1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alika [10]
3 years ago
5

Which UML relationships should be used between a subclass and a superclass? For example, suppose there is an interface or abstra

ct class Employee and a class HourlyEmp loyee which inherits from it. Choose all that apply. ? a. Realization b. Aggregation C. Generalization d. Composition e. Bidirectional f. Unidirectional ? g. None of these
Computers and Technology
1 answer:
victus00 [196]3 years ago
8 0

Answer:

C. Generalization

Explanation:

The relationship between subclass and superclass is generalization. For example there will be generalization between the class Employee and class HourlyEmployee which inherits from it. All the other options are not suitable.

You might be interested in
Louis has entered a column of expense values. What feature can he use to insert the total expenses at the end of the column?
vovangra [49]
I think it’s B tho I’m not really sure
5 0
3 years ago
A computer never gets tired or bored while working for a long time .. ​
Angelina_Jolie [31]

Answer :Computers never get tired or bored because of doing the same task continuously. They work in the same manner all the time. A computer can store large amount of information in its memory.

Explanation: it is quality which makes the user to be dependent on computer. As we all know, computer systems do repetitive tasks without any boredom, tiredness, or fatigue.

5 0
3 years ago
SMTP (Simple Mail Transfer Protocol) is the standard protocol for transferring mail between hosts over TCP. A TCP connection is
ruslelena [56]

Answer:

The five rules are described as follows:

Rule A permits the inbound Simple Mail Transfer Protocol (SMTP) connection.

Rule B permits the inbound Simple Mail Transfer Protocol (SMTP) connection.

Rule C permits the outbound Simple Mail Transfer Protocol (SMTP) connection.

Rule D permits the outbound Simple Mail Transfer Protocol (SMTP) connection.

Rule E does not perform any action. Thus it is when the action is denied.

Explanation:

Rule A allows information transfer of the incoming email from the external server to the internal remote server, thus this allows an inbound connection.

Rule B allows information transfer of the incoming email from the remote server to the external remote server, thus this allows an inbound connection.

Rule C allows information transfer of outgoing email from the external server to the internal remote server, thus this allows an outbound connection.

Rule D allows information transfer of the outgoing email from the remote server to the external remote server, thus this allows an outbound connection.

Rule E does not allow any action in either direction thus it is when action is denied.

5 0
3 years ago
Work done by computer as per the instructions is called​
Alex17521 [72]

Answer:

The process of storing and then performing the instructions is called “running,” or “executing,” a program. By contrast, software programs and procedures that are permanently stored in a computer's memory using a read-only (ROM) technology are called firmware, or “hard software.”

Explanation:

hope it helps you and give me a brainliest

6 0
2 years ago
Read 2 more answers
Which of the following tasks is least effective at preventing a computer virus A. Anti-virus's software up to date
MaRussiya [10]
C is your answer
hope that helps
4 0
3 years ago
Read 2 more answers
Other questions:
  • Which type of denial of service attack exploits the existence of software flaws to disrupt a service?
    12·1 answer
  • What’s some WiFi passwords for some big brands that I can connect to while traveling?
    7·1 answer
  • If you want to learn more about a command, point to its button and wait for the ____ to appear.
    13·1 answer
  • The process of adding a header to the data inherited from the layer above is called what option below
    8·1 answer
  • (Exhibit: Production Possibilities Curves 2) Assume that a nation is operating on production possibilities curve CD. Economic gr
    11·1 answer
  • The process of giving the user the result of processing is called
    14·1 answer
  • How can you reduce the Impact of Hacking? <br>pls help with this &lt;3​
    9·1 answer
  • Pls awnser if awnser is wrong I will unmark brainliest
    5·1 answer
  • Niall is revising a history assignment using a word processor on a Windows computer. He wants to copy a section from an earlier
    8·1 answer
  • Javascript is an object-based programming language that involves working with the properties and methods associated with objects
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!