1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lyudmila [28]
3 years ago
7

chaussure is an online shoe retailer. The applications for the web site are developed using classes and object-oriented programm

ing techniques. Which of the following is a valid example of an object? a. credit card receipt b. text box to enter the credit card number in an application c. Place Order button in an application d. all of the above e. a and c
Computers and Technology
1 answer:
sesenic [268]3 years ago
7 0

Answer:

the answer is  option E ....................a and c

i.e  credit card receipt &   Place Order button in an application

Explanation:

Reason is because the Text box, credit card receipt and button would be classes and text box to enter credit card number would also be an object of Text box class place order button would be an object of button class.

You might be interested in
We want to implement a data link control protocol on a channel that has limited bandwidth and high error rate. On the other hand
Korolek [52]

Answer:

Selective Repeat protocols

Explanation:

It is better to make use of the selective repeat protocol here. From what we have here, there is a high error rate on this channel.

If we had implemented Go back N protocol, the whole N packets would be retransmitted. Much bandwidth would be needed here.

But we are told that bandwidth is limited. So if packet get lost when we implement selective protocol, we would only need less bandwidth since we would retransmit only this packet.

6 0
3 years ago
If your computer is running slowly, which of the following is most likely to solve the problem?
Rom4ik [11]
Rebooting the computer and calling the computer maunfactoring company will help. If not, you could go to a repair shop.
8 0
3 years ago
Read 2 more answers
Suppose we compute a depth-first search tree rooted at u and obtain a tree t that includes all nodes of g.
Temka [501]

G is a tree, per node has a special path from the root. So, both BFS and DFS have the exact tree, and the tree is the exact as G.

<h3>What are DFS and BFS?</h3>

An algorithm for navigating or examining tree or graph data structures is called depth-first search. The algorithm moves as far as it can along each branch before turning around, starting at the root node.

The breadth-first search strategy can be used to look for a node in a tree data structure that has a specific property. Before moving on to the nodes at the next depth level, it begins at the root of the tree and investigates every node there.

First, we reveal that G exists a tree when both BFS-tree and DFS-tree are exact.

If G and T are not exact, then there should exist a border e(u, v) in G, that does not belong to T.

In such a case:

- in the DFS tree, one of u or v, should be a prototype of the other.

- in the BFS tree, u and v can differ by only one level.

Since, both DFS-tree and BFS-tree are the very tree T,

it follows that one of u and v should be a prototype of the other and they can discuss by only one party.

This means that the border joining them must be in T.

So, there can not be any limits in G which are not in T.

In the two-part of evidence:

Since G is a tree, per node has a special path from the root. So, both BFS and DFS have the exact tree, and the tree is the exact as G.

The complete question is:

We have a connected graph G = (V, E), and a specific vertex u ∈ V.

Suppose we compute a depth-first search tree rooted at u, and obtain a tree T that includes all nodes of G.

Suppose we then compute a breadth-first search tree rooted at u, and obtain the same tree T.

Prove that G = T. (In other words, if T is both a depth-first search tree and a breadth-first search tree rooted at u, then G cannot contain any edges that do not belong to T.)

To learn more about  DFS and BFS, refer to:

brainly.com/question/13014003

#SPJ4

5 0
2 years ago
If you want to develop an Android app, you need to become a registered developer with which platform?
Orlov [11]
C is the correct answer
3 0
3 years ago
If an object someThing has a method someMethod( ), then you can call the method using the statement ____________ .
Stels [109]

Answer:

C) someThing.someMethod( )

Explanation:

The methods in a class can be accessed outside the class (assuming they are public methods and not private to the class) by using the dot(.) symbol and calling the method on the instance or object of the class.

In this case, the object of the class someThing, calls the method, someMethod( ) by using a dot and the name of the method with a parentheses at the end. This enables the code in the method act on the class instance or object.

8 0
3 years ago
Other questions:
  • Recall that TCP can be enhanced with SSL to provide process-to-process security services, including encryption. Does SSL operate
    7·1 answer
  • A small amount of memory stored on the central processor for easy access is called
    6·2 answers
  • 2. Voltage is:
    13·1 answer
  • What type of coverage pays for damage incurred as a result of theft, vandalism, fire or natural disaster?
    15·1 answer
  • A letter of application should be written on:
    13·1 answer
  • List six common raster image file types.
    9·1 answer
  • What is a computing event
    14·1 answer
  • Drag the tiles to the correct boxes to complete the pairs.
    7·1 answer
  • It is easier to make an object move across the screen by using the tweening function rather than creating each individual frame
    5·1 answer
  • What do artists often use to create illusions in an Image?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!