1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ZanzabumX [31]
3 years ago
6

Composition means ________. a)that data fields should be declared private b)that a class extends another class c)that a variable

of supertype refers to a subtype object d)that a class contains a data field e)that references another object
Computers and Technology
1 answer:
zlopas [31]3 years ago
3 0

Answer:

The answer is "Option d".

Explanation:

In programming, Composition is a method, which is used to applying multiplicating and additive probability laws to evaluate the probabilities, It is a unique method, that uses math function, it also use to include data field, and other choices are wrong, that can be described as follows:

  • In option a, It uses an access modifier, that's why it is wrong.
  • In option b, This process is called inheritance, that's why it is wrong.
  • In option c, It uses in part of typecasting, that's why it is wrong.
  • In option e, It is incorrect because it refers to another object.

You might be interested in
Which of the following would allow for the QUICKEST restoration of a server into a warm recovery site in a case in which server
adelina 88 [10]

Answer: C. Differential backup

Explanation: There are several ways od ensuring the preservation and storage of data even cases of disaster, one of such ways is data data mirroring which allows data to be replicated or copied in real time and several backup options. In cases where there there is need to restore a server, the warm recovery site provides a data or disaster recovery option used to mitigate the effect of data loss on organization. In the absence of data mirroring, differential backup option, provides the quickest recovery option as it only requires changes in the data stored after the last full backup. These speed experieced should be expected due to the relatively low data been dealt with rather than the entire data.

5 0
3 years ago
Match each word to its correct meaning.
MrMuchimi

Answer:

1. active listening             8. an online journal

2. barrier            1. a strategy for showing other people you are interested in what they are saying and that you understand what they are saying and how they feel about it

3. blog          2. anything that interferes with a message being sent or received

4. communication    5. guidelines for courteous electronic communication

5. netiquette         7. the person who creates or composes a message and delivers it either orally or in writing

6. receiver        9.. a personal belief that one should work hard and do a good job

7. sender             3. an online database of Web pages that can be created or edited by anyone (with permission)

8. wiki            6. the person who receives a message

9. work ethic          4. an exchange of information

Explanation:

The answer is as mentioned above. And these are important words from subject Professional Communication. And like when we talk of an exchange of information, we mean communication. And similarly, other words means as being mentioned above.  

5 0
3 years ago
Environmental technology examples
meriva

Exhaust Gas Recirculation (EGR) for NOx control
<span>Positive Crankcase Ventilation (PCV) for HC emission control </span>
Evaporative Emissions Control(EVAP)
<span>Catalytic Converter for HC and NOx control</span>
6 0
3 years ago
Point out the wrong statement: SOA eliminates the use of application boundaries, the traditional methods where security is at th
love history [14]

Answer:

All the three statements given are true so the correct option is option 4 which is none of the above.

Explanation:

The options are given in a jumbled up form the options are sorted which are as follows:

  1. SOA eliminates the use of application boundaries, the traditional methods where security is at the application level aren't likely to be effective
  2. An atomic service cannot be decomposed into smaller services that provide a useful function
  3. XML security service may be found in retail application communication.
  4. None of the mentioned

SOA stands for Service Oriented Architecture. This eliminates the application boundaries so option 1 is true.

An atomic service is defined as the smallest service which cannot be divided further. So this is true as well

The XML security service is incorporated in all retail applications. so this is true as well.

So the remaining option is just None of the mentioned.

7 0
3 years ago
23. What is the value of 3 - (4 + 2 *3)/(8-2) + 7 * 2+4
Artist 52 [7]

Answer:

30 djjjjj*fjfktdyldydxpitdotdtiotdtod

8 0
3 years ago
Other questions:
  • In modern computer systems, a byte consists of
    14·1 answer
  • Stores of data that are so vast that conventional database management systems cannot handle them, and very sophisticated analysi
    9·1 answer
  • c++ You are given an array A representing heights of students. All the students are asked to stand in rows. The students arrive
    5·1 answer
  • True or False (type the entire word)
    11·1 answer
  • Danica is creating a flyer for her cookies that she will sell during her school fair. She wants to add a registered
    7·1 answer
  • So I was looking at my profile and it says i'm a brainly PLUS member didn't sign up for it tho. Any ideas why this could have ha
    14·2 answers
  • In Python what are the values passed into functions as input called?
    13·1 answer
  • Guyssss......urgent helppp plsss answerrrr
    5·1 answer
  • How do you check to see if the user entered more than one character? Complete the code.
    14·1 answer
  • Input two numbers and print their sum products difference division and remainder​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!