1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denpristay [2]
3 years ago
8

Methods that require you to use an object to call them are called ____ methods.1. accessor2. instance3. internal4. static

Computers and Technology
1 answer:
spin [16.1K]3 years ago
3 0

Answer:

Option 2 i.e., instance methods is the correct answer to the following question.

Explanation:

Because the instance method or function is the function that needed the class object to be called.

<u>For Example:</u>

//header file

#include <iostream>

using namespace std;

//define class

class Test

{

public:

//instance method

void getins()

{  

cout<<"I AM Instance method";

}

};

int main()

{

//creating object

Test obj;

//calling of instance method through class object

obj.getins();

}

<u>Output</u>:

I AM Instance method

You might be interested in
________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared po
Rudiy27

Answer:

"Cloud computing" is the correct answer .

Explanation:

Cloud computing is defined as it provided the resources of the system like data storage etc on the demanding purpose. In cloud computing, it provided the resources without knowing the management. Social media is one of the examples of cloud computing.

  • Cloud computing is a model in the computer system that stores the bulk data provided the services to the user on demands.
  • Cloud computing acts as a shared pool of virtual resources on the internet.
6 0
3 years ago
Discuss TWO changes in ICMP that took place with the development of IPV6 and indicate why those changes were made.
max2010maxim [7]

Answer:

Over and above basic medication signaling, but instead of signaling, ICMPv6 could be used for other objectives. It could be utilized for the below description.

Explanation:

That falls into the same category even though IPv4 does through ARP.  

  • <u>Neighbor Discovery</u>:

Used mostly for control of hosts but instead multichannel interface setup.  

  • <u>Router Discovery</u>:

Trying to manage Handheld IPv6 hand-offs.  

Throughout IPv6, within a week of negligible and sometimes more broadcast group, this same ICMPv6 response can begin. The whole last extension connector before another ICMPv6 connector contains a 58-value new Header field.

3 0
3 years ago
Describe the importance of human interaction in a computing system.
otez555 [7]

Answer:

The goal of HCI is to improve the interaction between users and computers by making computers more user-friendly and receptive to the user's needs

Explanation:

.

Human-computer interaction (HCI) is a multidisciplinary subject that focuses on computer design and user experience. It brings together expertise from computer science, cognitive psychology, behavioural science, and design to understand and facilitate better interactions between users and machines.

4 0
3 years ago
Read 2 more answers
In the event you get pulled over for a traffic stop, describe the situation from the police officer's perspective and list at le
Zepler [3.9K]

Answer:

Dealing with traffic related issues

Explanation:

The police officer are primarily charged with the primary responsibilities of maintaining law and order in any given society.

from the police officer's perspective when I get pulled for a traffic stop it is expected that

  • as a first rule is to always be polite to the officer.  Greet the officer with a warm and friendly smile as this will lower his or her fears.
  • Always follow instructions and give the officer your license, registration and insurance information when they ask for it.  
  • Treat the officer with respect and courtesy.
  • Always remove your sunglasses and maintain eye contact with the officer.   Most law enforcement officials view this as a sign that you are being truthful.
  • Remain as inconspicuous as possible.   If the officer doesn’t remember certain aspects of the incident, this can work to your advantage in court.

The additional two (2) things you need to do make traffic stop go smoothly are:

1) Ensure you maintain a high sense of dutifulness in cause of performing your responsibility,

2) Ensure you put on a user friendly welcome to the road users this help to make them feel safe and secured.

5 0
3 years ago
Read 2 more answers
Encryption that uses 16-character keys is known as ____. strong 128-bit encryption strong 256-bit encryption military-strength 5
allsm [11]

Answer: Strong 128-bit encryption.

Explanation: An individual character corresponds to 8 bits . So if there are 16 characters then,

16\times8=128 bits keys

This makes the 128 bit key encryption the strongest amongst all other options.It is strongest because it is almost impossible to decode the 128-character key  by any method e.g.-brute-force method.

Other options are incorrect because the characters given by the other bits are as follows:  {\frac{256}{8}=32 characters

                         {\frac{512}{8}=64 characters

                         {\frac{512}{8}=128 characters  

Thus, the strongest character key is of 128 bits. for cipher.

3 0
3 years ago
Other questions:
  • You bought a monochrome laser printer two years ago. The printer has gradually stopped feeding paper. Which printer component sh
    14·1 answer
  • The Internet shopping cart is an example of which version of the web?
    15·1 answer
  • When using a file name you have to use only lower case letters<br>true or false
    11·1 answer
  • How do you double space on microsoft word?
    5·1 answer
  • What should be done with statements or sections which are unclear?
    12·2 answers
  • Which custom configuration is most likely to include a raid array?
    14·1 answer
  • What is wrong with the following code?
    11·1 answer
  • If there are 18 people in your class and you want to divide the class into programming teams of 3
    7·1 answer
  • Explain the following terms <br><br>copyleft:<br><br>creative Commons:<br><br>GNU/GPL:​
    8·1 answer
  • Bob has started a company and registered its name with the government as a private corporation. He tries to create a domain name
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!