1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ss7ja [257]
2 years ago
14

Classes that depend on field names from parent classes are said to be ____ because they are prone to errors.Group of answer choi

cesrobustinnovativefragileconstructive
Computers and Technology
1 answer:
hoa [83]2 years ago
5 0

Classes that depend on field names from parent classes are generally said to be <u>fragile</u> because they are very prone to coding errors.

<h3>What is a class?</h3>

A class can be defined as a user-defined blueprint (prototype) or template that is typically used by software programmers to create objects and define the data types, categories, and methods that should be associated with these objects.

In object-oriented programming (OOP) language, a class that is written or created to implement an interface would most likely implement all of that interface's method declarations without any coding error.

In Computer programming, we can infer and logically conclude that classes that are highly dependent on field names from parent classes are generally said to be <u>fragile</u> because they are very prone to coding errors.

Read more on class here: brainly.com/question/20264183

#SPJ1

You might be interested in
Expressions coded in the HAVING clause
HACTEHA [7]

Answer:

A

Explanation:

Expressions coded in the HAVING clause can use either aggregate search conditions or non-aggregate search conditions.

Cheers

7 0
3 years ago
The formatting option functions like space bar. However instead of moving one space at a time, it allows you to move your text i
Schach [20]
What are the options???
4 0
3 years ago
How will wireless information appliances and services affect the business use of the Internet and the Web? Explain.
Paraphin [41]

Answer:

wireless information appliances and services affect the business use of the internet and the web in a positive way. Wireless information appliances and services affect the business use of the web and internet by allowing internet pretty much anywhere. Now days devices like cell phones can access almost everything a regular computer can access. The use of wireless information allows businesses to stay in constant contact with customers, employees, and suppliers.

3 0
3 years ago
A ____ is an e-mail attack in which the attacker routes large quantities of e-mail to the target system hoping to overwhelm the
GarryVolchara [31]

Answer:

Mail bomb is the correct answer.

Explanation:

In the following statement, A mail bomb is the type of attack on e-mail of the particular person by which the attacker transfers large quantities of e-mail to the target computer in the expectation of flooding the target with so much meaningless e-mail that legitimate e-mail is not accessible. So, that's why the following answer is correct.

3 0
3 years ago
What are the charactaristic of computer with virus​
NISA [10]

Explanation:

One of the main characteristics of computer viruses is related to the fact that they are programs created by hackers that attack the code of a computer, infecting files on the computer's hard drive or its source code. Once the virus has been copied onto the computer, it can contaminate other computers that come into contact with the machine.

5 0
3 years ago
Read 2 more answers
Other questions:
  • With which type of media are you interacting when you read an online shopping website?
    7·1 answer
  • Explain briefly why every person in the world is not connected to the Internet.
    9·1 answer
  • Which career path includes the work duties of hiring and managing farm laborers?
    6·2 answers
  • John has subscribed to a cloud-based service to synchronize data between his smartphone, tablet, and PC. Before allowing the dat
    10·1 answer
  • For large and complex amounts of information, storing the information is best achieved by using what?
    5·1 answer
  • Which of the following is the single best rule to enforce when designing complex passwords?
    10·1 answer
  • A seven-octet pattern of alternating 0s and 1s used by the receiver to establish bit synchronization is a _______
    11·1 answer
  • Cómo se transmite la voz en el sistema telefónico?
    12·1 answer
  • Which of the following is not a benefit of shaping data with the Power Query Editor?
    13·1 answer
  • What year does futurist ray kurzweil believe ai will meet human intelligence?.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!