1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LiRa [457]
3 years ago
13

What is the purpose of the .NET Framework Class Library? a. it provides pre-written code that can be used by .NET applications b

. it manages the execution of .NET applications c. it specifies the format of compiled .NET applications d. it specifies the data types that can be used by .NET applications
Computers and Technology
1 answer:
Burka [1]3 years ago
8 0

Answer:

d. it specifies the data types that can be used by .NET applications.

Explanation:

The .NET Framework Class Library (FCL) makes the system functionality of the .NET Framework available because it contains interfaces, data types, various classes and so on.

It is also important to note that the FCL is integrated to the CLR or Common Language Runtime of .NET Framework which is responsible for code execution.

The Framework Class Library or FCL can be categorized broadly into three:

1.  Frameworks

2. Utility features in .NET, and

3. Wrappers around the Operating System (OS) functionality.

1. Frameworks: The FCL contains many frameworks aimed at the development of some applications. For instance, WPF or Windows Presentation Foundation is used to carry out a number of functions but majorly to render user interfaces.

2. Utility features in .NET: This contains a number of classes for use in the .NET framework, examples of these classes include: dictionary, queue, stack, list and so on. Additionally, it contains classes for different manipulations, for example, for handling regular expressions the Regex class is available for use.

3. Wrappers around the Operating System (OS) functionality: Contained in the Framework Class Library are wrappers that are present at the root functionality of the Windows OS. For instance, classes to handle I/O, network features, file system as so on.

You might be interested in
1.The character escape sequence to force the cursor to go to the next line is________: 2. The character escape sequence to force
Luda [366]

Answer:

Hi there Kaylee! The answers to the blanks are as follow:

1.The character escape sequence to force the cursor to go to the next line is \n

2. The character escape sequence to force the cursor to advance forward to the next tab setting is \t  

3.The character escape sequence to represent a single quote \'

4.The character escape sequence to represent a double quote is \"

5.The character escape sequence to represent a backslash is \\

Explanation:

Character escape sequences are used for processing of special characters that may otherwise be used in a context where those characters are reserved as keywords or carry other symbolic reference. If these are not escaped, the output will not be correct.  

6 0
3 years ago
¿Cuánta energía consumirá una lavadora de 1200W de potencia, si se deja conectada durante 20 horas? ¿Cuánto deberemos pagar si e
9966 [12]

Answer:

The amount to be paid is €2.88 for the amount of power consumed

Explanation:

The first thing to do here is to convert the power consumption to kilo-watt

1 kilowatt = 1000 watt

x kilowatt = 1200 watt

x = 1200/1000 = 1.2 KW

we now convert this to kilowatt hour by multiplying the number of hours by the number of kilowatt.

That would be 20 * 1.2 = 24 KWh

Now, the charge is 0.12€/kWh

for 24 kWh, we have 24 * 0.12 = €2.88

6 0
3 years ago
Id is 960 1788 6557 <br><br> pass is nick2020 <br><br> anybody can join
EleoNora [17]

Answer:

what is this a zoom a kahoot or what

3 0
3 years ago
You are working with a worksheet on which cell B3 is selected. You hold down the Ctrl key and the Shift key and click cell B6. W
Keith_Richards [23]

Answer:

"B3 and B6 will selected"

Explanation:

  • If the worksheet is opened by the user and he is in the cell B3, then the B3 and B6 are selected, If the user clicks the B6 after pressing the ctrl and the shift key.
  • The shift and ctrl are used to select any two cells in the MS-Excel worksheet.
  • The above question asked about which cell is selected when the user in on cell B3 and press the B6 while holding the ctrl and shift key. So the answer is "B3 and B6".
8 0
3 years ago
What is not an advantage of a computer network?
Nutka1998 [239]

Answer:

C. Social Engineering

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In conclusion, social engineering being a form of cyber attack is not an advantage of a computer network.

4 0
3 years ago
Other questions:
  • The source ip address is 164.109.28.3 subnet mask of 255.255.128.0 network address is
    7·1 answer
  • How do computers use input and output to get and give the information that they need to solve problems?
    10·1 answer
  • Study the sentence below
    13·2 answers
  • A successful web-based strategy that helps a business spread the word about its website and products is called:
    15·1 answer
  • Visme,PowerPoint, keynote and prezi are what kind of software
    15·1 answer
  • When a module is processed:
    6·1 answer
  • Match each item with a statement below. - Uses two keys: one to encrypt data and one to decrypt data - Encryption algorithm used
    9·1 answer
  • What are the differences between switches and routers? cse question
    8·1 answer
  • Write a function named swapFrontBack that takes as input a vector of integers. The function should swap the first element in the
    9·1 answer
  • Verizon's implementation of a web-based digital dashboard to provide managers with real-time information such as customer compla
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!