1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OLEGan [10]
2 years ago
9

Class.object.method is an example of using the ______ to access the elements of a class.

Computers and Technology
1 answer:
Aleonysh [2.5K]2 years ago
6 0

Answer:

dot operator

I hope I helped ^-^

You might be interested in
Write a function that is named times_ten and accepts a number as an argument. When the function is called, it should return the
Stells [14]

It changes a little depending on what programming language you're using, but in C you could say

int times_ten (int num) {

    num = num*10;

    return num;

}

Or, in general terms:

Integer Function times_ten (Integer num)

    Set num = num * 10

    Return num

This is all done assuming the number used as an argument is an integer and that you are returning an integer value, not a decimal. The main thing to notice is that since you have to return a value, you must have two things: a return statement, and a type declaration for the function, otherwise you'll get an error.

4 0
3 years ago
________________ are piece of programs or scripts that allow hackers to take control over any system.
Ber [7]

Answer:

Exploits

Explanation:

Exploits can be explained to be a piece of programmed softwares or scripts that can give hackers the opportunity to take control over any system and exploit this system's vulnerabilities. The vulnerability scanners that hackers use includes, Nessus, Nexpose e.tc.

They use these scanners above to search for vulnerabilities.

3 0
3 years ago
1-2-1 personal assistance
pshichka [43]

Answer:

I am here.

Explanation:

I can help you with all questions but follow me.

4 0
3 years ago
Do i have to buy affinity photo on windows and mac
nikdorinn [45]
no you don’t have to buy that
6 0
3 years ago
Codehs:<br> 7.2.6 Can you Graduate?<br><br> 7.2.7 School’s Out
Afina-wow [57]

Answer:

No

Explanation:

8 0
3 years ago
Other questions:
  • Search engines enable you to
    9·2 answers
  • In which order do the DHCP messages occur when a client and server are negotiating address configuration?
    6·1 answer
  • Suppose an application generates chunks of 20 bytes of data every 20 msec, and each chunk gets encapsulated in a TCP segment and
    14·1 answer
  • web pages within the same website often have different blank because they have different blank A) home pages, urls B) goals, sou
    12·1 answer
  • Small data files that are deposited on a user's hard disk when they visit a website are called _______.
    6·2 answers
  • One reason it is important to write code that is readable is that
    8·2 answers
  • You don’t design new software. Instead, you work with software that already exists to be sure that it keeps running smoothly. Wh
    10·2 answers
  • Where was this taken
    7·2 answers
  • 3.1.14 Wormhole CodeHS <br><br> May I have it in a copy and paste, please?
    5·1 answer
  • Why does rating an incorrect answer as 1 star raise its score on brainly?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!