1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
patriot [66]
3 years ago
5

A major advantage of a method is that it is easily reusable. What does it mean to reuse a method and what are the advantages of

doing so?
Computers and Technology
1 answer:
JulijaS [17]3 years ago
8 0

Answer: To reuse a method means to use a code which has been done or prepared already and just we need to change some of the functionalities.

This helps a great deal of saving time as well as helps in making the code manageable.

Explanation:

This has been practiced since long that methods can be reused. for example we need to build a calculator in c. then we can simply reuse the same method  just we need to change the sign of the operator. So in this process we can speed up our operations and work and also can make the code easy to understand and manage it when we have have to deal with large lines of code.

You might be interested in
A search engine attempts to catalog every Web page by topic through the use of a ____
-BARSIC- [3]
<span>A search engine attempts to catalog every Web page by topic through the use of a spider (web crawlers). </span>
8 0
3 years ago
If a full disk encryption (FDE) password is forgotten, what can be incorporated to securely store the encryption key to unlock t
Reptile [31]

Answer:

Key escrow.

Explanation:

If a full disk encryption (FDE) password is forgotten, a key escrow can be incorporated to securely store the encryption key to unlock the disk.

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

<em>Therefore, when a full disk encryption (FDE) password is forgotten, a key escrow if incorporated can be used to retrieve the password. Subsequently, the password would then be used to unlock or decrypt the disk.</em>

3 0
3 years ago
How to be fluent in computer
Setler79 [48]

Explanation:

1. Seeing people do technological innovations, so you have some motivation and inspiration to be fluent in computer

2. Try experimenting and trying stuff, like trying to learn how to code, how the internet work, etc.

3. work more with computers, for example, make a note with OneNote, making digital art with blender, adobe illustrator etc.

4. Try to learn how to be better at learning computer, like, if you do mistakes in your learning journey, try to avoid it next time

5. good luck ;)

7 0
2 years ago
Read 2 more answers
Creating a newsletter
pav-90 [236]
This isn’t helpful considering no one knows what type of news letter you want
6 0
3 years ago
LIST THE 7 BEST COMPUTER SCIENCE MOVIES.
Serggg [28]

The Pirates of Silicon Valley.

Tron

Hackers

Antitrust

The Social Network

The Internship

The Imitation Game

5 0
3 years ago
Other questions:
  • Match each feature to whether it influences audio or video quality
    6·1 answer
  • Write a C++ program that searches for anagrams in a dictionary. An anagram is a word obtained by scrambling the letters of some
    5·1 answer
  • Data warehousing and data mining mean the same thing when applied to CRM
    7·2 answers
  • Computers are not just stand-alone desktop machines anymore. They are often embedded in common appliances and technology that we
    6·1 answer
  • program students can get credit for their high school classes as long as they take a specific courses that a college will accept
    13·2 answers
  • Drag each label to the correct location on the image.
    10·1 answer
  • Your boss is very skeptical about the idea of storing his files up in the cloud rather
    8·1 answer
  • Just as arrays can only have a, set at the time the array is declared, a parameter list also can only have a fixed number of ele
    5·1 answer
  • Explain how SEO impacts the way you should interpret search engine results ???
    6·1 answer
  • How many parameters can we use in each function?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!