1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
coldgirl [10]
3 years ago
11

suppose as a head software engineer you assign the job of creating a class to a subordinate. You want to specify thirty-eight di

fferent methods in which you are willing to detail the parameters each is to receive as well as what each returns. You, however, do not have the time to create the details of each method and wish to assign that work to the subordinate. What would be your best approach to ensure that the subordinate finishes the assigned job.
Computers and Technology
1 answer:
Goryan [66]3 years ago
8 0

Answer:

jskjsjsjsjskdmsnjsnsnsns

You might be interested in
Which word in brackets is most opposite to the word in capitals? PROSCRIBE (allow, stifle, promote, verify)​
Sunny_sXe [5.5K]

the answer would be stifle

7 0
3 years ago
Read 2 more answers
HELP ASAP
saw5 [17]

When associating an event handler with a button click which event occurs  the user hits the right mouse button, the outcome, if any, is That hurt.

How can the result be established?

The flow of the programme indicates that:

When the user presses the button, the application prints "That hurt" without any quotation marks.

This operation may be found in the third line of the programme.

Therefore, the outcome is (b) That hurt if the user clicks the right mouse button.

Details on the programme are available at:

brainly.com/question/16397886

#SPJ4

7 0
1 year ago
Read 2 more answers
____ are programs that run independently and travel between computers and across networks.
fiasKO [112]
<span>Worms are programs that run independently and travel between computers and across networks.
</span>Those are malicious programs which are exploiting operating system vulnerabilities and by doing so they spread itself. They <span>self-replicate on computers or via computer networks without the user being aware.</span>
3 0
3 years ago
manufacturers are making an effort to build energy-efficient computers and use recyclable cases and packaging true or false
Fittoniya [83]
True would be ur answer

Hope I helped:P
7 0
3 years ago
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
Wewaii [24]

Answer:

B. Malware

Explanation:

Malware is general to most harmful programs on a computer, as Adware is a potentially unwanted program that is designed to advertise other programs or services. And ransomware is a program that will encrypt important user files such as; documents, pictures, and videos. Spyware is a program that is designed to spy on users, examples are; using your camera without your consent, key-loggers, and taking screenshots of our desktop. Thus i believe it is malware because the question covers multiple categories.

6 0
3 years ago
Other questions:
  • A ____ can interpret physical addressing information.
    11·1 answer
  • What is a way to Procter your social security number and other sensitive information from identity theft
    9·1 answer
  • (Game Design) A float is a blank space, used as a placeholder in an array<br><br> True or false
    13·1 answer
  • When should students practice netiquette in an online course?
    9·1 answer
  • Dayla is concerned about managing her digital footprint. What does she mean by this? *
    7·1 answer
  • What symbol indicates that material has been copyrighted?
    8·2 answers
  • The average American has 10 devices, ask for users average number of devices. Any number between 7 and 12 will print “you have a
    13·1 answer
  • A health care provider approaches Accenture to help them increase their efficiency through an advanced data science platform.Wha
    8·1 answer
  • Michelle has defined a custom object by creating an object literal. She wants to access the properties of the custom object. Mic
    10·1 answer
  • Desktop computers have a(n) ________ unit, located within the system unit, that plugs into a standard wall outlet, converts AC t
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!