1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oliga [24]
3 years ago
13

2. You have classes to represent different shapes (see below). You realize you can benefit from inheritance and polymorphism by

creating a superclass for all shapes. a. Create such a superclass. b. Did you choose an abstract class or an interface for your answer to part a? c. Why did you make this choice?
Computers and Technology
1 answer:
Keith_Richards [23]3 years ago
6 0

Answer:

The description for the given question is described in the explanation section below.

Explanation:

a...

interface Shape

{

public double getArea();    // creating a function

public double getPerimeter();   // creating a function

}

b and c...

  • I preferred Interface although abstract classes are being used when children's classes associate certain aspect methods and variables and because all classes represent a certain method throughout the specific solution, not instance variables, it would be easier to construct an interface.
  • Almost all of the period interfaces are favored because they have multiple inheritance capabilities.

You might be interested in
How many arguments are required for the sum function?
podryga [215]
Provide us with this "sum" function, and we can tell you. We aren't psychic.
7 0
3 years ago
Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software progra
Irina18 [472]

Answer:

Option A i.e., software package.

Explanation:

Prewritten, available on the market the software packages, which not necessitate a company's desire to actually compose its software for certain functionalities, will be applied to as software packages.

A software package is essentially a finite number of programs or software components that function together so that they achieve different tasks and objectives.

5 0
3 years ago
10. Which of these is not an HTTP verb? PUT AJAX GET DELETE
Korolek [52]

Answer:

Brainliest!

Explanation:

The primary or most-commonly-used HTTP verbs (or methods, as they are properly called) are POST, GET, PUT, PATCH, and DELETE. These correspond to create, read, update, and delete (or CRUD) operations, respectively. There are a number of other verbs, too, but are utilized less frequently.

-

restapitutorial

.

com

3 0
3 years ago
HELP FOR JAVASCRIPT: 01. What is prototypical inheritance? 02. How can JavaScript be used to improve accessibility on the web? I
Vlada [557]

Answer:

Following are the answer to this question:

Explanation:

Prototypical inheritance:

This inheritance is a part of the object-oriented programming, in the JavaScript, the prototype is also an instance of an entity, on this type of inheritance an object inherits another object directly, in which an instance could be composed of several sources which enable simple selective inheritance and a flat structure of delegation[[Prototype]].

Web accessibility using JavaScript:

In the website or web page, JavaScript is usually fully accessible if another script 's implementation has been device-independent, and the components are accessible to be used in assistive devices. It enables the developers to improve web page information, which helps in communication, data processing, and regulation, and it also helps in management.

3 0
3 years ago
Consider sending a stream of packets from host a to host b using ipsec. typically, a new sa will be established for each packet
nordsb [41]

Consider sending a stream of packets from Host A to Host B using Ipsec. Typically, a new SA will be established for each packet sent in the stream. True or False? Tweet Answer FALSE. REASON: Ipsec SA is first connect with Host A and Host B. So, all packets in the stream use the new SA.

8 0
2 years ago
Other questions:
  • ________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. black-hat gray-ha
    10·1 answer
  • You have a Nano Server named Nano1. Which cmdlet should you use to identify whether the DNS Server role is installed on Nano1
    12·1 answer
  • A _____ defines what must take place, not how it will be accomplished.​
    12·1 answer
  • What are the pasting options in Outlook 2016? Check all that apply.
    10·2 answers
  • Select the correct answer.
    11·1 answer
  • Kim is creating a PowerPoint
    13·1 answer
  • Which stage of the waterfall model is most like the simple model's stage 5?
    12·1 answer
  • To implement a small database, a database designer must know the "1" and the "M" sides of each relationship and whether the rela
    7·1 answer
  • Command create database in oracle database ::((
    8·1 answer
  • so i just went to play forge of empires and when i logged on to it all of my progress was gone and i was so far in to it
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!