1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garri49 [273]
3 years ago
5

In this program, you will create an object and display it. Create a class nerf Gun that includes data members model (string), ra

nge(int), capacity (int), and number of darts (int). Your class should have a constructor with three parameters (assume the toy is fully loaded when created). Assume that model and range is correct, but check to make sure capacity is <= 144. Provide a member function getModel(), get Capacity(), getupDateCount(), fire() and reload(quantity). The method fire() reduces the number of darts.The method reload(quantity) should increase the number of darts by the quantity provided but must ensure the number of darts do not exceed the toy’s capacity .
Computers and Technology
1 answer:
Ludmilka [50]3 years ago
5 0

Answer:

Range: 100 feet (unlimited with aimbot)

Capacity:50 rounds(unlimited with never ending clip modifier)

Members/Creators: Joe, Yura, Moe, Mike, and Hugh

Reload Time. .69 seconds

Explanation:

You might be interested in
Use blank to prevent friends who have been drinking from driving
GrogVix [38]
Use persuasion, meaning persuade them to stop
5 0
3 years ago
Read 2 more answers
2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
avanturin [10]

Answer:

A. Spoofing

Explanation:

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

IP spoofing involves an attacker trying to gain unauthorised access to a system by sending messages with a fake or "spoofed" IP address to make it look like the message came from a trusted source, such as one on the same internal computer network, for example.

Email spoofing often involves things like requests for personal data or financial transactions. The emails appear to be from trusted senders such as customers, coworkers, or managers but they are actually from cyber criminals who deliberately disguise themselves to gain your trust and your help with the action they want you to take

7 0
3 years ago
"Different links can transmit data at different rates, with the _______ of a link measured in bits/second"
murzikaleks [220]

Answer: Transmission rate

Explanation:

 Transmission rate is measured in bits per second and it transmitted the data at the different rate across the circuit. The speed in which the data rate is transferred from one device to anther is known as transmission rate.

The transmission rate are always less as compared to signalling rate because the signalling rate contain the total data which basically include the overhead to control the information.

Therefore, transmission rate is the correct option.

 

7 0
3 years ago
When you build a computer from parts, you usually start by deciding on which processor and motherboard you will use?
loris [4]
The thing to look for is compatible RAM, Processor and motherboard. Then I would choose my graphics card, hard drive, etc.
3 0
3 years ago
Keep true , never be ashamed of doing right decide on what you think is right and stick to it.
Doss [256]
This is the quote of T.S. Eilot
5 0
3 years ago
Other questions:
  • You know a Linux command will perform a desired function for you, but you cannot remember the full name of the command. You do r
    14·1 answer
  • Which type of network cover a large geographical area and usually consists of several smaller networks, which might use differen
    5·1 answer
  • Which of the following terms means that the system changes based on
    14·1 answer
  • The work principle is not always true<br> T or F
    11·2 answers
  • What is meant by polling mode in communication between software andUART and what is its disadvantage as compared to interrupt mo
    14·1 answer
  • TRUE OR FALSE! HELP!!
    13·1 answer
  • In chapter 11, we finally learn how the book got its title. What is the sign of the beaver? Is that what you expected when you r
    13·1 answer
  • What is adobe photoshop?
    10·2 answers
  • What is the code i need to do
    12·1 answer
  • What are the pros and cons of being a single decision maker
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!