1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Whitepunk [10]
2 years ago
12

What is the key difference between a class and an object

Computers and Technology
1 answer:
Anna35 [415]2 years ago
8 0

Answer:

<em>Class is a blueprint or template from which objects are created. Object is a real world entity such as pen, laptop, mobile, bed, keyboard, mouse, chair etc. Class is a group of similar objects. Object is a physical entity.</em>

You might be interested in
PLEASE HELP! I accidently looked up a link, and now this same link keeps popping up everywhere, how do I stop this!?!? please he
Black_prince [1.1K]

Answer:

Try restarting your phone

Explanation:

8 0
2 years ago
Read 2 more answers
Write a program that reads in 10 numbers from the user and stores them in a 1D array of size 10. Then, write BubbleSort to sort
Diano4ka-milaya [45]

Answer:

The solution is provided in the explanation section.

Detailed explanation is provided using comments within the code

Explanation:

import java.util.*;

public class Main {

//The Bubble sort method

public static void bb_Sort(int[] arr) {  

   int n = 10; //Length of array  

   int temp = 0; // create a temporal variable  

   for(int i=0; i < n; i++){  

         for(int j=1; j < (n-i); j++){  

           if(arr[j-1] > arr[j]){  

               // The bubble sort algorithm swaps elements  

               temp = arr[j-1];  

               arr[j-1] = arr[j];  

               arr[j] = temp;  

             }  

         }            

         }  

        }

 public static void main(String[] args) {

   //declaring the array of integers

   int [] array = new int[10];

   //Prompt user to add elements into the array

   Scanner in = new Scanner(System.in);

   //Use for loop to receive all 10 elements

   for(int i = 0; i<array.length; i++){

     System.out.println("Enter the next array Element");

     array[i] = in.nextInt();

   }

   //Print the array elements before bubble sort

   System.out.println("The Array before bubble sort");

   System.out.println(Arrays.toString(array));

   //Call bubble sort method

   bb_Sort(array);  

               

   System.out.println("Array After Bubble Sort");  

   System.out.println(Arrays.toString(array));

 }

}

8 0
3 years ago
Which of the following is an example of phishing attack? csp
TEA [102]
There are no examples you imbecile it’s A
4 0
3 years ago
How to connect apple pencil 2 to ipad 8th generation?
stepladder [879]

Answer:

That pencil doesn't adjust to that ipad because those two aren't compatible

Explanation:

5 0
2 years ago
Imagine that you are preparing a multimedia presentation. What are the four things you need to consider when getting started?
Marrrta [24]

Explanation:

Consider the Content

Create an Outline

Develop Your Presentation

PRACTICE!!

8 0
3 years ago
Read 2 more answers
Other questions:
  • A disk rotates at a rate of 7200 revolutions per minute. Seek operations (i.e., moving the access head to a desired track) take
    6·1 answer
  • What OS has a large market share but is limited because it can be installed only on one particular brand?
    8·2 answers
  • Every character is represented by a code. The ASCII code for upper letter A is 65 and for lower a is 97. Similarly the numeric c
    9·1 answer
  • What is the name of the program file that you can enter in the Windows search or Run box to execute Event Viewer? What process i
    12·1 answer
  • What is one of the most effective security tools available for protecting users from external threats?
    15·1 answer
  • Which of the following are not parts of a message? Select all that apply.
    12·1 answer
  • How does the Rights Management Services feature help to protect information
    11·1 answer
  • highlight the possible risks and problems that should be address during the implementation of information system process
    5·1 answer
  • Discuss seven multimedia keys​
    8·1 answer
  • Can an SQL function return multiple values? No answer needed, take the points.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!