1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ra1l [238]
4 years ago
13

Which of the following is NOT an advantage to using inheritance?

Computers and Technology
1 answer:
IrinaK [193]4 years ago
6 0

Answer:

D)One big superclass can be used instead of many little classes.

Explanation:

Inheritance could be described as getting new class on another existing class with almost same execution,

inheritance allows codes to be re-used. It should be noted that inheritance bring about the code sharing among class.

The advantages of using inheritance includes but not limited to

✓ Code that is shared between classes needs to be written only once.

✓Similar classes can be made to behave consistently.

✓ Enhancements to a base class will automatically be applied to derived classes.

You might be interested in
Why must programs written in a high-level language be translated into machine language?
eimsori [14]
The only thing that a computer actually understands is machine language. English-like constructs are gibberish to a computer, so they need to be translated by a compiler to machine language to run natively.
4 0
3 years ago
While inserting images, the Picture command is usually used to insert photos from a digital camera, and the Clip Art command is
Alik [6]
To insert pics or gifs or audio from the pc stored on default
8 0
3 years ago
Read 2 more answers
Explain why you will do these prarticular things when driving
VashaNatasha [74]
What things?????? Are u talking about
4 0
3 years ago
What are the five steps of ethical hacking?
Paraphin [41]

Answer

Explanation:

Hacking is simply gaining access into a computer through weaknesses that were found in the network system.

We have mainly 5 stages In ethical hacking which although must not be followed sequentially but could produce greater results if it was followed.

These stages includes

1. Reconnaissance

2. Scanning

3. Gaining access

4. Maintaining access

5. Covering tracks.

8 0
4 years ago
Can someone urgently help me with my java code? Ive been working on it for hours and its not working.
Paha777 [63]

Answer:

nm hn hhjjnjjnj j

Explanation:

kjnjnjn jnjubhvcfv

3 0
3 years ago
Other questions:
  • Are MP3 files are quick to transfer.
    11·1 answer
  • Windows on the desktop are just one of many objects used in a graphical user interface (GUI)-- buttons, drop-down list boxes, po
    7·1 answer
  • you'll be organizing the various databases in your organization, and have recommended hiring a/an?A. internet specialist B. comp
    6·2 answers
  • WHAT is the USE OF RIBBON TAB​
    10·1 answer
  • All of the following are strategies to help you prepare for standardized test except <br>​
    5·1 answer
  • Someone pleaseee answer my last question i just posted ;-;
    6·2 answers
  • Managers can use __ software to discuss financial performance with the help of slides and charts
    11·1 answer
  • I need help solving this problem on Picoctf. The question is What happens if you have a small exponent? There is a twist though,
    7·1 answer
  • Here is what my rob-lox user USED to look like, btw what is better, Samsung or apple?
    13·2 answers
  • Create a list of 5 potential jobs that students of computer science can obtain.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!