1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cloud [144]
3 years ago
11

"abstraction" is often used to focus on a general case and ignore a specific instance of a problem. Given this meaning of the wo

rd, how do you apply this in programming
Computers and Technology
1 answer:
prisoha [69]3 years ago
3 0

Answer:

Abstraction is the process of removing or taking away certain characteristics to reduce or hide several very important characteristics.

In OOP (Object Oriented Programming), to increase efficiency and reduce complexity, a programmer hides certain vital data about an object. This is abstraction in programming.

For further clarification, a programmer ensures that the name given to an entity makes sense and most importantly, that it carries relevant aspects, and non essential parts are not included.

You might be interested in
How did the use of ARPANET change computing?
Paladinen [302]

Answer:

Explanation:

PLEASE MARK BRAINLIESTPLEASE MARK BRAINLIEST

PLEASE MARK BRAINLIESTPLEASE MARK BRAINLIEST

PLEASE MARK BRAINLIESTPLEASE MARK BRAINLIEST

PLEASE MARK BRAINLIESTPLEASE MARK BRAINLIEST

PLEASE MARK BRAINLIESTPLEASE MARK BRAINLIEST

PLEASE MARK BRAINLIESTPLEASE MARK BRAINLIEST

PLEASE MARK BRAINLIESTPLEASE MARK BRAINLIEST

8 0
3 years ago
Which relation is created with the primary key associated with the relationship or associative entity, plus any non-key attribut
konstantin123 [22]

Answer:

- Transform binary or unary M:N relationship or associative entity with its own key.

Explanation:

Transform binary relation is described as the method through which a decimal can easily be converted into binary while the unary relationship is described as a relationship in which both the two participants occurs from the same entity.

In the given case, 'transform binary or unary M:N relationship' can be created using 'the primary key linked with the relationship plus any non-key aspects of the relationship and the primary keys of the related entities' as it displays the existence of a relationship between the occurrences of a similar set of the entity i.e. associative entity here.

5 0
3 years ago
Of the following which would be the best data representation for this puzzle in a puzzle class?
sladkih [1.3K]

please include the puzzle and or questions.

5 0
3 years ago
Network forensic analysis. A network forensic analyst is responsible for identifying worms, viruses, and infected nodes in the c
Phantasy [73]
<h3>What is Network forensics ?</h3>

Network forensics is the procedure of tracking packets and reading community site visitors hobby for intrusion or malware detection. It entails figuring out an issue, amassing and reading data, choosing the great troubleshooting response, and imposing it.

The probability distribution is 1.25.

Read more about the probability distribution:

brainly.com/question/24756209

#SPJ1

5 0
2 years ago
Find the volume of the rectangular prism.<br>1<br>6 cm<br>32<br>cm​
Assoli18 [71]

Answer:

192 centimeters.

Explanation:

V= length x width x height

6 0
3 years ago
Other questions:
  • Presentation software allows business professionals to _____.
    14·2 answers
  • Every node (except of the last node) in a singly linked list contains ____
    5·1 answer
  • Corey is an architect. What software does he most likely use to design houses? graphic software scheduling software CAD software
    10·2 answers
  • It is safe to stand on the top step of a ladder provided it is braced property
    10·1 answer
  • On a network, which protocol is responsible for dividing files into chunks, adding headers containing information for reassembli
    10·1 answer
  • Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin type per l
    14·1 answer
  • Random Walker Collisions In lecture, we saw how to model the behavior of a random walker on a 2D grid using a Monte Carlo simula
    8·1 answer
  • Free brainliest hehehehehehehheheh
    13·2 answers
  • What is the sequence of instructions performed to execute one program instruction
    13·1 answer
  • Which option ensures that items in a text box or table cell will be in the absolute center of that element?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!