1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ss7ja [257]
2 years ago
14

Classes that depend on field names from parent classes are said to be ____ because they are prone to errors.Group of answer choi

cesrobustinnovativefragileconstructive
Computers and Technology
1 answer:
hoa [83]2 years ago
5 0

Classes that depend on field names from parent classes are generally said to be <u>fragile</u> because they are very prone to coding errors.

<h3>What is a class?</h3>

A class can be defined as a user-defined blueprint (prototype) or template that is typically used by software programmers to create objects and define the data types, categories, and methods that should be associated with these objects.

In object-oriented programming (OOP) language, a class that is written or created to implement an interface would most likely implement all of that interface's method declarations without any coding error.

In Computer programming, we can infer and logically conclude that classes that are highly dependent on field names from parent classes are generally said to be <u>fragile</u> because they are very prone to coding errors.

Read more on class here: brainly.com/question/20264183

#SPJ1

You might be interested in
Plz help me I will mark as the brainlest I only need long answer plz help me ​
xxTIMURxx [149]

Strategy 1

*Testing for timing, high reliability and performance.

Reasons.

Every device and system configuration must be tested including the software setup,definitions and rules must be tested with an attempt to force the system and its intergrals to fail. Every failure(if there are any) must be evaluated and errors corrected.

Strategy 2

*Measuring response levels at the lowest set point of the alarm.

Reasons.

This is to check the trigger points of the alarms in the system and the response must be recorded as well as changing the intervals of alarm triggers so as to evaluate the time taken for the alarm to respond at the lowest point of it to be triggered.

7 0
3 years ago
Type the correct answer in the box. Spell all words correctly.
marysya [2.9K]

Answer:

A Standard Lens

Explanation:

Since David wants to take pictures of people around him and also the objects far away, a standard lens would be fit for that.

3 0
3 years ago
Which of the following operation is not performed by a mouse 1) left click , middle click , right click, double click​
agasfer [191]

Answer:

middle click

Explanation:

hope it helps

3 0
3 years ago
Read 2 more answers
What would the output be of print(3 ** 2)
trapecia [35]
-3–2 I think orange brown green green orange green brown orange brown
4 0
3 years ago
Examine the efficiency the various recovery algorithms used in deadlock handling
sineoko [7]

Solution:

The process of transaction can guarantee the reliability of business applications. Locking resources is widely used in distributed transaction management (e.g; two phase commit, 2PC) to keep the system consistent. The locking mechanism, however, potentially results in various deadlocks. In service oriented architecture, the deadlock problem becomes even worse because multiple transactions try to lock shared resources in the unexpectable way due to the more randomicity of transaction requests, which has not been solved by existing research results. In this paper, we investigate how to prevent local deadlocks, caused by the resource competition among multiple sub-transactions of a gl obal transaction, and global deadlocks from the competition among different global transactions. We propose a replication based approach to avoid the local deadlocks, and a timestamp based approach to significantly mitigate the global deadlocks. A general algorithm is designed for both local and global deadlock prevention. The experimental results demonstrate the effectiveness and efficiency of our deadlock prevention approach. Further, it is also proved that our approach provides higher system performance than traditional resource allocation schemes.

This is the required answer.

4 0
3 years ago
Other questions:
  • Is printer an input device​
    5·1 answer
  • Write a class called Counter that represents a simple tally counter, which might be used to count people as they enter a room. T
    9·1 answer
  • Big data: options:
    8·1 answer
  • The commands available from a menu change depending upon what you are doing.<br> True<br> False
    11·2 answers
  • Which term describes the second core IPSec security protocol; it can perform authentication to provide integrity protection, alt
    13·1 answer
  • Now let's create a memo. The memo should include all parts of a memo, and these parts should appear in the correct order. In you
    9·1 answer
  • Why did my typing suddenly become delayed, but then went back to normal a few minutes later. Is this spyware or smth?
    6·1 answer
  • Discuss briefly four types of websites and the criteria you will use to evaluate the content of a website
    8·1 answer
  • What type of computer is used in ATM?
    11·2 answers
  • Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform fo
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!