1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
earnstyle [38]
2 years ago
8

Which of the following could be a method for an object-oriented class called Student?

Computers and Technology
1 answer:
AlladinOne [14]2 years ago
8 0

A method for an object-oriented class called Student could be: 4. printGrades.

<h3>What is a class?</h3>

In object-oriented programming (OOP) language, a class can be defined as a user-defined blueprint (prototype) or template that is typically used by programmers (software developers) to create objects and define the data types, categories, and methods that should be associated with these objects.

Additionally, an object class In object-oriented programming (OOP) language represents the superclass of every other classes when a programming language such as Java is used.

In conclusion, printGrades could be a method for an object-oriented class called Student.

Read more on object-oriented class here: brainly.com/question/20264183

You might be interested in
Disuss the roles of hardware,software and databases in regard to computer based information systems
forsale [732]

Explanation:

Data bases; interpretation and presentation of data in useful formats by transforming raw data into information, data storage management.

Hardware: helps to get to the physical and tangible part of computer.

Software; helps to access the word processor, spreadsheet's and social media platforms and general operations in a computer.

6 0
3 years ago
Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
antiseptic1488 [7]

Answer:

Tell about an experience with a computer virus.

Explanation:

Simon Singh's "The Code Book," tells the history of how cryptography came into being and the secret messaging world of encryption. Through the detailed narration and diving into the history of encryption, the author traces the evolution of such a process and reveals how it has had a huge impact on the world's policies.

In the given excerpt, Singh gives an example of how viruses are planted and used to spy/ get access to other people's computers. But while it is possible to get the main point of the example, <u>it would have been better if the writer includes experience with a computer virus</u> so that readers will find it easier to connect with the given example. This will enable them to better understand the working of viruses and their effects.

Thus, the correct answer is the first option.

3 0
3 years ago
Anyone can help me please ?
REY [17]

Answer:

no i m sorry realky sorry

4 0
3 years ago
All of the language commands that the CPU understand make up the CPU's
disa [49]
I think assembly level command mov ,push ,call
5 0
3 years ago
Which is an example of a zero-point perspective?
kap26 [50]

i think its b sorry if  wrong

4 0
3 years ago
Other questions:
  • The TabIndex value assigned to a text box's identifying label must be _______________ for the text box's access key to work corr
    14·1 answer
  • We will pass in 2 values, X and Y. You should calculate XY XY and output only the final result. You will probably know that XY X
    13·1 answer
  • ________ is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Intern
    12·1 answer
  • __________ is a growing practice in cooperative farmingassociations to pool and sell the fruit as a common commodity underthe br
    6·1 answer
  • Consider the following code snippet:
    13·1 answer
  • HEPME <br> ZOOM<br> IN <br> STOP<br> GIVIJG<br> ME <br> LINKS <br> !!
    9·1 answer
  • What are the routes through with Virus transmitted into computer<br>system?​
    15·1 answer
  • A large retail company hires several new joiners and would like to incorporate Virtual Reality (VR) into their onboarding proces
    11·1 answer
  • Which of the following is the key business objective behind the technologies implemented by PCL Construction, as discussed in th
    11·1 answer
  • Finish the format string to get the output shown below.<br> Day<br> &gt;&gt;&gt;{ v8'_format('Day)
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!