1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karo-lina-s [1.5K]
3 years ago
6

Do you believe that OOP should be phased out and we should start working on some alternative

Computers and Technology
1 answer:
masya89 [10]3 years ago
8 0

Answer:  No, working on alternative instead of OOP is not the best option. In this time of computer technology, there are many different ways to solve a problem. OOP is the choice of law when it comes to solve a problem using object oriented solutions. OOP is a way of developing software that sums up the responsibilities of the system in a company which works together on objects. Objects are not the differentiating characteristics of Object Oriented Programming, instead these are necessary for writing object oriented software.

Why we shouldn't use the other alternatives. Here are two statements which supports my opinion:

  • If a problem is classified or divided in many different categories, this will results in complex interactions, for which an object oriented modeling will be selected. The problems like these ends up in complex results in other models.
  • The standardized approach towards solving problems is Object Oriented designs patterns. By using OO, solutions are generated, which are understandable for both creator and the coder. There are different numbers of design patterns of OO.

You might be interested in
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
3 years ago
Using refracted laser light to store data on a photoreceptive substrate is essentially how ___ storage works. Theoretically this
Alina [70]

Answer:

I try to search the answer but I couldn't find it

4 0
3 years ago
Write a short essay on the importance of information and communication technology (ICT) in the AFN industry. Add suitable exampl
AURORKA [14]

Answer:

computer

Explanation:

is an ICT device that help and makes things or work easy

6 0
3 years ago
Computer a sends a packet intended to reach computer f. along its path it arrives at computer
disa [49]
<span>To the computer f, this answer is because when reading the statement I assume that there is no type of connection and / or communication between the computer a and c; therefore to be profitable the computer c should return the package sending it back to computer f.</span>
5 0
3 years ago
One way to save time and get to the colleges that you are most interested in at a college fair is to
son4ous [18]

Answer:

Identify the location of the college stand in advance.

Explanation:

One way to save time and get to the colleges that you are most interested in at a college fair is to find out in advance the information about the fair, the colleges that are participating and from that pick the more interesting ones and identify the location of their stands. Like that when you arrive to the fair you can go directly to them and find them easily which will save you a lot of time as you won't be walking around the whole place to find them.

8 0
3 years ago
Read 2 more answers
Other questions:
  • If you want to store the information that a user types in response to the input() function, what do you need to do? (select the
    11·1 answer
  • We never need to use a forward declaration when invoking a public subprogram. true or false?
    15·1 answer
  • How many unique ip addresses can be made in a fixed-length ip address system using 6 bits?
    8·1 answer
  • In which of the following scenarios would it be best to use a for loop?
    6·1 answer
  • 29 POINTS!!!
    6·1 answer
  • . An access specifier is one of three keywords:
    14·1 answer
  • A technician is assigned a task to configure a new server with six hard drives. The senior administrator requested the technicia
    13·1 answer
  • Among the second generation home console companies,which managed to come out on top
    10·1 answer
  • Wrtie a program in which we will pass a value N. N can be positive or negative. If N is positive then output all values from N d
    8·1 answer
  • Create a file named homework_instructions.txt using VI editor and type in it all the submission instructions from page1 of this
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!