1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Archy [21]
3 years ago
5

Object Oriented Programming (OOP) allows us to handle complex code in an organized structure and break down the problem by model

ling it in a way that relates to our everyday life. With fast advancement in technology and ever decreasing product cycles, many developers are starting to believe that OOP is not currently being implemented as it was intended to be implemented. They believe that OOP is unnecessarily complicating the problem solving so, OOP should be phased out as the absence of structure is better (in many cases) than having bad structure.
Analyze the above statement very carefully and answer the following:

• Do you believe that OOP should be phased out and we should start working on some alternative(s)? Provide your answer with Yes or No.

• Give your opinion with two solid reasons to support your answer.

Answer just 4 to 5 lines
Computers and Technology
1 answer:
borishaifa [10]3 years ago
8 0
<h2>No I don't believe that OOP should be phased out.</h2>

Explanation:

Reason:

  • OOPS make things simple
  • It promotes inheritance to avoid repetition, abstraction and encapsulation of keeping data secured and wonderful concept of object.
  • OOP is kept as the base for many of the Application development software like Dot Net, Java, etc.
  • The world is running around by objects and and OOP concept is the best possible method to handle those.
  • OOP is an time-tested method and it should not be phased out.
You might be interested in
Please submit the following assignment prior to Sunday at 11:59 pm. Eastern time: 1. Using a Microsoft Word document, please dis
GenaCL600 [577]

Answer:

Answer explained

Explanation:

United States of America versus Ross Ulbrecht :-

The Fourth Amendment guards against unreasonable searches and seizures by requiring (with limited exceptions) that government agents first obtain a warrant before they go snooping around or confiscating someone’s property. But what exactly does this mean in the modern world of smart phones, wi-fi, and extended Socratic dialogues with Siri? If the New York-based U.S. Court of Appeals for the Second Circuit is to be believed, it means that the government can monitor and collect your internet traffic if this information is merely “likely” to be “relevant” to an ongoing criminal investigation.

That is exactly what happened to Ross Ulbricht, the creator of a website known as “Silk Road,” which enabled users to anonymously buy and sell goods and services. In the course of an investigation into illegal activities associated with the website, the government obtained five “pen/trap” orders authorizing law enforcement to collect IP (internet protocol) addresses for any internet traffic going to or from Ulbricht’s wireless router and other electronic devices. These orders were obtained in lieu of a warrant under a statutory “relevance” standard that falls well short of the Fourth Amendment’s requirement for probable cause.

How could this standard possibly not be constitutionally insufficient? The Second Circuit relied on the “third party doctrine,” ruling that there was no Fourth Amendment issue because users voluntarily conveyed their information to ISPs (internet service providers) and third-party servers, and thus assumed the risk that it would later be turned over without their permission or knowledge. This doctrine, which was developed in the days of pay phones and file cabinets, cannot be fairly extended to online activity given that internet access is—for all intents and purposes—a necessity of modern life for any functioning member of society. Recognizing this simple fact undermines any claim that users have somehow assumed the risk of disclosure to the government, which would have assumed that these users had any real choice in the matter to begin with.

The court also reasoned that because pen/trap devices only reveal IP addresses associated with the user’s online browsing, the collected information doesn’t count as “content” worthy of protection—despite the direct correlation between individual IP addresses and websites, along with the ample information that can be gleaned from knowledge of an individual’s browsing history. The court seemed to conclude that there was no content revealed because an IP address only uncovers the website visited rather than any individual webpage within that site. This superficial approach utterly ignores digital reality.

Finally, the court failed to recognize that the statute authorizing pen/trap data seizure imposes virtually no limits on government attorneys’ discretion. These orders are exceedingly broad in scope and available to nearly any government agency conducting a criminal investigation. Worse still, the court’s role in approving the orders is merely ministerial, with the statute mandating that “the court shall enter an ex parte order authorizing the installation” of these devices.

Because the Second Circuit has stretched both the third-party doctrine and the content/non-content distinction far beyond their logical limitations, Cato—along with the Reason Foundation, Competitive Enterprise Institute, and R Street Institute—has filed an amicus brief asking the Supreme Court to take this case and firmly establish that the internet doesn’t constitute some sort of Constitution-free zone.

5 0
3 years ago
Which command must you use at the command prompt to determine the names of the network interfaces (including the isatap interfac
spayn [35]

ipconfig /all is operate at the command prompt to specify the names of the network interfaces (including the isatap interfaces) on a windows 7 computer.

<h3>What is Network interfaces?</h3>

A network interface exists the network-specific software that communicates with the network-specific device driver and the IP layer to furnish the IP layer with a consistent interface to all network adapters that might be present. The network interface may direct to Network interface controller, a computer hardware element that connects a computer to a computer network Network interface device, a device that functions as the demarcation.

config exists a console application program of some computer operating systems that shows all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol and Domain Name System settings.

Hence, ipconfig /all is operate at the command prompt to specify the names of the network interfaces (including the isatap interfaces) on a windows 7 computer.

To learn more about Network interfaces refer to:

brainly.com/question/20689912

#SPJ4

3 0
2 years ago
Several years ago, Jaime began to operate a small home business. He was very excited by the new features of Windows 95. These ne
Dmitriy789 [7]

1. A complete operating system rather than a graphical user interface running on top of MS-DOS.

After boot up, the system completely run without MS-DOS environment.

2. Improved windows control and appearance of windows

Windows 95 has a new system control that located on the upper left corner of each window as an icon. In the upper right of each window, it has a new designed system box. Usually, it displays "Minimize", "Maximize/Restore" and new added "Close" buttons.

3. New introduced Desktop

Not only to store minimized icons, Windows desktop in Windows 95 can store files, shortcuts and system icons such as "My Computer" and "Recycle Bin".

4. Right button menu

Right click an object in system usually can bring a pop-up menu with some items like "edit", "copy", "paste", "properties" and "help".

5. New help system

The help window can resize and jump to anywhere in the screen. It splits to two areas in which left side is the index or keyword window and the right side is the content window.

6. Task bar and start menu

Similar to the concept of reserved area in Windows 1.x, Windows 95 began to have a task bar to store the links that can active or inactive an running program and display some system information in the tray area. A start menu was include in the task bar can let user access the shortcuts to all programs in a tree structure menu system.

7. Build-in network support with dial-up for different protocols

The build-in dial-up with support of TCP/IP protocol made user easier to access Internet. In OSR2 version of Windows 95, Microsoft began to integrate Microsoft Internet Explorer in Windows 95.

8. Folder view of all kinds of files and resources

In Windows 95, files, drives, shortcuts and network resources can all be displayed in a folder view in the new Windows Explorer which replaced Program Manager in pervious version of Windows.

9. Support of 32 bit application, pre-emptive multitasking and thread

These functions made Windows 95 to have the ability to run more complex tasks and programs.

3 0
3 years ago
Question 4 A data analyst wants to include a line of code directly in their .rmd file in order to explain their process more cle
hichkok12 [17]

A line of code that can be inserted directly into a .rmd file is called an inline code.

R Markdown (.rmd file) is a file format that is typically used for making dynamic documents by using R Studio and R programming language. Also, R Markdown files can be used in the following ways:

  • To save, organize, and document an executable code.
  • To create a record of any cleaning process.
  • To generate reports containing an executable code for stakeholders.

In R Studio, an inline code is a line of code that can be inserted directly into a R Markdown (.rmd file), in order to explain a process more clearly.

Read more on R Markdown here: brainly.com/question/25558534

8 0
3 years ago
SHA-1 gives 160-bit secure hash. Let's assume that a successful brute force attack is possible by trying 2^(160/3) combinations.
pochemuha

Answer:

C) double SHA-1 is stronger because it requires about 2^(160/3) X 2^(160/3) maximum combinations because for each broken first stage, there are 2^(160/3) brute force attempts may be needed.

Explanation:

Double SHA will require about 2^(160/3) X 2^(160/3). for each statage we need to check the 2^(160/3) combinations means it will take lot of time.

4 0
3 years ago
Other questions:
  • What's the first step in being a wise consumer of media?
    10·2 answers
  • An iterative algorithm uses a loop to solve the problem, while a recursive algorithm uses a method that calls itself. (true, fal
    7·1 answer
  • The functions of forums
    15·1 answer
  • write a program that first asks the user to enter three real numbers using GUI input. Print the sum if all three numbers are pos
    7·1 answer
  • Agile methods comprise of 45 subprocesses which are organized into eight process groups.
    10·1 answer
  • Can someone help me with these questions it's for drivers ed
    10·1 answer
  • Which formatting option(s) can be set for Conditional Formatting rules?
    8·2 answers
  • Which career qualification is unique to the Energy Transmission career pathway and not to the Energy Distribution pathway? color
    10·2 answers
  • Which is the first computer brought in nepal for the census of 2028 B.S​
    6·1 answer
  • Convert Octal 623, to Decimal number ​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!