1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
coldgirl [10]
3 years ago
11

suppose as a head software engineer you assign the job of creating a class to a subordinate. You want to specify thirty-eight di

fferent methods in which you are willing to detail the parameters each is to receive as well as what each returns. You, however, do not have the time to create the details of each method and wish to assign that work to the subordinate. What would be your best approach to ensure that the subordinate finishes the assigned job.
Computers and Technology
1 answer:
Goryan [66]3 years ago
8 0

Answer:

jskjsjsjsjskdmsnjsnsnsns

You might be interested in
Each JavaScript command line ends with a(n) ____ to separate it from the next command line in the program.
kykrilka [37]
The answer is :
semicolon (;)
8 0
2 years ago
The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed
Zepler [3.9K]

Answer:

b. Customized auditing.

Explanation:

Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.

There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.

The credentialed scanning provides baseline and customised auditing features.

3 0
3 years ago
Read 2 more answers
Which of the following hacker attacks against wireless networks are virtually undetectable?
Ede4ka [16]

Answer: A. passive attacks

Explanation:

Passive attack is a type of attack where by a system is tracked and scanned to determine how vulnerable it is and to also detect open port. The major purpose of a passive attack on a network is to gain access to the information of the target without altering the data.

A passive attack on a network may not be necessarily malicious, it is a type of network attack that is very difficult to detect.

Methods of carrying out passive attacks.

•War driving: scanning of networks is carried out to detect Wi-Fi that are vulnerable.

•Dumpster driving: Attackers or intruders search for information from discarded computers and

other gadgets, those information can help to attack a network.

7 0
3 years ago
The FCFS algorithm is particularly troublesome for ____________.
Nina [5.8K]

Answer:

The correct option is (b) multiprogramming systems

The best I can explain: In a time sharing system, each user needs to get a share of the.... at regular intervals.

Explanation:

Don't forget to follow me thanks

8 0
2 years ago
Describe the user interface in other high-technology devices commonly found in the home or office, such as a smartphone, HD tele
Vadim26 [7]

Answer:

Explanation:

Different technologies use different user interface designs in order to make the user experience as easy and intuitive as possible. This varies drastically from one device to another because of the capabilities and size of each device. If we take a fitness/smart watch into consideration, this device does not use pop up menus or side scrolling menus but instead uses large full screen menus where each option nearly fills the entire screen. That is done because the smart watch screens are very small and making everything full screen makes reading and swiping through options that much easier for the user. If the user interface were the same as in a television or smartphone it would be impossible to navigate through the different options on such a tiny screen.

7 0
3 years ago
Other questions:
  • The _____ command icon looks like a small clipboard with a page attached.
    6·1 answer
  • The mac group does not replace the primary functions of eocs or other dispatch organizations. True or False
    8·1 answer
  • What percent of the internet is the deep web?
    14·1 answer
  • A bluetooth network consists of _____ primary device(s) and up to ____ secondary devices.
    8·1 answer
  • Write the algorithm and draw a flowchart to display the greatest number among any two different numbers....
    5·1 answer
  • Example of negative body language include all but
    8·1 answer
  • A-1 grdening supply is preparing a reprt to hand out to the customerez in pointes form only.why should the reprts writers avoid
    9·2 answers
  • So im new how exactly does this point system work???​
    6·1 answer
  • What is the value of x after running this code?
    13·2 answers
  • You have a filtered dataset for Customer Sales with some null value rows. You want to remove these rows completely. How will you
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!