1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
velikii [3]
3 years ago
5

​ If a class is reusable, that is to say that it can be used in several different applications, then it has been designed using

what good design principle? An example might be a button class.
Computers and Technology
1 answer:
emmainna [20.7K]3 years ago
6 0

High cohesion

fghfghdgfhgdhgh

You might be interested in
Which of the following statements is CORRECT? a. Multiple IRRs can occur only if the signs of the cash flows change more than on
BigorU [14]

Answer: i think the answer is

a. Multiple IRRs can occur only if the signs of the cash flows change more than once.

Explanation:

3 0
3 years ago
100 POINTS + BRAINLYEST TO FIRST PERSON THAT IS CORRECT!!! Tomika wants to create a cell style for her workbook and share it wit
andrew11 [14]

Answer:

Go to the Home tab on the ribbon and the group Styles.

Left Click Cell Styles, then click New Cell Style and create the style.

To share it with other workbooks, use the Merge Styles function in the same group.

Explanation:

This info was for excel.

Please mark brainliest!

6 0
3 years ago
Read 2 more answers
Your organization has started receiving phishing emails. You suspect that an attacker is attempting to find an employee workstat
EastWind [94]

Answer:

E). User education and training.

Explanation:

In the context of network security, the most significant aspect of ensuring security from workstation cyberattacks would be 'education, as well as, training of the users.' <u>If the employee users are educated well regarding the probable threats and attacks along with the necessary safety measures to be adopted and trained adequately to use the system appropriately so that the sensitive information cannot be leaked</u> while working on the workstation and no networks could be compromised. Thus, <u>option E</u> is the correct answer.

3 0
3 years ago
AP CSA help needed. Java please.
leva [86]
#include using namespace std;int main(){int year = 12,value = 10,total = 0;do{year++;value *= 2;total += value;}while(value*2 < 1000);cout << "Age: " << year << endl;cout << "Last gift: " << value << endl;cout << "Total: " << total << endl;cin.get();return 0;
5 0
2 years ago
Question 3 / 5
Andrej [43]

Answer:

False

Explanation:

3 0
3 years ago
Other questions:
  • What makes an active heat sink different from a passive heat sink?
    12·1 answer
  • When using an online media source, students should ensure the information is
    13·2 answers
  • You have a hard disk that is formatted with the fat32 file system. you would like to implement file and folder permissions on th
    10·1 answer
  • Ternary operators of computer<br><br>please explain. ​
    15·1 answer
  • Commercial applications are never free<br><br> -True<br><br> -False
    9·1 answer
  • If wire rope guard rails are used what must also be done?
    10·1 answer
  • Define Class in C++. Briefly discuss.
    9·1 answer
  • What is the BCC feature used for?
    12·2 answers
  • What does BGP use by default to calculate the best route?
    15·1 answer
  • What are the 2 levels of formatting in a word document
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!