The difference betweeen personal and nonpersonal blogs are that on a personal blog you give out most information you dont want people to know or it is anonomys
Answer:
Answer is A network access method that avoids the possibility of data collisions.
Token Ring is the precursor to Ethernet and CSMA/CD to avoid packet collisions.
Explanation:
Answer:
Option (D) using the private access specifier on the class fields
Explanation:
- The private access modifier can be used to hide the data.
- Methods and data variables ( fields ) can be declared with the private access modifier.
- Data hiding is a OOPS Concept which can be achieved with the private keyword (private access modifier).
- The access modifiers are of types Public, Private, Protected and Default ( no access modifier - no need to explicitly specify the default keyword).
- Data hiding means to hide the data, the data is contained in the class variables.So, option (d) using private access modifier on the class fields is correct option.
- Option (A) is wrong as the using the public access modifier doesn't hide anything. It is public and is visible to the public.
- Option (B) is wrong as using the private access modifier on the methods means it is hiding the implementation of the methods not the data.
- Option (C) is wrong as using private access modifiers on class definition means making the classes not visible to other classes it doesn't mean data hiding as the data is contained in the class variables.
Answer:
1. #include <stdio.h>
2. int main()
3. {
4. int k;
5. int j;
6. int i;
7. int array[7];
8. array[0] = 1;
9. for (i = 1; i < 9; ++i)
10. {
11. array[i] = array[i-1]*2;
12. for (j=0; j < i; ++j)
13. {
14. printf("%d ",array[j]);
15. }
16. for (k=i-2; k > -1; --k)
17. {
18. printf("%d ", array[k]);
19. }
20. printf("\n");
21. }
22. return 0;
23. }
Explanation:
- From line 1 to 3 we start the main function
- From line 4 to 7 we declare the variables that we are going to be using throughout the program including an array of 7 positions
- On line 8 we initialize the array with one to match the sequence
- From line 9 to 10 we create a for loop to create the 9 sequences of numbers
- On line 11 we assign values to the array by taking the previous value and multiplying it by 2, this way we can create the sequence 1,2,4,8,32...
- From line 12 to 15 we print the ordered array
- From line 16 to 19 we print the inverse array minus one
- On line 20 we print an enter
Answer: catfishing
Explanation:
They hide behind a screen and pretend to be and look like someone they're not by putting up fake pictures etc.