1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anestetic [448]
4 years ago
5

When applying strict “Private access” level to a component. Which services should the designer provide in its class to allow the

object to communicate with the outside world? What should be the access level of these services?
Computers and Technology
1 answer:
Tju [1.3M]4 years ago
5 0

Answer:

public accessor methods

Explanation:

When applying strict “Private access” level to a component the designer should provide public accessor methods in its class to allow the object to communicate with the outside world. The access level of these services must be public so that they can be accessed by other classes and objects of the outside world.

Below is an example of such a class design in java :-

class MyClass {

private int num; //private class component

 

public int getNum(){ //public accessor method to allow the object to        communicate with the outside world

 return num;

}

}

You might be interested in
Which Internet protocol (IP) packet fragmentation header field specifies where the fragment belongs in the original datagram
Yanka [14]

An Internet protocol (IP) packet fragmentation header field which specifies where the fragment belongs in the original datagram is the fragment offset.

<h3>What is the TCP/IP model?</h3>

The TCP/IP model is known as the Internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model and it can be defined as a standard framework that is designed and developed for the transmission (prepare and forward) of information on the Internet.

In the TCP/IP model, a fragment offset simply refers to an Internet protocol (IP) packet fragmentation header field which is used to specify where the fragment belongs in the original datagram.

Read more on Internet protocol here: brainly.com/question/17387945

#SPJ1

8 0
2 years ago
A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobi
artcher [175]

Answer:

c. Mobile hotspot

Explanation:

A mobile hotspot is a hotspot that is to be activated by turning on the WiFI hotspot. It is used to share the cellular data to the laptop, computer system and the mobile devices who do not have an internet connection

Since in the question, it is mentioned that the one traveler has an unlimited cellular data plan and a consistent strong signal

So the mobile hotspot should be used to provide internet service to the group.

6 0
3 years ago
Search engines use indexes created by web _________ to provide fast searches.
Nastasia [14]
Search engines use indexes created by web crawlers to provide fast searches.
3 0
3 years ago
. What is the difference between a combinational circuit and sequential circuit? Give example of each.
Licemer1 [7]

A combinational circuit is a complex circuit with different elements... for eg. computer motherboard is a very complex circuit with a lot of different elements connecting other components of computer as well.

A sequential circuit is a bit more primitive often a part of combinational one. For eg. three resistors connected in parallel.

Hope this helps.

r3t40

7 0
3 years ago
Today's Apple Mac computers run with the same I-Ternal hardware as the Windows based PC true or false
Ksivusya [100]
Kinda of both. The processor, memory, hard drive and displays are all standard components and are provided by a variety computer competent manufacturers (except for the processors which are all supplied by Intel). Yet - while many components are standard - NO, the core, hardware components, like logic boards (motherboard), video cards, and other specialty components (some display connectors and displays, for example) are propriety Apple designs.
5 0
3 years ago
Other questions:
  • In the 21st century organization we will see:
    10·1 answer
  • A classmate is texting a false rumor around school that another student was arrested for shoplifting. This behavior can be descr
    9·2 answers
  • Codio Challenge Question (Python)
    6·1 answer
  • When a user runs an application, what transfers from a storage device to memory?
    6·1 answer
  • USDA-APHIS Animal Care Resource Policy #12 "Considerations of Alternatives to Painful/Distressful Procedures" states that when a
    11·1 answer
  • Given the declaration Circle x = new Circle(), which of the following statements is most accurate?
    11·1 answer
  • Write a c++ program that generates three random numbers. The first number should be between 0-30, the second number should be be
    7·1 answer
  • Follow me on insta Aaftabkhan_7​
    13·2 answers
  • Write a program to Test if mold is stored in the variable word.
    5·1 answer
  • Help me to solve please​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!