1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Simora [160]
3 years ago
9

You’re probably wearing on your wrist one of the world’s most common types of objects—a watch. Discuss how each of the following

terms and concepts applies to the notion of a watch: object, attributes, behaviors, class, inheritance (consider, for example, an alarm clock), abstraction, modeling, messages, encapsulation, interface and information hiding.
Computers and Technology
1 answer:
Marrrta [24]3 years ago
4 0

Answer:

a)Object :- A watch is comprised of various part which together join to give us a perspective on what the time at a given minute is. It is just when these parts are consolidated together that you can have what is known as a watch . The individual segments are normally structure and all things considered much of the time, this will start through building drawings or diagrams Depending on whether we will utilize a mechanical or an electronic watch, we should make diverse plan for the force source area, the watch packaging, the hands, the watch insurance. The primary concern the client ever look at from the watch is the situation of its hands to understand time. The remainder of the watch's working is typified inside its packaging and these mind boggling instruments are avoided the client of the watch.

b)Attributes:- Apart from having the option to understand time, a watch has characteristics, for example, its shading, its constituent material(for model, quartz, steel), its capacity source(mechanical, sunlight based, electronic) , additional properties, for example, water safe, its size, its capacity to monitor the date and month. Additionally , like its capacities, The watch's characteristics are speak to part of its structure in its designing graphs (for instance, a watch which works on sun oriented vitality will incorporate sun powered boards/cells) and as you will utilize a watch, its given qualities will be conveyed alongside it (the watch). Each watch will keep up its own characteristics . For instance, each watch monitors time as per how it was set up, however a given watch doesn't have the foggiest idea about the time in another watch with the exception of if these watches were synchronized to keep an indistinguishable record of time.

c)Behaviors:- Considering the way that conduct and technique are comparative terms. Consequently practices house the way(s) in which the watch plays out its assignments. For instance, for a mechanical watch the conduct/strategy shrouds the hand and wheel development systems from the client of the watch.  

d)Class:- A class is utilized to house/exemplify a lot of techniques that guide it(the class) in playing out the class' tasks.A class can be viewed as the outlines or on account of our watch , the building drawings/structure plan from which our watch object is made. It will consequently contain techniques empowering us to understand time, change time, etc.  

e)Inheritance:- With legacy, we can from a current class(parent class), make another class(child class). The new class assimilates the attributes of the current class and conceivably include extra and one of its very own kind qualities to these acquired qualities. Our morning timer may contain the general watch qualities, for example, the hands and the planning parameters and yet it might have an extra modified caution gadget which transmits extremely uproarious sounds and contains volume control. Simultaneously, the morning timer may not contain the band which most wrist watches contain.  

f)Abstraction:- Abstraction is a component which empowers us to effectively conceptualize a genuine article by expelling abundance/pointless subtleties of the item. On the off chance that we take a wrist watch , a pendulum clock, a morning timer and a mechanical watch and evacuate a given arrangement of highlights from every one of these various classes of watches, we will come to get the general arrangement of highlights that characterize every single watch. You can get a significant useful clarification of reflection from this site page Object Oriented Programming Abstraction ,  

g)Modeling:- Modeling has to do with making a portrayal of something , ordinarily for a littler scope. Concerning this definition, concocting the building drawings for a watch ought to speak to displaying.  

h)Messages:- When you need to adjust a simple watch(I consider alignment to be a technique subsequently the demonstration of aligning my watch is a strategy call), turning the crown makes an impression on the moment hand of the watch to pivot and henceforth move from an offered moment to another, resulting developments of the moment hand additionally cause the hour hand to move and consequently, the time perusing of the watch changes. The message I sent , which was that I needed to change time was executed as a technique approach the adjustment strategy.  

i)Encapsulation:- I will take the case wherein I am attempting to align my watch from the time readings of another watch. The two watches are questions by adjusting one watch from the perusing of another, I am realizing some type of correspondence between the two watches. One might have the option to align one watch from another, yet that doesn't mean he will have the option to comprehend the execution subtleties of the watch.

Explanation:

You might be interested in
In what way do networks help to protect data
Aleksandr-060686 [28]

One way that computer networks help to protect data is by backing up the data.

Computer networks are normally formatted to automatically back up all of the data that is stored on them. This protects the data in case of any type of computer system failure.

5 0
3 years ago
Individuals and businesses have concerns about data security while using Internet-based applications. Which security risk refers
Katen [24]

Answer:

Spam

Explanation:

If you receive in bulk the unsolicited messages, then that does mean that your inbox is being spammed. This will not harm you but you will lose the Gb that is allocated to your mailbox. And if you will not check then your mailbox will soon be full, and you might not receive some of the important messages that you should reply to immediately.

6 0
3 years ago
Which question can most help a writer revise an argumentative essay?
Jobisdone [24]
Do details provide support for the claim
7 0
3 years ago
Read 2 more answers
How many bytes are in 1 kilobyte of storage
topjm [15]

Answer:

1000

Explanation I SEARCHED IT Up

5 0
3 years ago
Which of the following would an A/V technician NOT typically do? (Select all that apply).
nydimaria [60]
Where is the options?
7 0
3 years ago
Other questions:
  • Write the definition of a function printDottedLine, which has no parameters and doesn't return anything. The function prints to
    10·1 answer
  • How might the website owner use theses details other than to verify login details?
    6·2 answers
  • 1)Which of the following statements about the print statement are TRUE? (Check all that apply)
    8·1 answer
  • Consider a system consisting of processes P1 , P2 , ..., Pn , each of which has a unique priority number. Write a monitor that a
    14·1 answer
  • Refer to the exhibit. A network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transact
    8·1 answer
  • Sometimes a database can contain "bad data," meaning incomplete, incorrect, inaccurate, or irrelevant records, which can be corr
    7·1 answer
  • 9. Which of the following is the<br>leading use of computer?​
    13·1 answer
  • You are implementing a new application control solution. Prior to enforcing your application whitelist, you want to monitor user
    5·1 answer
  • Does any of yall play rob lox?
    5·2 answers
  • Why is it useful to understand coding fundamentals even if you work in a game design role that doesn’t traditionally write code?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!