1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lyudmila [28]
2 years ago
14

Cleo is new to object oriented programming. which type of action can be taken on on object?

Computers and Technology
2 answers:
Mrac [35]2 years ago
6 0
I’m sure it is method
pickupchik [31]2 years ago
4 0

Answer:

method

Explanation:

You might be interested in
What type of font color should Kim select if she chooses a dark-colored design theme for her presentation?
Gnesinka [82]

ANSWER: Kim has chosen a dark-colored design theme for her presentation. She should therefore choose <u>a bright </u> font color that will <u>contrast with  </u>the background color.

5 0
3 years ago
Read 2 more answers
The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system.
navik [9.2K]

Answer:

False

Explanation:

The Security Development Life Cycle (SDLC), is a software development which involves traditional approach towards its design such as, waterfall model, Agile, etc.

It can either be referred to as a generic secure development life cycle or a specific one, such as the Microsoft SDL or the Cisco SDL.

Its phases includes,

A1 - Security Assessment

A2 - Architecture

A3 - Design and Development 1

A4 - Design and Development 2

A5 - Ship

PRSA - Post Release

Each phase talks about how a secured software is developed.

The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system. This statement is false because by definition and attributes Security Development Life Cycle is a traditional approach towards software development and not a general method.

6 0
3 years ago
Items that are cut or copied are placed on the Clipboard.
WINSTONCH [101]

Anwer is <u>True</u>

please mark me brainliest answer

7 0
3 years ago
Read 2 more answers
What should you do when you are working on an unclassified system and receive an email.
koban [17]

Answer:

Don't respond to it. Either leave it there, or just delete it. It is most likely spam or a scammer trying to get your information. Don't respond, please.

3 0
2 years ago
Industry experts estimate about what percentage of communication is through body language?
OverLord2011 [107]
Communication is only 7 percent verbal and 93 percent non-verbal. The non-verbal component was made up of body language (55 percent) and tone of voice (38 percent).
This is what one of my teacher told me but I’m not 100% sure it’s right
7 0
2 years ago
Read 2 more answers
Other questions:
  • Assume the following variable definitions int a = 5, b = 12; double x = 3.4, z = 9.1. What are the values of the following expre
    7·1 answer
  • Which of these is a subdirectory? <br> HTTPS <br> /FAQ <br> .org <br> WWW
    15·1 answer
  • Need help answering this
    7·1 answer
  • Suppose we provide a new implementation of the transport layer protocol tcp providing the same functionality using different alg
    14·1 answer
  • Smart art can be used to create _____that highlights relationships betweeen two items
    8·2 answers
  • Select the correct answer
    11·2 answers
  • Design a class called NumDays. The class’s purpose is to store a value that represents a number of work hours and convert it to
    12·1 answer
  • 7.) Title text boxes on every slide must be the same format. <br> A. True <br> B. False
    15·2 answers
  • Why optical disk is slower than magnetic disk.?​
    9·2 answers
  • What is draft pls help me​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!