1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hodyreva [135]
3 years ago
7

The UML models operations by listing the operation name preceded by an access modifier. A(n) ________ indicates a public operati

on in the UML. - + p *
Computers and Technology
2 answers:
Nastasia [14]3 years ago
5 0

Answer / Explanation

The question seem not to be complete. It can be found in search engines.

Kindly find the complete question below.

Question

The UML models operations by listing the operation name followed by a set of ____. A plus sign (+) in front of the operation name indicates that the operation is a public one in the UML (i.e., a public method in Java).

Answer:

To properly answer this question, let us first define what a UML is:

UML can be defined as or is simply refereed to as Unified Modelling Language. It is considered as the standard for modeling language that enables designers and developers to specify, visualize, construct and document object or programs made by them in the areas of software systems, Thus, UML makes this objects developed by computer gurus secure and robust in execution.

If we now go back to the question asked while referencing the explanation given of what a UML is, the answer to the question is

parentheses.

However, if the original question being asked is valid, the answer to it would be : sign (+) in front of the operation name

Nataly [62]3 years ago
3 0

Answer:

parentheses

Explanation:

The Unified Modeling Language (UML) is a kind of fixed structure that explains the structure of a system by showing the system's classes, interface, attributes, data types, operations and the relationships among objects. UML models operates by listing the operation name preceded by an access modifier, A Parenthesis indicates a public operation.

You might be interested in
As a bank employee, you often work from home and remotely access a file server on the bank’s network to correct errors in financ
strojnjashka [21]

Answer:

TACACS+

Explanation:

Terminal Access Controller Access-Control System Plus (TACACS+) is a protocol that provides detailed accounting information and flexible administrative control over the authentication, authorization, and accounting process.

3 0
3 years ago
TRUE OR FALSE: Individuals involved in surveillance prior to a terrorist attack are always well-trained and equipped.
eduard
I would say false for sure
5 0
3 years ago
In 3-5 sentences, describe how you would insert a graph in your word-processing document.
Allisa [31]

Answer:

Click the “Insert” tab, then click the “Chart” button on the Illustrations section to open the “Insert Chart” pop-up window.

Select the type of graph to add to the document, such as a pie chart or bar graph. ...

Click “OK” and Word adds a chart with generic data points to the document.

Explanation:

3 0
3 years ago
In creating a professional action plan it's important to
blagie [28]
Whenever creating a professional action plan, it might be easier to do an "if...then..." plan, or just a daily plan, like this:

Monday:
Kitchen:
 Do dishes
 Sweep floor
 Wipe counters

Bedroom:
 do laundry etc,
5 0
3 years ago
A) What is the maximum value that can be represented as an unsigned n-bit binary integer?
My name is Ann [436]

Answer:

The maximum value that are represented as unsigned n -bit binary integer is 2^n-1. The unsigned binary integer refers to the fixed point of the system that does not contain any fractional digits.

The unsigned binary integer contain module system with the power 2. The number of student table in the class is the best example of the unsigned integer. The numbers can be represented by using the binary notation and bits in the computer system.

5 0
3 years ago
Other questions:
  • Tomi is testing all of the links on her web page by clicking on each one in a browser. What type of testing is this considered?
    6·2 answers
  • Given positive integer numInsects, write a while loop that prints that number doubled without reaching 100. Follow each number w
    8·1 answer
  • "The pkill command terminates _________."
    14·1 answer
  • To write on a cd-rw disc, users must have cd-rw software and a cd-rw ____.
    5·1 answer
  • . What is automated testing?
    10·1 answer
  • Audio editing software contains several codecs that allow you to
    15·1 answer
  • which one of the following word process feature saves you the most time when you keying in a document
    9·1 answer
  • Another name for divergent boundaries that occur under the ocean is
    6·2 answers
  • What is the difference between MySQL and MariaDB?
    9·1 answer
  • Molly claims that she doesn’t have to proofread her code for typos because the interpreter will catch her mistakes for her. Is s
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!