1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga_2 [115]
3 years ago
6

When looking through the documentation for a specific class, you never actually see the source code for that class. Instead, you

see an interface for that class with descriptions of what all of the constructors and methods do. This is a real-world example of what concept
Computers and Technology
1 answer:
sladkih [1.3K]3 years ago
5 0

Answer:

Answer is abstraction.

Refer below.

Explanation:

When looking through the documentation for a specific class, you never actually see the source code for that class. Instead, you see an interface for that class with descriptions of what all of the constructors and methods do. This is a real-world example of abstraction.

You might be interested in
What is better in everybodys opinion. AMD or Intel?
Rama09 [41]

Answer:

Intel is more for work and such, while AMD is foucsed on gamers. I use AMD because I play many games, but it really depends on what you use your computer for.

Explanation:

4 0
2 years ago
Read 2 more answers
if a person walks 10 metres due to south in 10 seconds 10 due east in the next 10 seconds and transmitted you're not in the next
Scorpion4ik [409]

Answer:

\frac{1}{3}\ m/s

Explanation:

The computation of the velocity by using the following formula is

As we know that

Velocity = \frac{Displacement}{Total\ time\ taken}

where,

Displacement is 10 meters

Total time taken is 30 seconds

Now placing these values to the above formula

So, the velocity of Dash is

= \frac{10\ meters}{30\ seconds}

= \frac{1}{3}\ m/s

We simply applied the above formula so that we can get the velocity and the same is to be considered

5 0
2 years ago
After turning volume all the way up on your computer speaker you still can’t hear any sound. What should be done next
wariber [46]

Answer:

check to see if you have headphones or snything plug in to it that might take the sound if not try restarting your computer, or your speakers are broken with water damage or over use

Explanation:

4 0
3 years ago
The Wired Equivalent Privacy standard had what significant disadvantage?
Ivanshal [37]

Answer:

Wired equivalent privacy standard has the significant disadvantages as, it is uses the static encryption keys. Wired equivalent privacy are the security and the privacy protocol which are used for designing the wireless local area network. And the static encryption key are used to set up the router for encrypting the packet in the device. The main disadvantage is that it enables the MAC address and it is easily detectable by the hackers.  

 

6 0
3 years ago
Read 2 more answers
Which of the following files has the Ionic styles? ionic.bundle.css ionic.js ionic.css ionic.bundle.js
Law Incorporation [45]

Answer:

The correct option is ionic.css

Explanation:

Ionic style uses modes to customize the look of components. Each platform has a default mode, but this can be overridden.

And of all the options, only the ionic.css possesses the ionic styles

4 0
3 years ago
Other questions:
  • Assume that you have an array of integers named arr. The following program segment is intended to sum arr [0]through arr[n−1], w
    7·1 answer
  • Enhancing and optimizing customer retention and loyalty is a major business strategy.
    15·1 answer
  • Which of the following events would most likely produce an earthquake
    7·1 answer
  • A new product was introduced in 2003, which functions as both an identification device and a medium of communication. It uses in
    8·1 answer
  • What are the names of the four major varnas in the caste system?​
    9·2 answers
  • Images are available in many formats, such as tif, bmp, gif, jpeg, and ____.
    5·1 answer
  • What is boolean rules​
    12·1 answer
  • Which of these is a type of social engineering attack?
    10·1 answer
  • What command in cisco IOS allows the user to see the routing table
    5·1 answer
  • what is a program or collection of programs that enable a person to manipulate a visual images on a computer​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!