1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadusha1986 [10]
2 years ago
13

When a derived class method has the same name as a base class method, it is often said that the derived class method ________ th

e base class method.
Computers and Technology
1 answer:
Arisa [49]2 years ago
6 0

Answer:

will be

Explanation:

I'm not quite sure but I think that this is the answer for your question

You might be interested in
What are the 2 types of Digital Imagery?
Darina [25.2K]

Answer:

vector or raster

Explanation:

7 0
3 years ago
How to type the plus sign +
zmey [24]

Answer:

you just did it. its on da keyboard

Explanation:

hold shift and click the equal sign

Shift + = = +

7 0
2 years ago
Read 2 more answers
Using the Web or another research tool, search for alternative means of defending against either general DoS attacks or a partic
Thepotemich [5.8K]

Answer and Explanation:

DOS attacks refer to Denial of Service attack. It is a sort of digital attack where a programmer hacks the system of a framework and makes it inaccessible for the clients which results in intruding on the internet providers of the machine.  

At the end of the day, access to online administrations is denied for the client. Any sort of system administration can be upset by DOS assaults be it either bank site or an online business site.

Following is one of the defense techniques against DOS attacks:

Using Routers and Firewalls - As switches have rate constraining and access control capacities, so they can be set up in a legitimate manner to stop basic ping assaults by permeating unessential conventions and can likewise stop invalid IP addresses. In any case, the main hindrance for utilizing switches is that they are usually ineffective against an increasingly advanced parodied assault and application-level assaults utilizing substantial IP addresses. Presently here comes the job of firewalls. Firewalls can ensure the system by dismissing all the traffic landing from aggressor's end. This insurance by firewalls depends on basic principles dependent on conventions, ports or the starting IP addresses.  

Be that as it may, it is difficult to hinder some mind boggling assaults by these straightforward standards. For instance, if there is a progressing assault on port 80 (web administration), it is beyond the realm of imagination to expect to drop all approaching traffic on this port in light of the fact that doing so will keep the server from serving genuine traffic.  

One detriment of firewall is that Firewalls can close down a particular stream related with an assault, however like switches, they can't perform hostile to ridiculing.

7 0
3 years ago
Which processor that manipulate graphic data to form images on a monitor screen?
vladimir1956 [14]
A graphics processing unit. (GPU)
6 0
3 years ago
Read 2 more answers
How do Design Tools build robots for a Robotic Process Automation (RPA) application?
Anna11 [10]

Answer:

To build a robot create a goal, then center of excellence and then set the rightful infrastructure.

Explanation:

Robotic Process Automation (RPA) is a software technique in which it makes easy to deploy, build and manage software robots that copy the human's nature with digital system and software.

5 0
2 years ago
Other questions:
  • Which of these is an aggregator?
    9·2 answers
  • Which part of the cerebrum is associated with hearing and memory?
    8·2 answers
  • The variable grade can have any real number value from 0 to 100. Ask the user to enter a grade in numerical form. Write an if-el
    9·1 answer
  • You work for a large company. You need to implement a backup solution for your company that will allow you to perform multiple b
    11·1 answer
  • 1. The best program to present numerical data in would be ____. a. Access c. PowerPoint b. Excel d. Word
    6·1 answer
  • Write code that uses the input string stream inSS to read input data from string userInput, and updates variables userMonth, use
    8·1 answer
  • Misperceptions can lead to miscommunication. List an example from the article.(site 1)
    10·2 answers
  • Nuclear batteries use devices called thermocouples, which convert the ____ of a nuclear reaction into electricity.
    9·1 answer
  • MULTI SELECTION
    9·1 answer
  • O How basic blocks are identified and how the blocks are used to construct control flow graphs
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!