1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denpristay [2]
3 years ago
8

Methods that require you to use an object to call them are called ____ methods.1. accessor2. instance3. internal4. static

Computers and Technology
1 answer:
spin [16.1K]3 years ago
3 0

Answer:

Option 2 i.e., instance methods is the correct answer to the following question.

Explanation:

Because the instance method or function is the function that needed the class object to be called.

<u>For Example:</u>

//header file

#include <iostream>

using namespace std;

//define class

class Test

{

public:

//instance method

void getins()

{  

cout<<"I AM Instance method";

}

};

int main()

{

//creating object

Test obj;

//calling of instance method through class object

obj.getins();

}

<u>Output</u>:

I AM Instance method

You might be interested in
While working on a customer issue, your colleague calls and asks for help to resolve his issue. What should you do?A. Go ahead a
Lesechka [4]

Answer:

Request the colleague to call after sometime

Explanation:

While working on a customer issue, your colleague calls and asks for help to resolve his issue. What should be done is to "Request the colleague to call after some time."

This is because,e in situations like that, it is believed that the customer should come first, and that is the purpose of being there. For employee to serve the customer. A colleague can easily link up with other employees to get his issues sorted, or simply wait.

4 0
3 years ago
Television, radio, newspapers, magazines, the Internet, and other forms of communication are collectively referred to as thea. W
quester [9]

Answer:  c) Mass media.

Explanation:

Mass media is the technological media platform which imparts information in different forms to the public and audience.It reaches audience through devices and content that can be in written format, spoken,broadcasting etc.

  • Sources of mass media to impart information can be television, internet, radio, newspaper , magazine etc.
  • Other options are incorrect because high-tech politics is political field with impact of technology.World Wide Web(www) is constituted of resource and internet facility.
  • Government's fourth branch is the unofficial cluster of institution impacting three official branches.Media conglomeration is the firm that on various mass media companies.
  • Thus, the correct option is option(c).
6 0
3 years ago
Olivia is an amputee who wears a prosthetic right hand. Which technology would most help her operate a computer?
Alecsey [184]

In the case of Olivia as an amputee who wears a prosthetic right hand. the technology that would most help her operate a computer is 'Nerve interface' technology.

<h3>What technology is needed for amputees?</h3>

'Nerve interface' technology is known to be used by amputees and it is said to be be thought to help in moving bionic limb.

The New technology that is said to often allows users to have greater control and precision if they are said to be using prosthetic hands is known to be 'Nerve interface' technology.

Hence, In the case of Olivia as an amputee who wears a prosthetic right hand. the technology that would most help her operate a computer is 'Nerve interface' technology.

Learn more about prosthetic from

brainly.com/question/973195

#SPJ1

6 0
2 years ago
A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for
yarga [219]

Answer:

implementing a firewall

installing antivirus software

Explanation:

implementing a firewall: implementing this you could prevent the inbound and outbound not permitted connections to your internal network.

installing antivirus software: We need to install a antivirus software in the endpoints to detect and delete possible infections.

8 0
4 years ago
Nowadays computer games are mostly available on external<br> hard disk.<br> Is it true or false?
sergey [27]

Answer:

false

Explanation:

because a lot of times they are downloads without the disk

7 0
4 years ago
Read 2 more answers
Other questions:
  • You grant them remote access to your computer to enable them to act as you to fix the situation. what type of os must be install
    9·1 answer
  • If a security officer is non-commissioned officer, he can carry a baton on duty if he went through a training class
    8·1 answer
  • Open a command prompt on PC1. Issue the command to display the IPv6 settings. Based on the output, would you expect PC1 to be ab
    7·1 answer
  • Protected base class members cannot be accessed by: a.friends of the base class.
    6·1 answer
  • A game’s ______ is what contains its directions and calculations; some refer to it as the “engine” that drives the game.
    12·1 answer
  • Eva is listening to music while she browses the Internet. Which type of operating system must she be using?
    10·2 answers
  • What do you think the need for so many different form factors and server types are?
    13·1 answer
  • This diagram shows a number of computing devices connected to the Internet with each line representing a direct connection.
    11·1 answer
  • What does GEOSYNCHRONICE SATELLITE use for?​
    7·2 answers
  • Not all output display data for humans to read explain why​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!