1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zimovet [89]
3 years ago
14

What object typically hides its data but allows outside code access?

Computers and Technology
1 answer:
GaryK [48]3 years ago
4 0

Answer:

An object typically hides its data but allows outside code access to the methods that operate on the data.

Explanation

Object-Oriented Programming (OOP) is an aspect of computer science. An example of OOP language is Python.

OOP speaks to the production of objects. Objects typically contain data and functionality. One of the qualities of Objects in this sense is that as it is being created, the codes remain inaccessible or invisible but the platform that creates and effects changes to such codes retain access to the data of the Objects.

Cheers!

You might be interested in
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
3 years ago
Rewrite the following condition to avoid a possible arithmetic exception:
dangina [55]

Answer:

if (x > 7 && Math.sqrt(x) < 3)

Explanation:

The previous condition checks if the square root of x is less than 3, but this would raise an error if x is a value equal to or less than 0.

So, the condition checks for the value of x before evaluating the square root after the AND operation to prevent an arithmetic exception.

4 0
2 years ago
A short
alexandr402 [8]

Explanation:

Java Bitwise Operators

Operator Description Example

>> (right shift) Binary Right Shift Operator. The left operands value is moved right by the number of bits specified by the right operand. A >> 2 will give 15 which is

8 0
3 years ago
In this image, we are clicking a button on the Quick Access Toolbar. What will happen
Lostsunrise [7]

Answer: It’s B The presentation will start from the beginning

Explanation: I took the test

7 0
3 years ago
What variable can be changed when using the WEEKDAY function
gregori [183]

Answer:

This brainly page should be able to help, make sure to thank them if it's correct

<em><u>brainly.com/question/15076370</u></em>

<em><u /></em>

3 0
3 years ago
Other questions:
  • to create a cover letter to send to a potential employers along with a resume what software program should you use
    10·1 answer
  • The principle of time preference requries a larger payment in the future than the present. Which situation best illustrates this
    12·1 answer
  • In 1-2 sentences, describe how to change the font.
    8·2 answers
  • The first commercially available digital camera was which of the following?
    9·1 answer
  • Which option is used to ensure the integrity and authenticity of a Word document but requires additional services to be availabl
    5·2 answers
  • You are working with an online tech service to fix a problem with installation of a program on your machine. You grant them remo
    13·1 answer
  • Alex has composed a layout with this Image for a magazine. Which rule of composition has Alex applied?
    14·1 answer
  • Project stem test 3 answers
    14·1 answer
  • Another name of computer program is
    6·1 answer
  • which two partitions do you typically create at minimum during a fedora linux installation? (choose two answers.)
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!