1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha_Volkova [10]
3 years ago
7

Consider a class called Rocket that has a private instance variable called Engine. You are writing a "getter" for the Engine. Us

ing the guiding principles of data encapsulation, under what circumstances is it allowed to return a reference to the existing Engine?
Computers and Technology
1 answer:
dusya [7]3 years ago
4 0

Answer:

when user wants duplicate copy of the object

Explanation:

Encapsulation are one of the key foundations of object-oriented programming (OOP). It involves the bundling of data or information with the methods and various techniques which operate on that data.

It can be used in hiding the true values or state of a structured data object that is in a class, preventing unauthorized parties' direct access to them.

The circumstances that can be allowed in returning a reference to the existing Engine is when user wants duplicate copy of the object.

You might be interested in
BitTorrent, a P2P protocol for file distribution, depends on a centralized resource allocation mechanism through which peers are
ch4aika [34]

Answer:

yes. it is true. mark as brainlest

8 0
2 years ago
He made me so angry when he didn’t let me make my point that I had to stalk after him.
madam [21]

Answer:

21

Explanation:

because

4 0
3 years ago
Read 2 more answers
____ is suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Levart [38]

Answer: a. RADIUS

Explanation:

RADIUS as developed with the idea of allowing its users or clients to be able to authenticate to a dial-in access server. So basically it is a client server protocol and he client here is the firebox and the server is the RADIUS server.  

The authentication mechanism start by user who sends a message to the RADIUS server. Then the RADIUS server upon receiving the message accept or denies it. It accepts if the client is configured to the server.

A large amount of additional information can be sent by the RADIUS server in its Access-Accept messages with users so we can say that RADIUS is uitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.

3 0
3 years ago
A start-up is expanding overseas and spends an excessive amount of time on recruiting and hiring activities, hindering its abili
leva [86]
HCM is a word for Human Capital Management
6 0
3 years ago
Which of the following plug-ins was developed by microsoft and is a software development tool used to write and run internet app
Elodia [21]
I'm not a hundred percent sure but maybe silverlight?
5 0
3 years ago
Other questions:
  • How might writing an online journal be different than writing in a paper one ​
    15·2 answers
  • Bullets in a text box will do which of the following?
    9·2 answers
  • What does it mean to say that two variables are negatively correlated?
    6·1 answer
  • What is the basic difference between a printer and a plotter?​
    12·1 answer
  • Lucy wants to develop a web page to display her profile. She wants to just start with a basic page that lists her accomplishment
    13·1 answer
  • The __________ tag is used to create a forced line break without starting a new paragraph.
    13·1 answer
  • Which elements of a myth appear in this story from early babylon
    14·1 answer
  • Which online note-taking device allows students to clip a page from a website and reuse it later?
    13·2 answers
  • What Is The First Computer Brought In Nepal ? <br>​
    10·1 answer
  • Assignment 1:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!