1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesnalui [34]
4 years ago
15

You hear someone make the following comment: "A blueprint is a design for a house. A carpenter can use the blueprint to build th

e house. If the carpenter wishes, he or she can build several identical houses from the same blueprint." Think of this as a metaphor for classes and objects. Does the blueprint represent a class, or does it represent an object?
Computers and Technology
1 answer:
max2010maxim [7]4 years ago
4 0

Answer:

The answer is "classes are the blueprints"

Explanation:

According to the class definition, it is a collection of data members and member methods, in which all the data members can't return any value, and member methods or functions return a value.

  • In this question, the carpenter uses the blueprint to build the house, if he uses class and object model.
  • This model also known as an entity blueprint, which sets the properties and functions with an object type.
You might be interested in
Which of the following statements is true? Computer disks are volatile storage devices Volatile storage is lost when a computer
arsen [322]

Answer:

Volatile storage is lost when a computer loses power.

Explanation:

There are different types of storage in the computer. We have those that stores permanently like the disk while we have those that are very volatile.

The permanent storage retain storage in the event of power failure but volatile storage is lost if there is power failure. Example of volatile storage in the computer is RAM

4 0
3 years ago
Read 2 more answers
Jahmar typed 350 words in 25 minutes. What is his typing speed?
loris [4]

Answer:

its 14

Explanation:

350/25 is 14 words per minute

4 0
3 years ago
An administrator uses the ctrl-shift-6 key combination on a switch after issuing the ping command. What is the purpose of using
REY [17]

The purpose of the administrator using the keystrokes is to;

Interrupt the Ping Process.

<h3>Keyboard Commands</h3>

To interrupt an IOS process such as ping or traceroute, it is very important for the user to enter a combination of the Ctrl-Shift-6 key.

Now, Tab will complete the remaining parameters or even arguments within a command.

Finally, to exit from configuration mode to privileged mode, enter the Ctrl-Z keystroke. Thereafter, CTRL-R will redisplay the line you just typed, which makes it simpler for the user to press Enter key and reissue the ping command.

Read more about computer keyboard commands at; brainly.com/question/14447287

7 0
3 years ago
Write a program that takes in a line of text as input, and outputs that line of text in reverse. The program repeats, ending whe
Nana76 [90]

<u>Answer:</u>

<em>using System; </em>

<em>public class Program </em>

<em>{ </em>

<em> public static void Main() </em>

<em> { </em>

<em> String input ; </em>

<em> while(true) </em>

<em> { </em>

<em>  input = Console.ReadLine(); </em>

<em>  if(input.Equals(""quit"")) </em>

<em>  break; </em>

<em>  Reverse_String(input); </em>

<em> } </em>

<em> return; </em>

<em> } </em>

<em>static void Reverse_String(string input_text) </em>

<em>{ </em>

<em>    char[] text = input_text.ToCharArray(); </em>

<em>    Array.Reverse(text); </em>

<em>    Console.WriteLine(text); </em>

<em>} </em>

<u>Explanation:</u>

<em>In the above program a separate function is written to reverse the string.</em>

This method takes the string as an argument and place it in a array and then use the built-in function reverse and print the reversed string in the console.

<em>In the main(), the input is obtained from the console and it is passed to the reversestring(). </em>

7 0
3 years ago
Read 2 more answers
How does HTTP rely on other layers of the internet?
kogti [31]

Answer:

All of your communications are being sent over the Internet so these requests are being sent inside TCP/IP packets and over the physical wires of the Internet. ... It uniquely identifies the location of each computer or device connected to the Internet.

7 0
3 years ago
Other questions:
  • The first window displayed when you install opensuse is the ____ window.
    12·1 answer
  • Write a php program that checks the elements of a string array named $passwords. use regular expressions to test whether each el
    8·1 answer
  • A security administrator is analyzing a user report in which the computer exhibits odd network-related outages. The administrato
    13·1 answer
  • A domain name points to a specific internet address known as a? A. Domain name B. User name C. URL D. IP address
    12·1 answer
  • Write and test the definition of a haskell function 'largest', which finds the largest element of a list, but is implemented usi
    15·1 answer
  • You use a 1200 watt hair dryer for 10 mintues a day.
    7·1 answer
  • Tell me the defination of working principle of computer with all information​
    9·1 answer
  • How do you get a potion of fire-protection in the overworld because I am having a hard time in the Nether? I will give away 14 p
    8·2 answers
  • When comparison shopping, all of these hint at a good deal EXCEPT_____________________.
    5·1 answer
  • Which tab in MS Word would you select to insert a shape into a document? Question 6 options: Insert Review View File
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!