1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
densk [106]
3 years ago
9

In Object layer, if we will create more Objects, then design will be more efficient and scalable because

Computers and Technology
1 answer:
Ber [7]3 years ago
4 0

Answer:

More developers can work concurrently.

Explanation:

Given that having a lesser object in program designing can make the process cumbersome. The idea of having more objects or breaking down application functionalities into various objects in a virtual workforce tool like Blue Prism, UiPath RPA, Pega Platform, etc can only increase the efficiency.

Hence, In the Object layer, if we will create more Objects, then the design will be more efficient and scalable because "More developers can work concurrently."

You might be interested in
Declare a variable named
zlopas [31]

The declared variable name populationChange suitable for holding numbers like  -593142 and 8930522 is as follows:

populationChange = -593142

populationChange = 8930522

<h3>Variable:</h3>

Variable are containers use for storing values of different datatypes. Python variable can be use to store various datatype without indicating the datatype. The variable can be used to store float, string, integer etc.

For example

myVariable = 345

The variable named populationChange that holds numbers like -593142 and 8930522 can be declared as follows;

populationChange = -593142

populationChange = 8930522

Note the code is written in python

learn more on python variable here: brainly.com/question/21335728

3 0
2 years ago
Alice's public key, and sends back the number R encrypted with his private key. Alice decrypts the message and verifies that the
Agata [3.3K]

There are different kinds of keys. The identities of Alice and Bob are verified in this protocol.

<h3>What is public and private key in SSL?</h3>

These keys are known to be a kind of related pair of text files and they are often made together as a pair if one makes their Certificate Signing Request (CSR).

Note that the private key is different file that is often used in the encryption/decryption of data so as to sent a file between one's server and the connecting clients.

Learn more about  public/private key from

brainly.com/question/8782374

3 0
2 years ago
Select the correct answer.
lisov135 [29]

Answer:

D. Prepare the content

Explanation:

Before Jennifer starts designing the website she has to prepare content for the website

5 0
3 years ago
Read 2 more answers
Answer for 5,6,7 any one know plz
katrin2010 [14]

Answer:

first question option is d

second is false

third is mark

Explanation:

5-The following are generic font

  • serif
  • sans-serif
  • cursive
  • fantasy
  • monospace

6 - We can change image size using height and width. so it is false.

7 - we can highlight text using <mark> Marked text </mark>

5 0
3 years ago
Write some general rules used while chatting​
Tpy6a [65]

Answer:

Well,

Explanation:

Well, this topic is a very broad one and I'm not exactly sure what kind of information you' like provided, but I got a few ideas in mind.

While chatting online, a big letdown for most people is if you curse and especially if you do it excsessivley. Doing so will make you seem toxic and most people would just try to avoid you.

Talking about toxicity, being a toxic person online is petty and quite pathetic. Gloating and raising your ego won't make you any more of a liekable person online, or even in the real world.

Last but not least, another general rule of online chatting is to make sure you know who you're talking too. Talking to strangers online can be very dangerous, in some cases leading to things like pedophilia etc.

3 0
3 years ago
Other questions:
  • Hi guys
    12·1 answer
  • In ethical hacking testing, what approaches exist for the ethical hacker to choose from depending on how much information is kno
    10·2 answers
  • If you were going to construct a table that only included shape names with number prefixes, which shape would you include
    11·1 answer
  • Create a class Str that subclasses str. Add a method to the subclass that checks if the string does not start with a given strin
    15·1 answer
  • Was the type writer the first part of the keyboard? ​
    8·1 answer
  • The "Rudolph Rule" is best described by which of the following?
    9·1 answer
  • John have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the da
    14·2 answers
  • Can you help me in this question
    13·1 answer
  • Which country has the most common features of analogue and digital computer​
    6·1 answer
  • 1. What have you understood about the do's and don'ts inside the computer lab?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!