1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tiny-mole [99]
3 years ago
6

Samantha is in the beginning stages of OOP program development. What are the five steps she must follow for creating an OOP prog

ram?
Computers and Technology
2 answers:
dedylja [7]3 years ago
4 0

Answer:

1. Classes and objects

2. Inheritance

3. Polymorphism

4. Data hiding/ encapsulation

5. Interfaces.

Explanation:

lora16 [44]3 years ago
3 0

Answer:

1. Classes and objects

2. Inheritance

3. Polymorphism

4. Data hiding/ encapsulation

5. Interfaces.

Explanation:

Classes and objects depict the major component of the OOP (object oriented programming). It explains the object like a ball in a soccer game development.

The inheritance is like the subclass of the object. Data hiding is a stage in oop where the codes or data are hidden from another users.

In the polymorphism stage, the object is given the ability to change to a sub-object, while in the interface stage a function or method signature is defined without implementing it.

You might be interested in
While investigating an email issue, a support technician discovers no users can access their email accounts on the company’s ema
PolarNik [594]

Answer:

C. Escalate the problem to a server administrator to check for issues with the server.

Explanation:

Pinging is a tool or program that IT technicians and professional for testing if a particular host or server is reachable. Since after the support technician pinged the email server from various location and the LAN results in 0% packet loss, this means that the fault is not from the LAN, but that the host server or server administrator is unreachable or have issues. Thus, the next step of troubleshooting is to escalate the issue to the server administrator to check for issues with their server.

5 0
3 years ago
To securely erase data, the u.s. department of defense suggests that the data be overwritten ________ times.
Stels [109]
The course that will tackle this topic is computers and technology. The answer to the given problem above is "7".

To securely erase date, the United States department of defense suggest and propose that the data can be overwritten 7 times.
4 0
3 years ago
Why did utf 8 replace the sac character encoding standard
Sedaia [141]
UTF-8- is a variable width character encoding capable of encoding all 1,112,064 valid code points in Unicode using one to four 8-bit bytes. The encoding is defined by the Unicode standard. The sac character encoding method was addressed to simplify the symbolism of letter and symbols.As the computers grew in capacity UTF-8 method was implemented to optimize such protocol allowing more characters to be included with an expanded string of possibilities
7 0
3 years ago
Which of these best describes cloud computing? A. an on-demand service that helps to access shared computing and storage resourc
Basile [38]
I think its A. an on-demand service that helps to access shared computing and storage resources from anywhere using an Internet connection
5 0
3 years ago
Which of the following is a good way to get other websites to link to your site?
andreev551 [17]

Answer:

Building relationships with similar sites is the correct answer.

Explanation:

Because it is necessary to maintain or establish a relationship with similar sites by which they link your website and this is a good way to popularize your website and get more customers through the building of the relationship with similar sites. By this relationship, you can increase the rating and provide the goods or services to your customers easily.

8 0
3 years ago
Other questions:
  • Which is an example of a student practicing ethical behavior online??
    7·2 answers
  • Alternating Current or AC is better for use in ___________, while DC direct current is needed in _________ .
    15·2 answers
  • Write a program in c++ to displaypascal’s triangle?
    14·1 answer
  • Round Robin Algorithm
    14·1 answer
  • The Sleeping-Barber Problem:
    15·1 answer
  • A shop will give discount of 10% if the cost of purchased quantity is more than 1000. Ask user for quantity suppose, one unit wi
    5·1 answer
  • Write a Java program to create a class called Cars. The class should include three instance variables: makes (type: String), mod
    12·1 answer
  • List two ways to insert a chart in powerpoint
    14·1 answer
  • If anyone knows how to code on python:
    8·1 answer
  • Task 2
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!