1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
emmainna [20.7K]
3 years ago
8

Jeremy is working with a team that is creating an application using attributes and associated methods. What type of programming

language are they using?
logic-based languages
visual programming languages
functional languages
object-oriented programming languages
Computers and Technology
1 answer:
Ugo [173]3 years ago
8 0
<span>object-oriented programming languages</span>
You might be interested in
HELP PLEASE!!!! Which development method is best explained in this way: developing a system through repeated cycles and smaller
vlada-n [284]

Answer:

Incremental method.

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

An incremental model refers to the process in which the requirements or criteria of the software development is divided into many standalone modules until the program is completed.

Hence, an incremental method typically involves developing a system through repeated cycles and smaller portions at a time, enhancing and evolving the system over time.

In SDLC, a waterfall model can be defined as a process which involves sequentially breaking the software development into linear phases. Thus, the development phase takes a downward flow like a waterfall and as such each phase must be completed before starting another without any overlap in the process.

Also, a spiral model can be defined as an evolutionary SDLC that is risk-driven in nature and typically comprises of both an iterative and a waterfall model. Spiral model of SDLC consist of these phases; planning, risk analysis, engineering and evaluation.

8 0
3 years ago
How serious are the risks to your computer security?
ASHA 777 [7]

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

<h3>What are the risk results for information and computer security?</h3>

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

brainly.com/question/12010892

#SPJ1

6 0
2 years ago
Which of the following should get a didn't load flag? Select all that apply
Elza [17]
I think it is c a completely blank page but I’m not 100% on it though
3 0
3 years ago
true or false:for most queries, the user location changes our understanding of the query and user intent.
Juli2301 [7.4K]
The answer is True. Depending on where the user is located may have affect on the Query. 
7 0
3 years ago
Read 2 more answers
Which of the following is the correct procedure for adding a design theme to a PowerPoint presentation ?
Eva8 [605]

Answer:

B. Design > Theme > choose a theme

Explanation:

-Applying themes-

  • Select the Design tab on the Ribbon, then locate the Themes group. Each image represents a theme.
  • Click the More drop-down arrow to see all available themes.
  • Select the desired theme.
  • The theme will be applied to the entire presentation. To apply a different theme, simply select it from the Design tab.
6 0
2 years ago
Other questions:
  • Explain how buyers and sellers factor into setting the stock price for a company’s shares.
    13·1 answer
  • Which is the most important reason you should properly cite information that you obtain from an Internet search? Question 2 opti
    8·1 answer
  • A variable must have its type declared but it is not required to be initialized prior to first use.
    12·1 answer
  • Which best describe a resource each student could use to find information
    6·2 answers
  • What are barcode and rfid tags ​
    11·2 answers
  • . Suppose that name is a variable of type string. Write the input statement to read and store the input Brenda Clinton in name
    5·1 answer
  • You have to display or connect to network shares on remote computers. Which command-line utility will you use to accomplish the
    10·1 answer
  • Explain the impacts of computer in education
    6·2 answers
  • Which is government departments fund the Global Positioning System
    6·1 answer
  • Task 2
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!