1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tiny-mole [99]
4 years ago
6

Samantha is in the beginning stages of OOP program development. What are the five steps she must follow for creating an OOP prog

ram?
Computers and Technology
2 answers:
dedylja [7]4 years ago
4 0

Answer:

1. Classes and objects

2. Inheritance

3. Polymorphism

4. Data hiding/ encapsulation

5. Interfaces.

Explanation:

lora16 [44]4 years ago
3 0

Answer:

1. Classes and objects

2. Inheritance

3. Polymorphism

4. Data hiding/ encapsulation

5. Interfaces.

Explanation:

Classes and objects depict the major component of the OOP (object oriented programming). It explains the object like a ball in a soccer game development.

The inheritance is like the subclass of the object. Data hiding is a stage in oop where the codes or data are hidden from another users.

In the polymorphism stage, the object is given the ability to change to a sub-object, while in the interface stage a function or method signature is defined without implementing it.

You might be interested in
Write a setInterval() function that increases the count by 1 and displays the new count in counterElement every 400 milliseconds
Liono4ka [1.6K]

Answer:

var count = 0;

var counterElement = document.getElementById("counter");

counterElement.innerHTML = count;

var interval = setInterval(function () {

   count++;

   counterElement.innerHTML = count;

   if (count === 3) {

       clearTimeout(interval);

   }

}, 400);

5 0
3 years ago
Even though the Certified Information Systems Security Professional (CISSP) certification is not geared toward the technical IT
nirvana33 [79]

Answer:

True

Explanation:

Even though the Certified Information Systems Security Professional (CISSP) certification is not geared toward the technical IT professional, it has become one of the standards for many security professionals is a true statement.

7 0
3 years ago
Need help asap please​
Fofino [41]
Because you can make it to where they cannot find or see or look or talk or anything on your profile it can cut off Comunication from the person. It can also protect your safety!
6 0
3 years ago
If you have a list of words that you wish to make into a bulleted list, you must first highlight or ________ the words with your
motikmotik
<h3>Answer:</h3>

C. select

<h3>Explanation:</h3>

A. if you delete the words you can make them into a bulleted list

B. if you remove them you can make them into a bulleted list neither

D. Copying the words doesn't need for that

Hope it helped you

3 0
4 years ago
A mule deer can run 1/4 mile in 25 seconds. Which of the following correctly shows this rate as miles per hour?
sashaice [31]
You would do 1/4 * 2.4, since 25 goes into 60 2.4 times so the answer would be 60 mph
8 1
3 years ago
Other questions:
  • How do you change the username on here?
    14·1 answer
  • Where are the Add Level and Delete Level buttons located? Filter options list Sort &amp; Filter group Sort dialog box Custom fil
    11·1 answer
  • A microphone plugs into what type of connector
    5·2 answers
  • Who do politicians listen to?
    7·1 answer
  • What gaming PC should I get
    14·2 answers
  • Given three floating-point numbers x, y, and z, output x to the power of z, x to the power of (y to the power of z), the absolut
    12·1 answer
  • Choose a topic related to a career that interests you and think about how you would research that topic on the Internet. Set a t
    14·1 answer
  • Match the protocols to their use. HTTP POP3 SMTP FTP You check email in your inbox. arrowRight You send an email to a friend. ar
    14·1 answer
  • Given the message size of 16Kb, packet size of 2Kb, speed of 4Kbps over 3 links, how much time, will it take the message to trav
    6·1 answer
  • What is the following file format called? inv_nbr, inv_name, inv_cost 876521,battery,45.00
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!