1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lena [83]
3 years ago
13

A class defined by a user (i.e., you, the programmer programmer) ... Group of answer choices might contain no data members -- on

ly methods. might contain no user-defined methods -- only data members. will result in compiler errors if no user-defined methods -- only data -- are in the class. will result in compiler errors if no data-- only user-defined methods -- are in the class. will always have both data members and methods.
Computers and Technology
1 answer:
Y_Kistochka [10]3 years ago
4 0

Answer:

might contain no user-defined methods -- only data attributes (members).

might contain no data attributes (members) -- only methods.

You might be interested in
Select all the items that determine your preference for a concert ticket. a) band that is playing b) date of the concert c) pric
vlada-n [284]
I believe the answer is A, B, and C
8 0
3 years ago
Henry uploaded the photos of his birthday to a cloud storage system. He feels that it’s a safe option for data storage. His frie
sattari [20]

Answer:

E. The data is not under the owner’s direct control.

Explanation:

Disadvantages of cloud storage:

  • Need for internet connection: We need to accept the fact that the internet connection, whether by broadband, 3G, 4G or 5G. Opening and retrieving data in the cloud becomes impossible without the internet.
  • Mistrust: Security breaches are very rare, especially if your content is stored on large enterprise servers that invest heavily in security.
  • Internet laws are unclear - and are different in each country: Because servers are scattered around the world, cybercrime is a doubt: in case of a leak, the hacker should be tried according to the virtual laws of the country in which is the server or country of the user who uploaded these files?
  • Price: Yes, there are free options, but companies and business owners who create and access large volumes of files may need paid plans to meet their needs.
5 0
3 years ago
The domain in an email message tells you the
Vsevolod [243]
<span>The domain in an email message tells you the location of the destination.  A domain is a part of an e-mail address after @. Let us say, [email protected], aol.com is the domain. Therefore, the answer is letter B. location of the destination, and as for the case of the given example above, aol.com is called the location of the destination.

Other examples of domain that we commonly came across with:
[email protected] gmail.com
[email protected] yahoo.com
[email protected] msn.com

</span>


6 0
3 years ago
Read 2 more answers
In disc brakes, pads are forced against the of a brake disc​
Arturiano [62]

Answer:

Explanation:

It's the surface the brake pads contact. When you step on the brakes, pressurized brake fluid pushes against the pistons inside the caliper, forcing the brake pads against the rotor. As the brake pads press against both sides of the disc, the friction stops the wheel's rotation.

6 0
2 years ago
The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system.
navik [9.2K]

Answer:

False

Explanation:

The Security Development Life Cycle (SDLC), is a software development which involves traditional approach towards its design such as, waterfall model, Agile, etc.

It can either be referred to as a generic secure development life cycle or a specific one, such as the Microsoft SDL or the Cisco SDL.

Its phases includes,

A1 - Security Assessment

A2 - Architecture

A3 - Design and Development 1

A4 - Design and Development 2

A5 - Ship

PRSA - Post Release

Each phase talks about how a secured software is developed.

The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system. This statement is false because by definition and attributes Security Development Life Cycle is a traditional approach towards software development and not a general method.

6 0
2 years ago
Other questions:
  • Are we too dependent on technology if yes then can you please explain?
    12·2 answers
  • "Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the sequen
    12·1 answer
  • I have a problem with importing excel file into Access. I have some table in Excel and I want to import it into Access. When I d
    6·2 answers
  • What is my credit card billing zip code??
    15·1 answer
  • Which of the following would be an example of a loss of record integrity in a
    12·1 answer
  • MICR is an input or output devices
    5·1 answer
  • The intellectual property right that gives a creator control of his or her written work is known as what?
    9·1 answer
  • There are some processes that need to be executed. Amount of a load that process causes on a server that runs it, is being repre
    7·1 answer
  • Which operating system user interface does not reside on the computer but rather in the cloud on a web server?
    5·1 answer
  • How is technology moving the business world forward?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!