1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka2103 [35]
3 years ago
7

When defining a class, it is a best practice to declare ____ as private. constructors mutators nothing should be private accesso

rs variables
Computers and Technology
1 answer:
katrin [286]3 years ago
6 0

Answer:

The answer is "variables".

Explanation:

It is necessary to declare a variable privately when declaring a class because the private variable 'protects' the code while it is in operation. It may not aim to protect it at this stage from changing the codes themselves for other developers. Its purpose of the so-called "data hiding" is to hold the internal data from many other classes using the class protected.

You might be interested in
Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
lord [1]

Answer:

In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.

3 0
3 years ago
When computers are connected and operate through one main computer, it is called a _________ network
adoni [48]
It might be a LAN or Host network. I'm not sure about your question, but your answer might reside in your notes for this class. 
6 0
3 years ago
Read 2 more answers
5.4.6: Rolling Dice code
ziro4ka [17]
It is 15 all together
4 0
3 years ago
Consider the following JavaScript program:
dem82 [27]

Answer:

Variable       Where Declared

In Sub1 :

        A        Sub1

        Y        Sub1

        Z        Sub1

        X        Main

In Sub2:

        A        Sub2

        B        Sub2

        Z        Sub2

        Y        Sub1

        X        Main

In Sub3 :

        A        Sub3

        X        Sub3

        W       Sub3

        Y        Main

        Z        Main

Explanation:

In static-scoped languages with nested subprograms, the declaration of a variable is checked with the subprogram, if it is not found, it check within the parent method that called it, it continue until it find a declaration, if no declaration is found, it display an error.

In Sub1, a, y, z is declared there while the declaration of x is found in main.

In Sub2, a, b, z is declared, declaration of y is found in sub1 and declaration of x is found in main.

In Sub3, a, x, w is declared while the declaration of y, z is from the main.

7 0
3 years ago
what will the total power dissipated in the circuit shown in the figure above if M1 has a current reading of 0.04 A.?​
OlgaM077 [116]

Answer:

P=0.24\ W

Explanation:

<u>DC Circuit</u>

The DC circuit shown it the figure has a power source (battery), some resistors, switches and voltage and current meters. The switch S1 is open, so the right branch of the circuit is neglected. Assuming all meters are ideal (no resistive losses), we have a simple series circuit made of resistors R2 and R3.

We are required to compute the total power dissipated in the circuit, which corresponds to the total power delivered by the voltage source.

The power source of V= 6V is delivering a current in the series circuit equal to the current through R1 and R3. That current is the same as that read by M1 known to be I=0.04 A

The power delivered by the source is

P=V.I=6\ V\cdot 0.04\ A

\boxed{P=0.24\ W}

4 0
3 years ago
Other questions:
  • Write an expression that evaluates to 1 more than the value in the location pointed to by the integer pointer variable ip. Thus,
    8·1 answer
  • What inventor patented the first American movie projector?
    14·2 answers
  • What would you NOT use a router for? *
    11·1 answer
  • Which does the histogram resemble the most?
    10·1 answer
  • Which of these is the most likely result if the internet download speed in your home is 25 Mbps?
    14·1 answer
  • I know how to design it but I’m confused as to how to write a function code based on the info provided.
    10·1 answer
  • Does anyone know a way to skip the videos on Edgnuity?
    15·1 answer
  • Samantha is in the beginning stages of OOP program development. What are the five steps she must follow for creating an OOP prog
    6·2 answers
  • Identify what algorithm or concept the following code relates to. void Sort(int array[], int tempArray[], int left, int right) {
    6·1 answer
  • The view that perceptual processes take place over time and can be thought of in terms of a software/hardware metaphor is known
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!