1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga_2 [115]
3 years ago
6

When looking through the documentation for a specific class, you never actually see the source code for that class. Instead, you

see an interface for that class with descriptions of what all of the constructors and methods do. This is a real-world example of what concept
Computers and Technology
1 answer:
sladkih [1.3K]3 years ago
5 0

Answer:

Answer is abstraction.

Refer below.

Explanation:

When looking through the documentation for a specific class, you never actually see the source code for that class. Instead, you see an interface for that class with descriptions of what all of the constructors and methods do. This is a real-world example of abstraction.

You might be interested in
Which of the operating systems listed below is not proprietary?
Jobisdone [24]
One which is open source, linux based
3 0
3 years ago
Which of the following statements is true?
jeka57 [31]

Answer: Constructors can specify parameters but not return types.

Explanation:

public class Student {

 int roll_no;

 public Student(int a) {

   roll_no = a;

 }

public static void main(String[] args) {

   Student abs = new Student(10);

   System.out.println(abc.roll_no);

 }

}

In the above code we have illustrated the working of constructors. We have a class with the name Student. then a constructor is created of the class called as the class constructor. In the main we create an object of the class and with this object we invoke the constructor and also pass a parameter. Here in the code we are passing the roll no of the student.

So we can say that constructor is called during the runtime when the object created invokes the constructor so a constructor can have many arguments but it does not have a return type.

7 0
3 years ago
(2-2) In relatives.pl file, write and add the following rule. ancestor(X, Y) : X is an ancestor of Y Run ancestor(brown, X). Sub
alukav5142 [94]

Answer:

Check the explanation

Explanation:

relatives.pl

/* Facts */

male(ace).

male(john).

male(jack).

male(bill).

male(david).

male(brown).

male(daniel).

female(cecil).

female(aba).

female(cathy).

parent(john,ace)

parent(tom,john)

parent(jack,john)

parent(bill,aba)

parent(brown,aba)

parent(cecil,bill)

parent(david,cecil)

parent(cathy,brown)

parent(daniel,cathy)

parent(ellen,daniel)

/* parent(X,Y) -> Y is parent of X */

wife(ceceil,jack) /* wife(X,Y) -> Y is wife of X */

Answer of 2-2

Considering all facts and rules answer will be daniel,ellen.

Answer 2-3

Considering all facts and rules answer will be bill.

Answer 2-4

Considering all facts and rules X will be john and y will be cecil.

Answer 2-5

Considering all facts and rules X will be tom and y will be david.

4 0
3 years ago
Find the error in the statement below.
qwelly [4]

Answer:

I think it's C) The semi-colon should be a colon.

Explanation:

4 0
3 years ago
Which css property controls the space between an html element and the next nearest element?
irina1246 [14]
Padding i believe,i got it off quizlet
6 0
4 years ago
Other questions:
  • peter has recently bought a media player and a digital camera. he wants to buy a memory card for these devices. which memory dev
    11·1 answer
  • Ideally, how often should you back up the data on your computer? once an hour, once a day, once a month, once a year. Please hur
    5·2 answers
  • What nomenclature, commands, procedures are used by the program to define capabilities in the following
    15·1 answer
  • No processo fluido a fluido há outra câmara na saída do material extrudado com pressão menor que a câmara anterior. Isso permite
    8·1 answer
  • Because of Moore's Law, widely-used encryption programs currently employed by banks and ecommerce sites are now easily penetrate
    11·1 answer
  • A technician is configuring a new SOHO multifunction wireless router at a customer’s location to provide network access to sever
    12·1 answer
  • Which two tools used for incident detection can be used to detect anomalous behavior, to detect command and control traffic, and
    13·1 answer
  • Who has gotten a random file link from someone? What file does it contain?
    8·2 answers
  • Which is better Play Station Xbox or PC
    14·2 answers
  • brielle is researching substitution ciphers. she came across a cipher in which the entire alphabet was rotated 13 steps. what ty
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!