1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VLD [36.1K]
3 years ago
9

If an app needs to perform a derived-class-specific operation on a derived class object reference by a base class variable, the

app must first cast the base class reference to a derived class reference through a technique known as ________
Computers and Technology
1 answer:
dalvyx [7]3 years ago
7 0

Answer:

Downcasting

Explanation:

Downcasting is a way of determining whether a given object is of a particular subclass type. In object-oriented programming downcasting is used to cast an object to a subtype. Even though sometimes it throws a compile-time error in Java, downcasting can be done on languages like Java, C++, C#. The opposite of downcasting is upcasting, which is simply the casting of an object to supertype or parent type.

You might be interested in
The ability of a person booking a flight on Southwest's website to reserve a car from Dollar Rent-A-Car without having to leave
katen-ka-za [31]

Answer:

Web Services

Explanation:

<em>Web Services</em>  is a technology that uses a set of protocols and protocols that serve to exchange data between applications. Different software applications developed in different programming languages, and executed on any platform, can use web services to exchange data on computer networks such as the Internet. Interoperability is achieved through the adoption of open openings.

5 0
4 years ago
John works for Internal Computer Specialists, which focuses on helping small business owners resolve MIS infrastructure issues.
natali 33 [55]

Answer:

A) Hardware

Explanation:

The hardware component of the computer refers to the physical parts of the computers that can be see and touched this contrasts the sofware component of the computer that are programs (sets of instruction). All the coponents listed in the question are physical parts of the computer and belong to the hardware component.

5 0
3 years ago
1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your
enyata [817]

Answer:

The problems or risk when using a WiFi is that, hackers often have the ability to position themselves between the user and the end point connection. and once these hackers gains access to your information and privacy, u might lose important documents or contents.

It is of utmost importance that when an end user is using a public WiFi as a WAN, he/she must ensure to browse with VPN turned on, and the sharing options turned off.

Explanation:

Solution

One of the biggest risk with public WiFi is the ability or capacity for hackers to position themselves between you (user) and the point of connection. so instead of communicating directly with the hotpot, at several times you end up sending your information to the hacker.

The hacker also have access or privileges to every information you send out such as credit card information, emails and so on. once the hacker gains access to that information, you run into trouble.

As an end user when making use of public WiFi to ensure to browse with VPN (Virtual private Network) on and turned off sharing options

4 0
3 years ago
"How has graphic design changed through time?"
noname [10]

The main purpose behind graphic designing is to communicate, The different colors, shapes and patterns used in graphics aim to deliver a meaningful message, which sometimes is hidden. Back in the time, graphic designs usually portrayed what was going on at that time, for instance wars, with larger icons and catchy slogans. Over the time, the graphic designs have evolved where psychedelic, geometrical and monochromatic designs have gained more popularity, with different typographic styles to follow. Moreover, since the world has been taken over by technology in a storm, we get to see some drastic changes in the photography styles, use of color balances with minimal designs and subtle tones.

8 0
3 years ago
For a typical program, the input is taken using _________ Command-line scanf Files All of the mentioned
vfiekz [6]

Answer:

D)All of above

Explanation:

This is the complete question

For a typical program, the input is taken using _________.

A)Files

B)Command-line

C)scanf

D)All of above

E)None of these

computer program could be regarded as a collection of instructions which can be executed using computer to carry out a specific task, and it is written by programmer ,Input in domain of computer could be explained as feeding some data into a program. This input could be in the form of a file as well as command line, with the help of programming set of built-in functions that will help in reading the given input as well as feeding it to the program base on requirement. The scanf do reads the input from the standard input stream( stdin and scans) which is been input based on provided format. It should be noted that For a typical program, the input is taken using Files, Command-line and scanf.

7 0
3 years ago
Other questions:
  • A firewall is either software or dedicated hardware that exists between the __________ being protected.
    13·1 answer
  • What are some causes of the number of bytes on the wire exceeding the number of bytes being captured?
    6·2 answers
  • The temperature of a plastic cube is monitored while the cube is pushed 8.7 m across a floor at constant speed by a horizontal f
    8·1 answer
  • Which of the following are recommended techniques for protecting computer files and data? Check all of the boxes that apply.
    15·2 answers
  • Does anyone want to play 2k21 or rocket league on xbox my username is Bud zecaog
    13·2 answers
  • Which is the best book for digital electronics?
    5·1 answer
  • Instructions:Select the correct answer.
    9·2 answers
  • In recent years, the amount of time people spend using electronic devices has sharply increased. What are the benefits and downs
    7·1 answer
  • A field is _____. a complete entry in a database one of the categories in a database a group of twenty-seven records a cell in a
    8·1 answer
  • A life insurance salesperson who takes advantage of the foot-in-the-door phenomenon would be most likely to:________
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!