said to have similar characteristics.

Conclusively, the jobs that are seen in the o same cluster do need a form of similar knowledge or skill type and thus the career cluster for the smith family is Science, Technology, Engineering and Math career cluster.

Learn more about children from

https://brainly.com/question/26423521

Answer:

A

Explanation:

AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA

All of the following are personal security safeguards except ________. Select one: A. send no valuable data via email B. Use https C. pop-ups D. remove high-value assets from computers E. regularly update antivirus software

Answers

The option that is not a personal security safeguards is the use of pop-ups.

What are safeguards security?

The term above connote a kind of protective steps that are often taken along with some controls measures that helps one to be able to meet their own security requirements needed for their information system.

Conclusively, Note that some  the use of pop-ups is risky as they may contain malware which can hinder the safety of your personal security.

Learn more about security safeguards from

https://brainly.com/question/4021912

#SJ1

The chain of _____ documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence.

Answers

Answer:

custody.

I hope I could help

What type of software permits a user to record video of what is occurring on the computer along with typed and cursor actions in order to create a lesson

Answers

The type of software which permits a user to record video of what is occurring on the computer along with typed and cursor actions in order to create a lesson is called screencast.

What is screencast?

The screencast is the software which used to record the video of the screen of a computer. These types of software are build for the following purpose.

Uses to record, what a one sees on his computer.Such type of software are used to create the lesson as the facility of audio narration is provided in it.This software is helpful for the student who prefer self study.Many education organizations create learning with different screencast software.

Thus, the type of software which permits a user to record video of what is occurring on the computer along with typed and cursor actions in order to create a lesson is called screencast.

Learn more about the screencast here;

https://brainly.com/question/15878080

#SPJ1

A ________ monitors, maintains, fixes, and tunes computer networks. Select one: A. systems analyst B. chief information security officer C. chief security officer D. network administrator E. server administrator

Answers

SYSTEMS ANALYST

A system analyst monitors, maintains, fixes, and tunes computer networks.

\(^_^)/

A(n) ___________ is a notification from the operating system that an action has occurred, such as the user clicking the mouse or pressing a key.

Answers

Answer:

the answer is event

Explanation:

pls tell me if im wrong

You've copied a cell containing formula to the rows below it, and the results in the copied cells are all zeros. To find the problem, what should you check for in your original formula

Answers

Person have cloned a cell with a formula to the rows below it, but the copied cells' results are all zeros the reason of this is If an absolute cell reference is required.

What is cell in Excel?

Cells are the boxes in an Excel worksheet's grid, such as this one. On a worksheet, each cell is identified by its reference, the column letter, and the row number that intersect at its place.

This cell is known as cell D5 since it is in column D and row 5. In a cell reference, the column always comes first.

Thus, an absolute cell reference is required to check original formula.

For more details about cell in Excel, click here

https://brainly.com/question/917595

#SPJ1

It is indirectly referenced from required. Class files.

Answers

Answer:

ohh the class file

Explanation:

is not me own it my class

_________ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.

Answers

Strong passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.

What Makes a Password to be Strong?

The key reason or area of a strong password are attributed to its length. Note that the longer the password, the better it is.

A strong password should be the one that has a composition of letters ( both upper and lower case), numbers, and also one that is made up of symbols and no link to  personal information.

Learn more about passwords  from

https://brainly.com/question/19116554

Design an application for the Sublime Sandwich Shop. The user makes sandwich order choices from list boxes, and the application displays the price. The user can choose from three main sandwich ingredients: chicken at $6. 99, beef at $7. 99, tuna at $8. 99. The user also can choose from three different bread types: white, rye, whole wheat at no change in cost

Answers

import javax.swing.*;

import java.awt.*;

import java.awt.event.*;

public class JSandwich extends JFrame implements ItemListener {

 FlowLayout flow = new FlowLayout();

 JLabel companyName = new JLabel("Sublime Sandwich");

 JComboBox<String> mainBox = new JComboBox<String>();

 JLabel mainList = new JLabel("Main ingredient");

 JComboBox<String> breadBox = new JComboBox<String>();

 JLabel breadList = new JLabel("Breads");

 JTextField totPrice = new JTextField(10);

 int mainNum, breadNum;

 double[] mainPrices = {6.99, 7.99, 8.99};

 double sumPrice = mainPrices[0];

 double breadPrice = 0;

 double mainPrice = mainPrices[0];

 double[] breadPrices = {0, 0, 0};

 String output;

 public JSandwich() {

   // code here

 }

 public static void main(String[] arguments) {

   JSandwich sandframe = new JSandwich();

   sandframe.setSize(240, 200);

   sandframe.setVisible(true);

 }

 public void itemStateChanged(ItemEvent list) {

   //

 }

}

Which copyright law governs the reproduction of portions of copyrighted works without infringing any copyright laws?

Answers

Answer:

Fair Use

Explanation:

Freedom of expression is promoted by fair use, a legal doctrine. It allows unlicensed use of copyright-protected works in a copy scenarios.

Unnecessary duplication of data in a database is referred to as:.

Answers

Answer:

Data Redundancy

Explanation:

It is a data organization issue that allows the unnecessary duplication of data within your Microsoft Access database.

Hope this helps ^v^

A small software company is starting to work with the AWS Cloud. Which service will allow them to find, test, buy, and deploy software that runs on AWS

Answers

Answer:

Elastic Beanstalk

Explanation:

Elastic Beanstalk: AWS Elastic Beanstalk is an easy-to-use service for deploying and scaling web applications and services developed with Java, .NET, PHP, Node.js, Python, Ruby, Go, and Docker on familiar servers such as Apache, Nginx, Passenger, and IIS.

An attacker is preparing to perform what type of attack when the target vulnerabilities include headers and payloads of specific application protocols

Answers

An attacker is preparing to perform what Application attack  when the target vulnerabilities include headers and payloads of specific application protocols.

What Is an Application Attack?

An application attack is known to be a type of system attack which is made up of cyber criminals that is said to have access to any unauthorized points.

Note that this kind of Attackers are  the ones that start by  looking at the application layer, and then looking for any kind of application vulnerabilities that is found within the code.

Learn more about vulnerabilities from

https://brainly.com/question/25633298

Which book citation is correctly formatted according to mla standards? collins, suzanne. the hunger games. new york: scholastic, 2008. print. collins, suzanne. the hunger games. scholastic: new york, 2008. print. collins, suzanne. the hunger games. new york: scholastic, 2008. collins, suzanne. the hunger games. new york: scholastic. print, 2008.

Answers

The  book citation that is correctly formatted according to MLA standards is  Collins, Suzanne. The Hunger Games. New York: Scholastic, 2008. Print.

What is book citation?

A book citation is known to be a form of entry that one often puts in one's research paper or any kind of essay that shows the people that a person must have paraphrased or quoted.

Note that Books citations are said to often credit to the owner or key sources and thus, in MLA format, The  book citation that is correctly formatted according to its standards is  Collins, Suzanne. The Hunger Games. New York: Scholastic, 2008. Print.

Learn more about book citation from

https://brainly.com/question/8130130

Answer:

A. Collins, Suzanne. The Hunger Games. New York: Scholastic, 2008. Print.

Explanation:

Correct on Edge

How can the lack of logic statement tests on memory location variables be detrimental to software in development

Answers

The lack of logic statement tests on memory location can be detrimental as a it leads to system instability because the software cannot be able to release the allocated memory when it is done with it.

What is a logic statement test?

Logical reasoning tests is known to be a type of test that is often used to assess a person's ability to use well method thinking to find out from a the statement that is the right response to a given question.

Conclusively, The lack of logic statement tests on memory location variables can be detrimental  software in development because it can lead to  system instability due to the fact that the software cannot be able to release the allocated memory when it is done with it.

Learn more about logic statement from

https://brainly.com/question/24912495

3. Q3: India is a user who needs to be able to see a list of the names of her friends (those whom she considers friends). There is already an account set up in the database for India. What do you need to do to give her the appropriate access to her list of friends

Answers

In order to grant India access to a list of her friends, you should use a query by selecting name from person and use the inner join relationship on person.

What is query?

A query refers to a computational request for data that are saved in a database table, from existing queries, or even from a combination of both a database table and existing queries.

In this scenario, you can grant India access to be able to see a list of her friends with a structured query language (SQL) by selecting name from person and use the inner join relationship on person.

Read more on query here: https://brainly.com/question/25266787

Kylee needs to ensure that if a particular client sends her an email while she is on vacation, the email is forwarded to a coworker for immediate handling. What should she do?

Configure a response for external senders.
Configure a response for internal senders.
Only send during a specific time range.
Configure an Automatic Reply Rule.

Answers

I believe the answer would be

A. Configure a response for external senders.

Hope this helps :)

Other Questions
When condensing a logarithm using the the product property, you combine the answers by dividing them.Group of answer choicesTrueFalseWhen condensing a logarithm using the the power property, you move the front number to become the exponent on the log.Group of answer choicesTrueFalseWhen condensing a logarithm using the the quotient property, you combine the answers by dividing them.Group of answer choicesTrueFalse What is the solution to this inequality? -m > 5[A] m < -5[B] m > -5[C] m > 5 URGENT PLEASE HELP 50 POINTS AND WILL NAME BRAINLIEST An ice cream store has the pricing shown below. You want to determine the best value. The height of the cone is 4.5 in and the diameter is 2 in. The diameter of each scoop is 3 in. Assume the cone is stuffed full with ice cream. single is $3.50, double is $4.50, and triple is $5.50 Create a table showing the total cost of each size, the total volume of ice cream for each size, and the unit cost (per unit volume) of each size. Include units with your table entries. you dont have to create the table, but i really need the values! According to the website, why is the history of black americans and their strife for civil rights significant to the history of the united states?. Please help in one minute will mark BRAINLIST Social learning theory predicts that those who witness aggressive behavior being punished may be __________. a. less likely to behave aggressively b. more likely to behave aggressively c. extremely fearful of others d. unable to replicate aggressive behaviors Alguien podra ayudarme en pregunta numero 8 If the ball leaves her hand 6 feet above the ground at 65 feet/second: a) what is the maximum height of the ball Andrew wants to lay new turf in his garage.Andrews garden is a rectangle measuring 3m by 4m,New turf cost 12.50pr m2.How much will it cost Andrew to get enough new turf for his garden?I WOULD REALLY APPRECIATE YOUR HELP I need to know about coffee topics that I can use for a research paper ? Can someone help me I need to talk about an specific coffee brand or coffee shop? What is something you would really enjoy learning how to do? Consider what information you would need to learn that new skill. Write a brief description of what you want to learn, and create an outline for the informational text you would need to access to learn that new skill. Which brain region contains centers for processing sensory information, emotions, and hormone production?. What is the circumference of a circle with a diameter of 10 meters? (Use 3.14 for pi.)13.14 m31.4 m15.7 m314 m Which of the following statements about diagramming is true?Retain all capitalization. Use an x to indicate an ellipsis. Omit punctuation. all of the above An investor buys in a company and in the twelve months after she invests the value of the stock decreases by 30% , bu what amount will the value of the stock need to go up from there in order that the price of the stock will be equal to what the investor first paid for it ?a:30%b:37,5%c:42. 9d:45e:46. 7 What are the 10 commandments in the Bible in order? Giving brainliest for all 10 Choose the inequality represented in the graph.A. y -4/5x - 3B. y > -5/4x - 4C. y > -4/5x - 3D. y < -5/4x - 3 Kylee needs to ensure that if a particular client sends her an email while she is on vacation, the email is forwarded to a coworker for immediate handling. What should she do?Configure a response for external senders.Configure a response for internal senders.Only send during a specific time range.Configure an Automatic Reply Rule. Steve was arrested in a rest stop by a police officer for speeding on the highway. He was arrested about ten yards from his car. The officer nonetheless searched the car and found illegal weapons. At trial, Steve sought to exclude the weapons, saying they were not in immediate control when seized. You are the judge. Will you admit or exclude the evidence? Discuss the case history of this issue and then justify your ruling. When did dred scott sue for freedom for himself and his family? once he was back in the south after his enslaver died when he got to illinois