1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Digiron [165]
3 years ago
6

You are c# developer who is developing a windows application. you need to provide derived classes the ability to share common fu

nctionality with base classes but still define their own unique behavior. which object-oriented programming concept should you use to accomplish this functionality?
Computers and Technology
1 answer:
ludmilkaskok [199]3 years ago
4 0
Polymorphism; the concept of one definition, but multiple implementations.
In C#, this is done using the 'abstract' and 'override' keywords.
Example:

abstract class Shape {
    public abstract double area();
}

class Square : Shape {
    private double size;

    public Square(double size = 0) {
        this.size = size;
    }

    public override double area() {
        return size * size;
    }
}
You might be interested in
What is the easiest way to be sure you have selected all of the content related to a specific tag?
pychu [463]
Add a <div> around it.
example:
<div id = "content">
<p> content</p>
</div>
4 0
3 years ago
What does N represent when analyzing algorithms?
Mademuasel [1]

Answer: "N" is considered as the size of the input that is being given in the algorithm.

Explanation: During a problem solving process , a algorithm is used to analyze the problem . Many function and  steps are to be taken care of while analyzing algorithm. Among analyzing step, input is also given which is usually zero more than that . An input has a certain size which is given by the initial "N".  The input size defines the length of the string for the input.

4 0
3 years ago
According to the Center for 21st Century Skills, critical thinking ability includes all of the following skills, EXCEPT ______.
Readme [11.4K]

Answer:

communicate clearly

Explanation:

4 0
3 years ago
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
Select the correct answer. Which engineering professional communicates potential flaws in product design? A. maintenance enginee
elena55 [62]

the correct answer is the letter C. plz mark me the brainliest!!1

6 0
3 years ago
Other questions:
  • Which of the following best describes a toolbar?
    9·1 answer
  • The gaining of unauthorized access to data in a<br> system or computer:
    11·1 answer
  • Explain the difference between general-purpose and specialized applications. Also discuss the common features of application pro
    11·1 answer
  • Write a complete Java program called Stewie2 that prints the following output. Use at least one static method besides main. ////
    9·2 answers
  • Why are computers useful for modeling situations?
    13·2 answers
  • 9. Select the correct answer.
    6·1 answer
  • If you forget your privacy password what will you do if the ask this question what is the name of one of your teacher?​
    12·1 answer
  • What is the purpose of file extensions? A. They execute the mail merge function, B. They tell the operating system what kind of
    15·2 answers
  • A large number of consecutive IP addresses are available starting at 198.16.0.0. Suppose that four organizations, Able, Baker, C
    11·1 answer
  • Which of the following is true?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!