1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
expeople1 [14]
2 years ago
12

There is an interface I that has abstract class AC as its subclass. Class C inherits AC. We know that C delegates to an object o

f D to perform some computations. Besides, C consists of two C1s and one C2 as subcomponents. Object of C2 is still reusable when its major component C is depleted. C1 has a method that takes in an object of E as argument. Which one is invalid
Computers and Technology
1 answer:
Aloiza [94]2 years ago
6 0

Answer:

are u in HS or college work

I am trying to understand

You might be interested in
Rob used Track Changes to suggest changes in Jack's document. Jack agrees with some edits and disagrees with others. What should
Kamila [148]

Answer:

B.   Click the Next icon on the Reviewing toolbar to review and then accept or reject each edit.

Explanation:

Since Jack wants to keep some changes and reject others, he can't use  a global solution (like presented in answers A and C).

He has to go through each and every change proposition and decide individually if he wants to keep the change or not.  That's why it's answer B.

It's the only way to accept some, reject some.  

At the end of this process, he'll have a clean document with Rob's recommendations and his original documents.

3 0
3 years ago
NAT ________. allows a firm to have more internal IP addresses provides some security both allows a firm to have more internal I
algol13

Answer:

NAT provides some security but allows a firm to have more internal IP addresses

Explanation:

NAT ( network address translation) this is a process where a  network system usually a firewall  assigns a public IP address to an internal computer used in a private network. it limits the number of public IP address a company operating a private network for its computer can have and this is very economical also limits the exposure of the company's private network of computers. the computers can access information within the private network using multiple IP addresses but it is safer to access external information using one public IP address

5 0
3 years ago
Isa wants to find out if his co-worker Alexis is available for an event on Wednesday, February 10th. Which calendar
Elena-2011 [213]
Appoint view
Hope this helps
7 0
3 years ago
Write the issue related to the cyber ethnic. ​
Ivenika [448]

people may hack our person information.

7 0
3 years ago
Read 2 more answers
An operation that obliterates data in disk files and folders by repeatedly writing random bit patterns on disk media is called a
mixas84 [53]

Answer:

Secure erase.

Explanation:

A procedure which eliminates information within drive directories through continuously composing irregular bits variations on disk media is referred to as a Secure erase process.

Secure Erase seems to be the term assigned towards the series of instructions on PATA as well as SATA based hard disks that are accessible from those in the framework. The following commands are required to fully overwrite both information on such disk as a form of information cleanup.

8 0
3 years ago
Other questions:
  • What does FTP stand for?
    15·2 answers
  • What data discovery process, whereby objects are categorized into predetermined groups, is used in text mining?
    12·1 answer
  • OSHA standards appear in the ___________ and are then broken down into ____________.
    9·1 answer
  • What is the difference between word processing software and email?
    12·2 answers
  • Question 21 pts How many lines should an email signature be? Group of answer choices "5 to 6" "7 to 8" "1 to 2" "3 to 4"
    10·1 answer
  • When a hoverboard's battery dies, does the hoverboard battery life get impacted the next time the battery is full?
    12·1 answer
  • Use the drop-down menus to complete the statements about printing Contacts. When printing a single contact, go to File and then
    15·1 answer
  • Explain two ways by which the calendar meets or fails to meet the criteria of showing the correct data
    7·1 answer
  • 9. Which of the following is the<br>leading use of computer?​
    13·1 answer
  • What is the difference between auto fill and fill handle ?​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!