1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valina [46]
2 years ago
7

Classes can create new classes from existing classes. this important feature ____.

Computers and Technology
1 answer:
user100 [1]2 years ago
4 0

Inheritance describes the ability to create new classes based on an existing class.

<h3>What is Inheritance ?</h3>

Receiving private property, titles, debts, entitlements, advantages, rights, and liabilities when a person dies is the practice known as inheritance. Different societies have different inheritance laws, which have evolved over time. A testator may formally bequeath private property and/or obligations by means of a will, as attested by a notary public, or by other legal ways.

If there was no will left by the decedent, intestate laws may apply to determine how the inheritance is distributed. The intestate laws will then take effect if the will is found to be in violation of the laws in effect at the time it was written (certain states, for instance, do not recognize handwritten wills as legitimate, or only in certain circumstances).

Disinheritance is the exclusion from inheritance of a person who was an heir in a prior will or would ordinarily be expected to inherit.

To learn more about Inheritance from the given link:

brainly.com/question/15078897

#SPJ4

You might be interested in
20 POINTS!!! I NEED HELPP
Cloud [144]

Answer:

Apple

Explanation:

5 0
3 years ago
Read 2 more answers
What type of software is an antivirus?
Kamila [148]

Answer: what type of software is an antivirus?

Answer: A security software

Explanation:

Antivirus software is a type of security software designed to protect users from multiple types of malware, not just viruses. The software is a risk management tool that scans devices regularly and on-demand for known malware and suspicious behavior associated with malware.

6 0
3 years ago
Read 2 more answers
What is the term for the instructions that tell a computer what to do
Liono4ka [1.6K]

Answer: I believe it's software.

4 0
3 years ago
In computer science what are the methods used to protect the information stored by a piece of software called?
Nezavi [6.7K]

Answer:

cryptography

Explanation:

cryptography

In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher

3 0
2 years ago
How many possible mac addresses are there?
oksian1 [2.3K]
There are 6 octects ( 8 bit numbers ) in a MAC address, so there's 256^6 possible addresses.
6 0
3 years ago
Other questions:
  • How do smart watches affect the business and its position in the global marketplace?
    12·2 answers
  • The ________ of the operating system enables users to communicate with the computer system. modem window network adapter card us
    14·1 answer
  • In the space below, write the formula that needs to be added to the blank cells under the fourth column of the table.
    13·1 answer
  • Why are advanced features helpful when businesses use spreadsheets
    5·1 answer
  • 50 POINTS!!!!
    8·1 answer
  • Why does the job market change overtime
    9·1 answer
  • You are a network technician for a small corporate network. It's been decided that the office needs a wireless network for emplo
    6·1 answer
  • ________ uses the signals transmitted over the phone to access the database, retrieve account information and input data. Group
    11·1 answer
  • Select the correct answer.
    7·2 answers
  • Which of the following do nylon and Kevlar fibers have in common?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!