1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksley [76]
4 years ago
5

Object-oriented development could potentially reduce the time and cost of writing software because: Group of answer choices a) i

terative prototyping is not required. b) objects are reusable. c) it's not necessary to use a formal methodology to design a system. d) object-oriented programming requires less training. e) a single user interface object can be used for the entire application.
Computers and Technology
1 answer:
spayn [35]4 years ago
3 0

Answer:

b) objects are resuable

Explanation:

In OOP there's code reuse where a method or any other body of code is defined once and called or reused severally.

You might be interested in
My mom works from home selling her craft work online to people all over the world. She can do this from home because we have acc
8_murik_8 [283]
I would go with A) The Internet 


I hope that turns out well for you. Good luck! (:
6 0
3 years ago
To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictl
Zolol [24]

Answer: False

Explanation:

 The given statement is false, as the configuration of the firewall, operational and administration procedure must be documented.

The configuration of multiple firewall are identical and the integrity and also performance of the configuration firewall files are check on the regularly bases.

It is basically used to avoid the security leaks and the documentation errors so it is necessary that it should be check regularly so that it can easily implement without any interrupt occurrence.

8 0
3 years ago
A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code
Maslowich
A Cryptographich hash is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.
3 0
3 years ago
Which of the following terms best describes the security domain that relates to how data is classified and valued?
d1i1m1o1n [39]

Answer:

c) Access Control.

Explanation:

The term which describes the security domain best that relates to  how the data is valued and classified is Access Control.

Access Control :It is the restriction of access of a resource or a place that is selective.Permission to access a resource is called authorization.It is an important term in the field of information security and physical security.

7 0
3 years ago
Drag each tile to the correct box. Arrange the statements in sequence to correctly explain what the field of science includes. a
erastova [34]

These refer to the elementary steps of the scientific method.

The correct order is as follows:

  • Keen observation of natural phenomena.

  • The use of imagination and creativity to test understanding and predictions.

  • An attempt to verify the understanding of observed natural occurrences establishing verifiable scientific knowledge

  • Continued observance and testing to revise scientific knowledge.

  • An understanding of how or why these natural phenomena occur.

Learn more about the scientific methods at the link below:

brainly.com/question/497944

3 0
3 years ago
Other questions:
  • Many people view drug and alcohol abuse as a social problem.<br> A. TRUE<br> B. FALSE
    9·1 answer
  • You want to discard your old computer and want to securely erase the data from your hard drive. What can you use to do this and
    10·1 answer
  • What type of storage system is a hard drive on a computer?<br> Need HELP fast, please.
    9·2 answers
  • Which of the following tasks is an interactive media professional most likely to do? Check all of the boxes that apply. 1. decid
    11·1 answer
  • What is predictive dialing?
    12·1 answer
  • Consider the classes below: public class TestA { public static void main(String[] args) { ​ int x = 2; ​ int y = 20 ​ int counte
    6·1 answer
  • When it's time to change career paths, it's a good idea to first​
    7·2 answers
  • Anyone tell my answer.
    15·1 answer
  • What are real online jobs any one of any age can get pays weekly by Pay<br> Pal
    8·1 answer
  • Which JavaScript defense restricts a JavaScript downloaded from Site A from accessing data that came from Site B?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!