1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LiRa [457]
4 years ago
6

Which following is one of the basic characters of object-oriented systems : Select one: a. process b. data c. module d. inherita

nce e. garbage collection
Computers and Technology
1 answer:
Leviafan [203]4 years ago
7 0
The answer is D.

Inheritance means that a child class (subclass) can inherit functionality from a parent class (superclass). For example, a class called Person could have 2 subclasses called Student and Teacher. While Student and Teacher have attributes and methods that differ, they also have some that overlap. By passing these overlapping functionalities down from the Person class, we are making the code more reusable. This eliminates the need to write duplicate code and makes the code more readable.

You might be interested in
Nancy would like to configure an automatic response for all emails received while she is out of the office tomorrow, during busi
Stella [2.4K]

she can appoints someone she trust to act on her behalf

4 0
3 years ago
Read 2 more answers
Your phone's battery dies -- no Internet for you! When you get home hours later, you plug in the charger and turn your phone bac
shutvik [7]
IP address i believe, not 100% positive
4 0
3 years ago
DES: Group of answer choices A) is a commonly used symmetric encryption B) algorithm that was developed in the mid-C) 1970s was
OLEGan [10]

DES is a commonly used symmetric encryption

A) is a commonly used symmetric encryption

<u>Explanation:</u>

DES stands for Data Encryption Standard. It is a symmetric key algorithm and is used for encrypting electronic data. It was developed in 1975. DES is one of the oldest encryption standards to be used in the industry.

The algorithm takes 16 rounds of permutations in order to encrypt data. But now, with the advent of technology, as new algorithms have been designed and put in use, DES is less preferable.

In the process of key generation, some keys generated sometimes turn out to be weak and hence are prone to attacks. If not for the weak keys generation, DES works perfectly fine and is an effective algorithm to encrypt data.

6 0
3 years ago
A computer has a memory ________, rather than just a single memory component. The lowest level is some form of ________ storage
oksian1 [2.3K]

Answer:

A computer has a memory hierarchy, rather than just a single memory component. The lowest level is some form of secondary storage such as a magnetic disk. The next level is the main memory where a subset of the data from the hard disk is stored temporarily. The cache memory is the next level and uses SRAM to store frequently used data. Finally, the register store variables and temporary results for the current CPU computations.

6 0
3 years ago
What are the four different orchestral instrument families?
natka813 [3]

Answer:

Gutair

Violen

cello

Double Brass

Harp

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • A private local network, accessible only to an organization's staff, is known as an:
    12·2 answers
  • Which is faster, a hi-speed usb port or a superspeed usb port?
    15·2 answers
  • Powerpoint assumes that the first slide in a new presentation is the
    10·1 answer
  • How do you convert a decimal to binary?
    9·2 answers
  • What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and
    8·1 answer
  • Discuss a situation in which you might want to use a floating-point number with a fractional part for a loop control variable. W
    5·1 answer
  • Find the reciprocal of 7/2 × 3/5<br>​
    6·1 answer
  • Whats a field in databases?
    5·1 answer
  • This isn't really a question ,but a random fact about Fnaf William Aton
    7·2 answers
  • Who is the father of computer?​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!