1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
topjm [15]
3 years ago
6

Kylie has created some code designed to keep track of information about employees at a company. The code will be used by the com

pany to create a database of personal information (like home address, phone humber, email address, etc.) and salary information. Since Kylie knows that the company will only need to do a few things with the program, she makes many procedures and variables private so as to "hide" the implementation. This doesn't affect the behavior of the code. What Kylie has done to her program is called...
A. data abstraction
B. procedural abstraction
C. parameterization
Computers and Technology
1 answer:
Tanya [424]3 years ago
7 0

Answer:

Option (A) is the correct answer to the given question.

Explanation:

The main objective of the data abstraction means to presenting the outside environment only with the important information and hide its factual details on the program or in the environment .In the real world example our mobile is working perfectly or not is the important details not the internal implementation of mobile.

As the Kylie is to track the information of the employee .The programming code is used to creating the database management system it mainly hides the implementation like variable so this behavior is known as Data Abstraction also it does not affect the internal behavior .

Others options are not  any features of programming language so these are incorrect options.  

You might be interested in
Computer Graphics:
algol13
Thanks hope it helps

4 0
2 years ago
How many address bits are needed to specify each byte in a 512 byte memory unit?
schepotkina [342]

Explanation:

In a 512 byte memory unit, in order to address each byte, there will be 512 locations (each one byte) ranging from 0 to 511.

Thus it will take 9 bits (2^9=512) to store the address within the unit.

5 0
3 years ago
____________ is a widely accepted international best practices framework for implementing information systems security.
balandron [24]

Answer:

Control Objectives for Information and related Technology (COBIT)

Explanation:

COBIT is a framework developed by the ISACA for managing and supervising Information Technology processes. Such kinds of frameworks allow companies to position themselves with the expectations that they and their clients expect. COBIT's aim is to provide management and business process owners with an IT control and governance model that helps deliver value from IT and identify and handle the IT-related risks. It helps bridge the gap between business needs, control requirements and technical issues. It is a paradigm of control for addressing the IT governance requirements and maintaining the security of knowledge and information systems. COBIT emphasizes on what allows processes to work well.

8 0
3 years ago
balance exercises used for introducing balance training should initially involve little joint motion and improve what type of co
liubo4ka [24]

The balance exercises used for introducing balance training should initially involve little joint motion and improve the Reflexive (automatic) joint-stabilization contractions.

<h3>What is the main goal of balance training?</h3>

Balance training is known to be a kind of an exercise where a person that is doing the  exercises works out so as to strengthen the muscles that aids  them to keep to be upright, such as their  legs and core.

Note that  kinds of exercises are done so as to improve stability and help hinder falls.

Therefore, The balance exercises used for introducing balance training should initially involve little joint motion and improve the Reflexive (automatic) joint-stabilization contractions.

Learn more about balance exercises  from

brainly.com/question/16218940

#SPJ1

5 0
1 year ago
Can Someone help plz?
Ugo [173]

Answer:

i dont understand sorry

Explanation:

7 0
3 years ago
Other questions:
  • The condition, ____, entered in the criteria row of a long text field in a query window would retrieve all records where the lon
    8·1 answer
  • How many host ip addresses are available on a network with a subnet mask of 255.255.255.192?
    6·1 answer
  • Select the correct answer.
    6·1 answer
  • Is a fundamental building block of a relational database because this object stores all of the data
    15·1 answer
  • What word describes the complexity of document
    13·1 answer
  • Josh wants to convey his best wishes to johnathin for a meeting schedualed later diring the day. Which business documented would
    7·1 answer
  • The ash and dust from a volcanic eruption can cause a ______ change in the environment.
    8·1 answer
  • A noisy signal has been uploaded to D2L in the files fft_signal.mat and fft_signal.txt.Write a program to estimate the power spe
    10·1 answer
  • The
    6·2 answers
  • What allows you to heal<br><br><br><br> undesirable portions of an image​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!