1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vladimir2022 [97]
4 years ago
14

Java uses ____ to implement method lookup.A) a jump tableB) an inheritance treeC) restricted accessD) polymorphism

Computers and Technology
1 answer:
sashaice [31]4 years ago
7 0

Answer:

D) polymorphism

You might be interested in
Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this
ra1l [238]

Answer:

Phishing

Explanation:

Phishing is one of the most common social engineering attacks in which the attacker disguises to be a trustworthy personnel in order to lure the victim or target into disclosing sensitive information such as passwords, credit card details and so on.

Phishing could be carried out via emails, telephones, or even text messages.

In this case, the attacker pretends to be an IT tech in order to get your computer configuration details which he can then use to carry out some other fraudulent acts.

Another example is in the case of someone receiving an email from their bank requesting that they need to update their records and need the person's password or credit card PIN.

8 0
4 years ago
What is the maximum number of guesses it will take to find a number <br> between 1 and 64?
ryzh [129]

Answer:

10?

Explanation:

3 0
2 years ago
Python - Please help!
Margaret [11]

Answer:

i= 1

for i in range(1,n):

     if i * i < n:

           print(2* i + 1)

     i += 1

else:

     print('Hakuna Matata')

Explanation:

First, there's a need to rewrite the code segment in your question (because of indentation)

<em>i= 1</em>

<em>while i*i < n:</em>

<em>      print(2* i + 1)</em>

<em>      i += 1</em>

<em>else:</em>

<em>      print('Hakuna Matata')</em>

<em />

The explanation of the equivalent of the above while loop is as follows

This line initializes i to 1

i= 1

This line iterates from 1 to n-1

for i in range(1,n):

This line checks if i * i is less than n

     if i * i < n:

The following line is executed if the above condition is satisfied; otherwise, nothing is done

           print(2* i + 1)

The value of i is incremented by 1 using this line

     i += 1

The following is executed at the end of the iteration

else:

     print('Hakuna Matata')

<em>Note: Assume any value of n, both programs display the same output</em>

6 0
3 years ago
What is the largest numeric value that could be represented with three bytes if each digit were encoded using one ASCII pattern
Feliz [49]

The largest numeric value that can be represented in 3 bytes is 224

Explanation:

  • commonly, to represent a 999 number, 10 bits are used.
  • But with 3 bytes, it can save or store integer with the range from 0 to 224-1 in the 24 bits. (3 * 8 bits =24 bits).
  • Then the binary notation is used for encoded numeric data in order to store in the computer storage device.
5 0
3 years ago
Columns are identified by numbers (1,2,3,4,5....) and Rows are identified by letters (A,B,C,D,E.....) True False
igomit [66]
The answer would be true. Hope this helps you
8 0
3 years ago
Other questions:
  • What are the links between the operating systems, the software, and hardware components in the network, firewall, and IDS that m
    7·1 answer
  • William wants to create a document using a DTP. What time-saving techniques can he use?
    9·1 answer
  • Can you give me a long list of kid's cartoons
    8·2 answers
  • ANSWER THESE RIDDLES FOR BRAINLIEST ANSWER!!!!
    11·2 answers
  • Which organization has published more than 300 web standards
    7·1 answer
  • The _____ element of the wsdl describes the data being exchanged between the web service providers and the consumers, including
    12·1 answer
  • . Why did the designers of the Synchronous Digital Hierarchy choose unusual values for data rates instead of the exact powers of
    11·1 answer
  • Last one, this is fashion marketing and I need to know the answer to get the 80%
    6·1 answer
  • 4. Cash inflows from investing activities normally arise from all of the following EXCEPT
    14·1 answer
  • Write a pseudocode to read 10 integer numbers and find the largest number, you need to use loop in your answer.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!