1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka2103 [35]
3 years ago
7

When defining a class, it is a best practice to declare ____ as private. constructors mutators nothing should be private accesso

rs variables
Computers and Technology
1 answer:
katrin [286]3 years ago
6 0

Answer:

The answer is "variables".

Explanation:

It is necessary to declare a variable privately when declaring a class because the private variable 'protects' the code while it is in operation. It may not aim to protect it at this stage from changing the codes themselves for other developers. Its purpose of the so-called "data hiding" is to hold the internal data from many other classes using the class protected.

You might be interested in
Mike wants to build an amplifier. Which technology can he use?
RSB [31]

Answer: The component that is used for most amplifiers is the transistor. Semiconductors like gold,copper etc. are used although poor semiconductors like silicon are sometimes used as well. There are many electronic circuits that all under the amplifier category. The classification of an amplifier depends on the size of the signal and configuration.

8 0
3 years ago
Which of the instances below is an example of a Trojan horse? Question 2 options: a) An attachment in an email that is really a
sergij07 [2.7K]

Game-theif Trojans is the malware that makes a backdoor into your email account by which you are playing a game or has downloaded it and thus by this all information of user is exposed.

So option D is the answer.

Option A cannot be answer because Trojan does not use files for its purpose.

Option B cannot be a good option because Trojan works in online could.

Option C cannot be a option because Trojan does not need executable to attack your account.

3 0
3 years ago
Read 2 more answers
HEEELLPPPPP, ILL GIVE THE BRAIN THING
sladkih [1.3K]
Can you explain more please??!
5 0
3 years ago
Given that a function receives three parameters a, b, c, of type double, write some code, to be included as part of the function
MA_775_DIABLO [31]

Answer:

if ((b*b - 4*a*c)<0)

    cout << "no real solutions";

return;

Explanation:

To check if "b squared" – 4ac is negative, we use the expression  if ((b*b - 4*a*c)<0). This expression evaluates the 'bsquared' and substracts '4ac' from it. It then compares the resulting value with zero. if it is less than zero it means it is a negative number, so it executes the statement following cout << "no real solutions"; and returns

8 0
3 years ago
What is the output of the following code: ​ for (loop = 1; loop &lt;3; ++loop) System.out.print(1); for (loop2 = 1; loop2&lt;3;
Mama L [17]

Answer:

The output of the given code as follows:

<u>Output: </u>

1122

Explanation:

In the given java code the two for loop is defined, which can be described as follows:

  • In the first loop, a"loop" variable is used, which starts from 1 and ends when the value of loop is less than 3, inside the loop a print function is used, that print value 1.
  • In the next step, another for loop is declared, inside the loop a variable "loop2" variable is used, that's working is the same as the above loop, but in this loop, it will print a value, that is 2.
7 0
3 years ago
Other questions:
  • SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and
    12·1 answer
  • Dolphin Tecx is a new tech company that just issued smart watches to its
    9·1 answer
  • Who gave a demonstration of modern computer systems showing a mouse and when?
    8·1 answer
  • Asking yourself questions can help you think of what to _____, in order to get answers.
    8·1 answer
  • What is the best strategy to avoid paying interest on your credit card
    8·1 answer
  • When completing an application what color ink do you use
    8·2 answers
  • A company gives you a document to review. This document lays out the strengths and weaknesses of a proposed business venture. It
    13·1 answer
  • A customer seeks to buy a new computer for a private use at home.The customer primarily needs the computer to use the Microsoft
    8·1 answer
  • Need answer ASAP!!!!
    7·1 answer
  • . . ........Sad + sad= very sad
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!