1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ikadub [295]
4 years ago
10

How does a layered pattern make use of abstraction and encapsulation?

Computers and Technology
1 answer:
maxonik [38]4 years ago
7 0

Answer and Explanation:

The ways in which a layered pattern make use of encapsulation and abstraction are as follows:

  • This framework lays its focus mainly on the bundling of related functionalities inside an application into different layer that are vertically stacked over one another.
  • Functionality in between each layer is related by common function or role.
  • Communication in between the layers is clear and exact and is coupled loosely.
  • Providing a layered structure to the application indirectly supports its maintainability and flexibility.

Encapsulation:

Since, features like data type, properties, methods or implementation while designing are not exposed at the boundary of the layer thus No assumptions are required for these features.

Abstraction:

The layered framework abstracts the entire system's view and provides adequate details for better understanding of the roles of each layer individually and the relation that exist between these layers.

You might be interested in
When setting quotas for disk space, what are the two tools for enabling and configuring quotas? and which of the two are the mor
lora16 [44]
NTFS quotas
File server resource manager.

A system admin has rights to set NTFS quotas if he or she is concerned with some users monopolizing a small amount of disk space. Activating NTFS quotas helps set a storage limit for users using a particular volume. Out of the two, file server resource manager is the most effective and flexible. It is best recommended to use file server resource manager if you need quotas. It comes with file-type filtering and includes folder-level quotas.
8 0
3 years ago
Am nevoie de un referat pe tema ,,Asezarea in Pagina '' la informatica
In-s [12.5K]

Answer:

Explanation:

Microsoft Word este un procesor de text modern,Microsoft Excel,

Microsoft PowerPoint si Microsoft Access.

Programul va poate ajuta sa realizati documente,

5 0
3 years ago
When broadcasting live on social, keep in mind that the best broadcasts are ones that feel like a conversation between brand and
tiny-mole [99]

Answer:

Is longer and repeats key points.

Explanation:

When you start a live broadcast, viewers are received every second, and those who join the broadcast long after it starts may have no idea what you're talking about if you don't repeat the key points every so often.

The duration of the broadcast is also important, the longer it lasts, the more likely it is to receive more viewers and you can include more content to keep them entertained.

8 0
4 years ago
The ability for a protocol or program to determine that something went wrong is known as_________.
777dan777 [17]

Answer:

The correct answer to the following question will be Error-detection.

Explanation:

Error-detection: The detection of errors caused during the transmission from the transmitter to the receiver by damage and other noises, known as Error-detection. This error-detection has the ability to resolute if something went wrong and if any error occurs in the program.

There are mainly three types of error-detection, these types can be followed:

  • Automatic Repeat Request (ARQ)
  • Forward Error Correction
  • Hybrid Schemes

There are two methods for error-detection, such as:

  • Single parity check
  • Two-dimensional parity check

4 0
3 years ago
Which part of a computer s ip address configuration indicates the portion of the address that specifies the network address?
vivado [14]
The NETWORK mask is and'ed with the IP address to get the network number.

Example:

192.168.1.1 & 255.255.255.0 = 192.168.1.0/24

It's worth the effort to do this in binary, it makes much more sense.
4 0
3 years ago
Other questions:
  • Jim has entered the age of each of his classmates in cells A1 through A65 of a spreadsheet. Which function should Jim use to fin
    11·2 answers
  • Plese give three examples of specilized servers.
    13·2 answers
  • Which type of computer network ensures high quality​
    9·1 answer
  • The functions of forums
    15·1 answer
  • when you assign a(n) ___ to a field, Access will display the value you assign, rather than the field name, in datasheets and in
    15·1 answer
  • What permission do users have by default regarding printer access and the ability to manage documents?
    14·1 answer
  • In this lab, your task is to complete the following: Enable all of the necessary ports on each networking device that will allow
    9·1 answer
  • The four smallest numbers (40 points) Write an ANNA assembly program (smallest_four.ac) that finds the four smallest numbers ent
    11·1 answer
  • Uploading Your Work
    14·1 answer
  • Why do you need to learn about engineering and technology.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!