1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
My name is Ann [436]
4 years ago
12

Before sharing a document, you must first save the document to

Computers and Technology
1 answer:
natta225 [31]4 years ago
4 0
Not lose it and make sure to proof read it? i apologize if its wrong
You might be interested in
assume a class named window has an accessor method named getwidth that accepts no parameters and returns an int. assume further
worty [1.4K]

The set and get functions are analogous to the accessor and mutator functions of C++. They are used in place of modifying a class member directly inside an object and making it public. An accessor function must be invoked in order to gain access to a private object member.

int mVal = winarr[0].getWidth();

for(int i = 1; i < winarrsize; i++)

{

  if(winarr[i].getWidth() > mxVal)

     mVal = winarr[i].getWidth();

}

cout << "The widest width is: "

<< mVal << endl;

By using encapsulation, a programmer can specify the labels for the data members and functions as well as whether or not other classes can access them. When data members are marked as "private," member functions of other classes cannot access or modify them which allows members access to these private data.

For a member such as Level, a function like GetLevel() returns the value of the member, while a function like SetLevel() gives it a value.

To learn more about Accessor Function click here:

brainly.com/question/13098886

#SPJ4

5 0
1 year ago
What is extraction, transformation, and loading? Group of answer choices It is a process of entering data, tracking data, and lo
Tcecarenko [31]

Answer:

It is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.

Explanation:

Extraction, transformation, and loading can be defined as a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

7 0
3 years ago
Compare the applications below:
alisha [4.7K]
Both can be the same thing
4 0
3 years ago
Read 2 more answers
A company has purchased a new SaaS application and is in the process of configuring it to meet the company's needs. The director
Dominik [7]

Answer:

The answers are letters A and C.

Explanation:

The security administrator should set up the LDAP and SAML configuration, because both of them provides authentication support as their central identity management solution for the company.

6 0
3 years ago
__________ often causes overactive eye movement.
shepuryov [24]
The answer is ; D , xanax
3 0
3 years ago
Read 2 more answers
Other questions:
  • What is the primary limitation of free versions of antivirus applications
    14·1 answer
  • A Use-Case diagram is a staticdiagram?
    7·1 answer
  • python A pet shop wants to give a discount to its clients if they buy one or more pets. The discount is equal to 20 percent of t
    12·1 answer
  • Which solution eliminates the need for dedicated high-speed WAN connections between sites
    11·1 answer
  • The dramatic increase in the number of people having access to the Internet has been made possible, in part, because of the rela
    8·1 answer
  • Consider the following code segment:
    14·1 answer
  • A garments manufacturing company buys various types of natural and synthetic materials to produce clothes. Which material is a s
    6·2 answers
  • If someone wanted to talk to a financial institution representative in person they would need to _____.
    5·1 answer
  • Algoritmos para llevar a cabo una actividad
    15·1 answer
  • Write a function named dice_eval that accepts two parameters representing numeric dice values and returns a string describing th
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!