1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Orlov [11]
3 years ago
14

When you use information hiding by selecting which properties and methods of a class to make public, you are assured that your d

ata will be altered only by the properties and methods you choose and only in ways that you can control. True or false?
Computers and Technology
1 answer:
dusya [7]3 years ago
8 0

Answer:

True

Explanation:

Information hiding involves using private fields within classes and it's a feature found in all object-oriented languages such as Java, Python, C#, Ruby etc.

When you use information hiding by selecting which properties and methods of a class to make public, you are assured that your data will be altered only by the properties and methods you choose and only in ways that you can control.

You might be interested in
Hello everyone can help me give all the answer​
krek1111 [17]

Answer:

1. were

2. were

3 was

4 was

5 were

1 wasnt

2 werent

3werent

4 wasnt

5 werent

were you at work?

was it in the garden?

were they worried?

was lucy present?

were his friends late?

1 they were

2 it was

3 he wasn't

4 I was

5 they weren't

Explanation:

7 0
3 years ago
An organization is using Amazon CloudWatch Logs with agents deployed on its Linux Amazon EC2 instances.
Bumek [7]

Answer:

A and B

Explanation:

EC2 run command gives a management output to review various instances and servers. Here, the logging files, collecting metrics and patches, running script installations can be achieved.

Verify the user permission and the run command, confirms if whether or not the problem of missing logging files is from the settings.

There are several AWS and customer managed policies for cloudwatch logs to give users certain levels for permission. Verifying this determines if there is full access, group logs and creation of group log events, or even a read only access.

4 0
3 years ago
What is the main difference between EDBAC and EDNIAC......​
lawyer [7]

Answer:

EDVAC (Electronic Discrete Variable Automatic Computer) was the successor to ENIAC, was binary based, and used stored programs, and was also designed by Eckert and Mauchly, UNIVAC I (UNIVersal Automatic Computer I) was the first commercial computer. It was designed by the same two men who designed ENIAC and EDVAC.

Explanation:

6 0
4 years ago
Read 2 more answers
Consider an online shopping portal that allows a customer to browse and purchase different products. There are distributed store
andrezito [222]

Answer:

Design a web page that automatically tracks the location to determine the language

Explanation:

8 0
3 years ago
Akira has trouble reading what is on the computer screen and sometimes seeing pictures on websites. As her friend, you explain t
aliina [53]

1. Using Listener Software:

Software like Adobe reader allows you to listen to the stored files rather than reading them, Akira can use this software while she need to read a file or an article, simply copy the article in pdf file and turn on listener for it.

2. Zoom in/ Zoom Out:

Most of the browsers these days allow you to zoom in and zoom out the web pages while reading them by pressing Alt and + sign for Zoom in and Alt and - for zoom out. This feature can be really helpful for reading purposes and also for images view as well.

3. Narrators

When Akira is completely fed up with reading the screen, she can use Narrators which are programs that convert every text on screen into audio file and she can listen to them.

4.Color Changers

These days software like color changer are very useful for people with low vision eyes. They change the color of screen such that there is no irritation in eyes while reading articles. They can also be used by her.

7 0
3 years ago
Other questions:
  • What is the value of variable num after the following code segment is executed?
    5·1 answer
  • A technician needs to boot a PC from a USB drive.
    5·1 answer
  • Write a statement that defines a double variable named result, initialized with the value 6.759.
    5·1 answer
  • 17. When an industrial electrical circuit requires a 220 VAC single phase power supply, the electric power supply circuit is nor
    7·1 answer
  • True or false you can add audio from flies on your own pc or record your own audio
    12·2 answers
  • Ask the user to input a word. Then, print the first letter, the last letter, and the length of the word on the same line with no
    6·1 answer
  • What programming language supports relational databases?
    15·1 answer
  • While working in a group of two the members are not getting along. You bring the two members together so they can discuss this i
    11·1 answer
  • 1) Coding for Table in Html<br>​
    6·1 answer
  • Which tool can you use to display hardware utilization statistics that tell you about the operation of your computer?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!