1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zimovet [89]
3 years ago
14

What object typically hides its data but allows outside code access?

Computers and Technology
1 answer:
GaryK [48]3 years ago
4 0

Answer:

An object typically hides its data but allows outside code access to the methods that operate on the data.

Explanation

Object-Oriented Programming (OOP) is an aspect of computer science. An example of OOP language is Python.

OOP speaks to the production of objects. Objects typically contain data and functionality. One of the qualities of Objects in this sense is that as it is being created, the codes remain inaccessible or invisible but the platform that creates and effects changes to such codes retain access to the data of the Objects.

Cheers!

You might be interested in
When students have computer trouble they usually are expected to
Kitty [74]

Answer: A) Make any simple fixes on their own.

5 0
3 years ago
Read 2 more answers
Consider the recursive method whose definition appear below. Why? public static String mysteryString (String s){ if(s.length()==
Marizza181 [45]

Answer:

retupmoc

Explanation:

1.) Anwser will be retupmoc

because

public static String mysteryString(String s){

if(s.length() == 1){

return s;

}

else{

return s.substring(s.length() -1) + mysteryString(s.substring(0, s.length()-1));

}

}

In this program input is "computer" . So the function mysteryString(String s) it does

return s.substring(s.length() -1) + mysteryString(s.substring(0, s.length()-1));

so when it enters the first time ??s.substring(s.length() -1) and it will be give you 'r' then it calls the function recursively by reducing the string length by one . So next time it calls the mysteryString function with string "compute" and next time it calls return s.substring(s.length()-1)? + mysteryString(s.substring(0,s.length-1)) so this time it gives "e" and calls the function again recursively . It keeps on doing till it matched the base case.

so it returns "retupmoc".

6 0
3 years ago
Air bags are always safe. A. True B. False
Naya [18.7K]

Air bags are always safe. A. True<u> B. False</u>

5 0
3 years ago
Read 2 more answers
How to get amount after a percentage increase in excel​
Tresset [83]

Answer:

First: work out the difference (increase) between the two numbers you are comparing.

Increase = New Number - Original Number.

Then: divide the increase by the original number and multiply the answer by 100.

% increase = Increase ÷ Original Number × 100.

Explanation:

3 0
2 years ago
Read 2 more answers
Which of the following collects and provides reports on failed login attempts, probes, scans, denial-of-service attacks, and det
Marrrta [24]

Answer: Option B. System logs

Explanation:

A system log contains records of events that are logged by the operating system components. These events are often predetermined by the operating system itself and they indicates how the system processes and drivers were loaded. System log files may contain information about device changes, device drivers, system changes, events, operations and more.

6 0
3 years ago
Read 2 more answers
Other questions:
  • What combination of words and boolean operators would display all audio files about chiropractic?
    6·1 answer
  • A(n) __________ can include a computer's full operating system, applications, and system settings, including security and config
    7·1 answer
  • Which file extension indicates that a file is an Adobe Acrobat document?
    13·1 answer
  • FREE POINTS JUST ANSWER MY LATEST TWO QUESTIONS PLEASE
    10·2 answers
  • The optional feature in a business letter is
    10·1 answer
  • What typically happens by default when a file is double clicked in Microsoft Windows?
    9·1 answer
  • The first step when entering data is _
    6·1 answer
  • Susan is a network monitoring technician working on a firewall for her company’s network. In the process to determine an open po
    8·1 answer
  • What is the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages, many of which contain hoax
    5·1 answer
  • By default word documents include _______ margins on all sides of the document.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!