1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Savatey [412]
3 years ago
15

Which of the following statements is false? a. Classes (and their objects) encapsulate, i.e., encase, their attributes and metho

ds. b. A class’s (and its object’s) attributes and methods are intimately related. c. For objects to communicate effectively with one another, each must know how the other object is implemented.d. Information hiding is crucial to good software engineering.
Computers and Technology
1 answer:
prohojiy [21]3 years ago
5 0

Answer:

The correct option is C: For objects to communicate effectively with one another, each must know how the other object is implemented.

Explanation:

For effective communication of objects with each other, there is no need for each object to know how the other object is implemented. The rules for communication are already defined, and hence you do not have to know, as details of implementation are hidden. Hence the only false statement from the options is C.

You might be interested in
Write a python program to print the following series 3..10..31..94......n​<br><br>Pls answer fast..
butalik [34]

I've included my code in the picture below. Best of luck

8 0
3 years ago
Which tool lists active tcp connections?
dimaraw [331]
Netstat
Type netstat -a to get a complete overview.
8 0
3 years ago
Which type of software is created on user dimension​
Ratling [72]

Answer:

Application and system software is created on user dimension.

6 0
3 years ago
What do secondary sources rely on for their analysis of events?
MariettaO [177]

Secondary sources are defined as <u>a form of document that includes information from another source to analyze an issue. </u>

When a researcher or writer wishes to cite a secondary source, it means they are using information from a primary source that is presented in another document which has cited it, <em>instead</em> of directly referring to the primary source.

Thus, it can be said that the best answer for the question above is (D) primary sources only, since secondary sources use this when analyzing the problem presented in their document.

7 0
3 years ago
Read 2 more answers
For the LEGv8 assembly instructions below, what is the corresponding C statement? Assume that the variables f, g, h, i, and j ar
lana66690 [7]

Answer:

Response:<em> B[g]= A[f]+ A[f + 1]; </em>

<em>Explanation: </em>

• The very first command "LSL, X9, X0, #3" was to multiply the factor "f" by "8" use the shift function, this really is essential to get 8-byte words from the arrays.  

• The next command was to enter the array element "A" with index "f," the index of A[f] would be in' X9' from the first instruction implementation.

• The third and fourth instructions are the same as first and second statements however the array will be "B" and the index will be "g"

• The fifth statement "LDUR X0,[ X9, #0]" will assign the array value in "A[f]" to the variable "f" located in X0.

• The sixth command "ADDI X11, X9, #8" should lead in the next array value being stored after the "X11" address "A[f]," which is the value of the item A[f+1].  

• The next command "LDUR X9,[ X11,#0]" would be to load the command to "X9."  

• The next "ADD X9, X9, X0" instruction results in the addition of X0 with X9 contents, i.e. A[f] and A[f+1] array contents, resulting in X9 register.  

• During the last request, the value stored in X9 is stored in X10, assigned to the address of B[ g] • Therefore, the overall operation performed by the instructions given is: B[g]= A[f]+ A[f + 1]

Therefore, the related C statement is B[g]= A[f]+ A[f + 1].

7 0
3 years ago
Other questions:
  • You can precede a subquery with the ___ operator to create a conditiion that is true if one or more rows are obstained when the
    10·1 answer
  • Value: 3
    6·1 answer
  • Describe an application or a situation in which it is not convenient to use a linked list to store the data of the application
    12·1 answer
  • Variables set equal to patterns are said to be:_______.
    7·1 answer
  • Which is used to identify the network portion and the host portion of an ip address?
    6·1 answer
  • What is the HIPAA Privacy rule, and why does it affect IT professionals?
    5·1 answer
  • When the code that follows is executed, a message is displayed if the value the user entersvar userEntry = (prompt("Enter cost:"
    11·1 answer
  • One of the driving forces in operating system evolution is advancement in the underlying hardware technology.
    8·1 answer
  • Some scientists say that robots my become self - aware in the near future Do you think this is possible?​
    10·1 answer
  • What is the remainder obtained by dividing x 7 + x 5 + 1 by the generator polynomial x 3 + 1?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!