1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bagirrra123 [75]
3 years ago
9

Clarissa is a computer programming consultant. When a client states that they have an extremely complex programming task, which

of these programming approaches is Clarissa most likely to recommend?
Group of answer choices

converting from binary to decimal

creating algorithms

a top-down approach

a bottom-up approach
Computers and Technology
1 answer:
GuDViN [60]3 years ago
7 0
A bottom up approach because group of a set choices can’t be the answer
You might be interested in
Imported data that maintains a refreshable link to its external source is called ____ data.
olga2289 [7]
<span>Imported data that maintains a refreshable link to its external source is called Linked data.</span>
3 0
3 years ago
9. Government and corporate officials concerned about security threats do not bring their own cell phones or laptops when travel
tatuchka [14]

Answer:

True

Explanation:

It is known as Don-Not-Carry rules are implemmented to avoid

-Unauthorized full disk copies (it have been made while the laptop owner was out of the hotel room on overseas travel)

-Laptops steals

- Monitoring by third parties of wireless using.

3 0
3 years ago
Consider the following base and derived class declarations: class BaseClass { public: void BaseAlpha(); private: void BaseBeta()
Alina [70]

Answer:

a) Baseclass - baseField

DerivedClass - derivedField

b) BaseClass - baseField

DerivedClass - derivedField

c) BaseClass - BaseBeta(), BaseAlpha()

DerivedClass - BaseAlpha(), DerivedAlpha(), DerivedBeta()

d) BaseClass - BaseAlpha()

DerivedClass - BaseAlpha(), DerivedAlpha(), DerivedBeta()

Explanation:

a) Since, private members of a class cannot be inherited, that is why, DerivedClass has only one private data member.

b) Member function of a class can invoke private data variables of the class, so, they can refer to their private members on their own but DerivedClass has no access to BaseClass's private members.  

c) Every member function of a class can invoke every other member function of that class, but DerivedClass's member function cannot invoke BaseClass's private member functions.

d) Object of a class has no access to private members of a class, that is why they can invoke only public member functions of the class.

8 0
3 years ago
Choose the function described.
jasenka [17]

Answer:

clear

Explanation:

6 0
3 years ago
Read 2 more answers
In C++, objects instantiated on the stack must be returned to program memory through the explicit use of the delete keyword.
Lady_Fox [76]

Answer:

b. False.

Explanation:

Delete function not used to remove data stored on the stack. It is only used to free memory on the heap. The C++ is programming language used to develop operating systems.

8 0
3 years ago
Other questions:
  • Allows you to manually add an entry to the arp cache that resolves the ip address inetaddr to the physical address etheraddr. wh
    13·1 answer
  • A knowledge and skills test is a tool support managers use when selecting new employees; it measures an applicant's understandin
    13·1 answer
  • 5. If you are 16 to 20 years old, you are __________.
    14·1 answer
  • What is the mass of the light bulb? a. 425.6 g b. 204.6 g c. 240.56 g d. 245.6 g
    6·2 answers
  • A dedicated website was created where fans could post photos of the pages from decoded that they found. in the communication pro
    11·2 answers
  • What does the opacity effect do
    8·2 answers
  • What is the difference between a switch and a hub?
    8·1 answer
  • Which language paradigm interacts well with database systems in business environments that use SQL? (I WILL GIVE BRAINLIEST TO T
    11·1 answer
  • Read the following scenario:
    10·2 answers
  • Can anyone please give examples of pseudocode in programming? Thanks you very much!
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!