1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVETLANKA909090 [29]
3 years ago
11

Instance variables are declared private to prevent direct modification. Access to the variables is instead provided through meth

ods. This practice is known as..
a. dereferencing
b. convention
c. encapsulation
d. instantiation

please help and thank you so much
EDIT: The answer is c.
Computers and Technology
1 answer:
yuradex [85]3 years ago
7 0
<span>Instance variables are declared private to prevent direct modification. Access to the variables is instead provided through methods. This practice is known as.. 
</span><span>c. encapsulation.  It </span><span>is a mechanism of bundling the data (variables) and code acting on the data (methods) together as one.</span>
You might be interested in
Which devices are managed through device management?
mr_godi [17]
Android<span>, </span>iOS<span>, Windows and </span>Blackberry<span> devices.</span>
3 0
3 years ago
Developed by Frank Vahid. Write a program using integers usernum and x as input, and output usernum divided by x four times. For
OleMash [197]

Answer:

Explanation:

Let's do this in Python. We will loop through 4 times, each of the loop would compute the dividend, store it as string in a result variable and finally print the result on the same line:

def divide_4_times(user_num, x):

    result = ''

    for i in range(4):

         user_num /= x

         result += (' ' + str(user_num))

   print(result)

7 0
3 years ago
And, Or, Not are examples of:
yanalaym [24]
Boolean operators it is
all the best
5 0
3 years ago
What is RAM and ROM​
Aleonysh [2.5K]

Answer:

Read-only memory, or ROM, is a form of data storage in computers and other electronic devices that can not be easily altered or reprogrammed. RAM is referred to as volatile memory and is lost when the power is turned off whereas ROM in non-volatile and the contents are retained even after the power is switched off.

8 0
3 years ago
Read 2 more answers
If an attacker purchases and uses a URL that is similar in spelling and looks like a well-known website in order for the attacke
Mice21 [21]

Answer:

URL hijacking

Explanation:

Based on the information provided within the question it can be said that in this scenario they seem to be using an attack known as URL hijacking. This attack, also known as "typosquatting", is when someone takes advantage of individual's typos when searching for popular sites, in order to get them to go to their site which generates them money the more traffic they get.

5 0
3 years ago
Other questions:
  • Design and implement a class dayType that implements the day of the week in a program. The class dayType should store the day, s
    11·1 answer
  • What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
    12·1 answer
  • What's a good app that solves trigonometry problems?
    8·1 answer
  • Plz help!!!!!!!!!!!!!!!!111
    13·1 answer
  • Which of the following would an NSA professional most likely need?
    5·2 answers
  • Match letters from column B to Column A by looking at the picture above.
    11·1 answer
  • When you are fit, you can exercise and do physical work without getting too tired. A. True B. False\
    13·2 answers
  • The lower an applicant's credit score, the lower the risk to the lender.
    10·1 answer
  • King(a. has eaten b.ate c.had eaten) when Airah called​
    8·1 answer
  • Passing an argument by ___ means that only a copy of the arguments value is passed into the parameter variable and not the addrt
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!