1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lora16 [44]
3 years ago
7

Match the context details with the pattern that applies.

Computers and Technology
1 answer:
tia_tia [17]3 years ago
6 0

Answer:

1. - Observer

2. - iterator

3. - strategy

4. - composite

5. - decorator

Explanation:

An object contains other objects (elements) and must give access to them for clients, without exposing its internal structure. This is an observation.

The subject-object can generate events as an iterable (iterator) and could use different strategic algorithms to achieve a task. Class objects can be used to aggregate other class objects.

In python, the decorator function mimics the outer function of a nested function, but still maintains the functionality of the second function

You might be interested in
What are technology trends in science check all that apply
Doss [256]

Answer:

3D Printing Molecules.

Adaptive Assurance of Autonomous Systems.

Neuromorphic Computing (new types of hardware) and Biomimetic AI.

Limits of Quantum Computing: Decoherence and use of Machine Learning.

Ethically Trustworthy AI & Anonymous Analytics.

Explanation:

6 0
3 years ago
The code size of 2-address instruction is________________.? 5 bytes? 7 bytes? 3 bytes? 2 bytes
Finger [1]

Answer:

7 bytes

Explanation:

<u>2 Address Instruction</u>

The 2 address instruction consist 3 components in the format.

One is opcode,other two are addresses of destination and source.

<u>Example-</u>

load b,c | Opcode   destination address,source address

add a,d  | Opcode   destination address,source address

sub c,f    | Opcode   destination address,source address

Opcode consists of 1 bytes whereas destination address and source address consist of 3 bytes each.

(1+3+3) bytes=7 bytes

5 0
3 years ago
What are three distractions that can prevent a driver from focusing on driving? Explain how a driver can prevent these distracti
DIA [1.3K]

Phone- turn it off

loud music - keep it turned down to a reasonable volume (cause you could start singing and get distracted)

other cars on the road - keep your eyes looking forward.

hope this helps.

8 0
3 years ago
Help please brainliest
V125BC [204]

Number one is x-axis.

3 0
3 years ago
Why do you think that backlighting is used in so much of Sheldon’s photography?
Marianna [84]

Answer:

So you see the person better

Explanation:

4 0
4 years ago
Read 2 more answers
Other questions:
  • True or False? In cloud computing, the term "Measured service" refers to a billing model in which gaining access to resources do
    12·1 answer
  • An example of software most commonly associated with productivity software is ____.
    12·1 answer
  • How would a static local variable be useful?
    5·1 answer
  • Hailey is preparing a questionnaire on the different number systems. He asks the students to write down the correct decimal and
    7·2 answers
  • The UNIX operating system started the concept of socket which also came with a set of programming application programming interf
    12·1 answer
  • The Domain Name Service is what translates human-readable domain names into IP addresses that computers and routers understandA.
    11·1 answer
  • You share a number of files from your computer, and you've received a number of calls from users who say they can't connect to t
    5·1 answer
  • Arrange these steps of creating a presentation in the correct order.
    15·2 answers
  • Write a function named word_count that accepts a string as its parameter and returns the number of words in the string. A word i
    10·1 answer
  • A major way the National Information Infrastructure Protection Act of 1996 amended the Computer Fraud and Abuse Act was the subs
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!