1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lora16 [44]
3 years ago
7

Match the context details with the pattern that applies.

Computers and Technology
1 answer:
tia_tia [17]3 years ago
6 0

Answer:

1. - Observer

2. - iterator

3. - strategy

4. - composite

5. - decorator

Explanation:

An object contains other objects (elements) and must give access to them for clients, without exposing its internal structure. This is an observation.

The subject-object can generate events as an iterable (iterator) and could use different strategic algorithms to achieve a task. Class objects can be used to aggregate other class objects.

In python, the decorator function mimics the outer function of a nested function, but still maintains the functionality of the second function

You might be interested in
What term identifies a blank screen or animation that automatically displays on a computer monitor after a specified period of i
Sveta_85 [38]
The answer is a screensaver
5 0
3 years ago
Important of microcomputer in some point​
Sedbober [7]

Answer:

A microcomputer uses memory to store the programs that control its operation, to store data waiting for processing, and to store the results of operations performed by the CPU. Primary memory, or storage, is electronic memory that is directly addressable by the CPU.

Explanation:

brainliest plzzzzzzz

8 0
3 years ago
Read 2 more answers
To nest one structure within another structure, you a. define both structures and then create a data member of the nested struct
Lubov Fominskaja [6]

Answer:

Hence the correct option is option a) define both structures and then create a data member of the nested structure type within the other structure.

Explanation:

To make Address nested to Employee, we've to define Address structure before and out of doors Employee structure and make an object of Address structure inside Employee structure.

For example, we may need to store the address of an entity employee in a structure.

5 0
3 years ago
What is a algorithm design ​
Mazyrski [523]

Answer:

Explanation:

Algorithm design is the branch of discrete mathematics and computer science that deals with the research, development and implementation of sequential and asynchronous algorithms. ... An algorithm is simply a sequence of instructions; a recipe is an algorithm, and so is a list of driving instructions.

6 0
4 years ago
Define the HTML tags needed to write CSS rule, inside of those HTML tags define a CSS rule using internal CSS requirements for c
Len [333]

You can use internal style definitions with the <style> tag:

<style>

body {

  color: red;

  font-style: italic;

  font-size: 12pt;

  font-family: Arial;

  font-weight: bold;

}

</style>

This gives you red italic text of 12pt using the Arial font.

7 0
3 years ago
Other questions:
  • Preserving confidentiality, integrity, and availability of data is a restatement of the concern over interruption, modification,
    15·1 answer
  • What is requirement analysis
    8·1 answer
  • Which of the following is the formula used to calculate the risk that remains after you apply controls? a. ALE=SLExARO b. Total
    9·1 answer
  • Twitter and facebook are both examples of the​ _____________ internet business model.
    7·1 answer
  • Write code that prompts for three integers, averages them, and prints the average. Make your code robust against invalid input;
    7·1 answer
  • Linux distributions automatically come with a native software firewall.TrueFalse
    13·1 answer
  • Which platform is dedicated to Customer Relationship Management (CRM)?
    7·1 answer
  • What is the purpose of including comments in code?
    15·1 answer
  • A user can view <br> and <br> in the Reading pane.
    9·1 answer
  • Pieter is a network administrator for a growing company and has decided to implement Kerberos. He knows that Kerberos uses a tic
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!