1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serjik [45]
3 years ago
12

All objects in an object-oriented program are instantiated (created) from a ____.

Computers and Technology
1 answer:
Nuetrik [128]3 years ago
6 0

Answer:

Class is the correct answer for the above question.

Explanation:

In an object-oriented language, The class is a structure type template, which is used to define the structure but the class does not take memory when an object is created then it takes the memory of class type. For example, if a user-defined class of one member whose size is 4 bit if its store in memory. When a user creates an object, then the object size is 4 bit.

That's why the class is an only structure while an object is used to give the memory for class member and the member of the class also get executed by the object of that class. class have no existence if object is not created. so when a user wants to create a object, he needs to create the object by the help of class name because class is user defined data type and object is variable of that class.

Then the answer of the above question is that object is created with the help of class which is described above.

You might be interested in
Jacob holds a Computer Hacking Forensic Investigator (CHFI) certification. Which of the following responsibilities should Jacob
nadya68 [22]

Answer:

the answers too the questions are B. identify intruder footprints,

D. Director of security, and B. Nist framework

Explanation:

3 0
1 year ago
Read 2 more answers
What affect did the Scopes trial have on the school curriculum in Tennessee?
Bad White [126]
D)It did not change the curriculum because Scopes lost the case.
4 0
3 years ago
Read 2 more answers
Sixteen stations, numbered 1 through 16, are contending for the use of a shared channel by using the adaptive tree walk protocol
Ksivusya [100]

Answer:

11 bit slot will be needed

Explanation:

The number of prime numbers between 1 through 16

= 2, 3 , 5, 7, 11 and 13

hence we can say 6 stations are to use the shared channel

Given that all the stations are ready simultaneously

The number of bit slots that will be needed to handle the contention will be 11 bits :

slot 1 : 2, 3, 5 , 7, 11 , 13

slot 2 : 2,3, 5, 7

slot 3 : 2, 3

slot 4 : 2 .   slot 5 : 3 .  slot 6 : 5,7.   slot 7 : 5 .   slot 8 : 7.  slot 9: 11,13.  

slot 10 : 11.   slot 11 : 13

8 0
3 years ago
Which motherboard slot should you install a new high-end graphics card in?
hram777 [196]

Answer:

The latest PCIe ×16 primary slot top near to CPU should be the answer to this question.

6 0
2 years ago
In your own words, what is your definition of cybercrime and computer forensics?
mr_godi [17]

Answer:  

Cyber crime is also known as computer crime in which the illegal activities are done by the computer and many mobile devices. There are many types of crime but the cyber crime are associated with the computer crime by hacking personal documents and email spamming.

To resolve these type of cyber crime there is special type of police which is known as cyber cell. Data theft, cyber stalking and accessing other user data without there permission is all comes under the cyber crime.

Computer forensics is type of application that are used in investigation purpose and gathering the information from the computer.

The main aim of computer forensic is to perform and maintain the various type structured investigation and also maintain the systematic documents for the evidence.

7 0
3 years ago
Other questions:
  • What type of desktop system is Sarah using in the following scenario? Sarah types the phrase “Open Document 3” onto a black scre
    12·1 answer
  • Rori is looking for a way to interact with others while increasing her stamina. Which community resource would be least helpful
    13·1 answer
  • Printed versions of your presentation that contain the slides and blank lines below are called speakers notes
    11·2 answers
  • Can you know what time someone retweeted
    5·1 answer
  • Writing anything that comes to mind that may relate to your personal essay is called:
    15·2 answers
  • What are the three business writing formats
    12·1 answer
  • Within the sites that support disaster recovery, __________ is a separate facility that does not have any computer equipment but
    7·1 answer
  • Create a class named Employee. The class must contain member variables for the employee name and salary. It should contain gette
    13·1 answer
  • Accenture is helping a large retailer transform their online sales and services. The Data Analyst audits the client’s customer j
    12·1 answer
  • Types of digital divide ​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!