1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
2 years ago
7

You give an object a more meaningful name by setting the object’s _________________ property.

Computers and Technology
1 answer:
viva [34]2 years ago
7 0

Answer:

The correct answer to this question is "Name".

Explanation:

In the programming language, the object is a part of the object-oriented programming language (oops).In all (oops) programming language we use class and object. where class is a collection of data member and member function, and object is a real-world entity. An Object is an instance of a Class. When a class is created, no memory is assigned but when we create the object of the class then memory is allocated.

In this question except option (d), all options are wrong.

You might be interested in
Star and peer-to-peer are types of
Naily [24]
Networks? i’m not sure, but i know peer-to-peer is a type of network. i’m not sure about lending though
3 0
2 years ago
Read 2 more answers
Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
frutty [35]

Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.

Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems  or   weaknesses that prevent malicious attacks.

To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer.  This was a malicious attack.

However, sometimes people can be specifically targeted to steal their data or monitor their activities.  

7 0
3 years ago
Eugene wants to indent a paragraph, but the ruler is not present. Which tabs could Eugene use in order to accomplish his goal?
Anton [14]
He could either use the tab key to indent, if you want to make the ruler visible, you can go to the view tab and click the check mark next to show ruler.
8 0
3 years ago
Read 2 more answers
What properties make it suitable to be used for musical instruments?
Stolb23 [73]
<h2>Many properties can be listed out viz. durability, quality, the sound that it produces also depends on the material that is used, etc.</h2>

Explanation:

1. If you take wood then I would say maple, rosewood, cedar, walnut can be used to make "String instruments".

Reason:

The wood that we choose should be perfect and should give long-life to use the instrument.

2. If we consider about strings, then I would suggest that the material that you choose should be "ductile and hard".

Reason:

Thin wires can be drawn.

3. In case of Brass, it should be "malleable metal", so that the outcome of the instrument will satisfy the need.

7 0
3 years ago
During spring in Colorado, ice on the mountain tops melts into water. Some of this water gets trapped in cracks in the mountain
zlopas [31]
Physical weather. It isn't changing the the chemical or biological make up.
3 0
3 years ago
Read 3 more answers
Other questions:
  • Suppose you have a certain amount of money in a savings account that earns compound monthly interest, and you want to calculate
    10·2 answers
  • Which technology enables afloat forces to communicate more securely and to operate in a more dispersed manner?
    6·1 answer
  • This measures how close a biometric reading is to a prerecorded template
    11·1 answer
  • Word can store a maximum of how many documents in its Recent Documents area? five ten fifteen twenty
    8·1 answer
  • How does recorded audio stay on an audio tape
    12·1 answer
  • Fill in the blanks : To store 3 character a computer occupies...................bytes memory space​
    8·2 answers
  • Can someone please give me Python test 3 it would help me tremendously
    5·1 answer
  • Writers in our networked world enhance their credibility by
    5·1 answer
  • ...............is a personal computer that fits on desk.​
    5·2 answers
  • An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RR
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!