1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha_Volkova [10]
3 years ago
7

Consider a class called Rocket that has a private instance variable called Engine. You are writing a "getter" for the Engine. Us

ing the guiding principles of data encapsulation, under what circumstances is it allowed to return a reference to the existing Engine?
Computers and Technology
1 answer:
dusya [7]3 years ago
4 0

Answer:

when user wants duplicate copy of the object

Explanation:

Encapsulation are one of the key foundations of object-oriented programming (OOP). It involves the bundling of data or information with the methods and various techniques which operate on that data.

It can be used in hiding the true values or state of a structured data object that is in a class, preventing unauthorized parties' direct access to them.

The circumstances that can be allowed in returning a reference to the existing Engine is when user wants duplicate copy of the object.

You might be interested in
How to convert mkv to avi without losing quality?
Alexus [3.1K]
Ive done this before with success.
You will need <span>FFmpeg.</span>
https://superuser.com/questions/227338/how-to-convert-an-mkv-to-avi-with-minimal-loss
7 0
2 years ago
listen to exam instructions a small business called widgets, inc. has hired you to evaluate their wireless network security prac
Alex

Following actions could you most likely advise the client taking to strengthen the security of their wireless network-

  • Change the default SSID to anything different.
  • Turn off SSID broadcasting.
<h3>Explain the term wireless network security?</h3>
  • Designing, putting into practice, and ensuring security on such a wireless computer network are all parts of wireless network security.
  • A wireless computer network is further protected by this subset of network security.
  • Wireless security is another name for wireless network security.

For the stated question-

  • Disabling SSID broadcast and changing the network name are advised.
  • By disabling SSID, the network name won't be displayed on devices looking for a network can connect to, and so by changing the name, it will be impossible for anyone who already knows the old name to connect.
  • Both of which significantly boost security.

To know more about the wireless network security, here

brainly.com/question/28257213

#SPJ4

3 0
1 year ago
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.
Juli2301 [7.4K]

Answer:

(config)# enable password secret

(config)# enable secret Encrypted_Password

(config-line)# password secret

(config)# enable secret Secret_Password

(config)# service password-encryption

Explanation:

To prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command. This command encrypts all configured passwords in the configuration file. For more: https://ccnav7.net/what-command-will-prevent-all-unencrypted-passwords-from-displaying-in-plain-text-in-a-configuration-file-2/

3 0
2 years ago
A(n) _________________________ conveys a visual representation of data.
Komok [63]
I believe that the answer to fit this sentence is chart. Hope that this answer helped! ☺
3 0
3 years ago
What is Application Software ??
Paraphin [41]


Hi Pupil Here's Your Answer ::



➡➡➡➡➡➡➡➡➡➡➡➡➡


Application software and software that are created to facilitate/perform a specific type of real life application directly for the end user. These are available in the market as single readymade software or as an integrated package like MS Office, Visual Studio or Adobe integrated suite.


There are three types of application software which you would know about ::

# General Purpose Application Software.

# Special Purpose Application Software.

# Customized or Bespoke Purpose Application Software.


⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅




Hope this helps .........
6 0
3 years ago
Read 2 more answers
Other questions:
  • An example of hardware is a _____. database spreadsheet monitor program used to enhance photos
    13·2 answers
  • The problem of using IP numbers for addressing hosts in the Internet are resolved using
    5·1 answer
  • A ________ is a user-interface component with two states: checked and unchecked. radio button check box menu item submenu item
    5·1 answer
  • Which of the following components controls the opening and closing of the valves in an engine ?
    15·2 answers
  • ________ is used to install and update software, backup, and restore mobile devices, wipe employer software and data from device
    8·1 answer
  • If you flash UEFI and now your computer is no longer working, is there anything you can do to correct the situation?
    5·1 answer
  • Samantha is in the beginning stages of OOP program development. What are the five steps she must follow for creating an OOP prog
    6·2 answers
  • Write a program that has an array of at least 50 string objects that hold people’s names and phone numbers. The program then rea
    12·1 answer
  • What is the benefit of working with a ready-to-use cloud based AI vendor service?
    13·1 answer
  • What are three ways digital identity is created and kept up? (open answer)
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!