By using ____, you can use reasonable, easy-to-remember names for methods and concentrate on their purpose rather than on memorizing different method names.

Answers

Answer 1

Answer:

Polymorphism

Explanation:

Answer 2

If we use polymorphism so we can apply the names that could be easy to remember for the methods' purpose.

The information regarding the polymorphism is as follows:

The person has various attributes at the same timeFor example,  a man could be a father, a husband, an entrepreneur at the same time.In this, the similar person has different types of behavior in different situations.

Therefore we can conclude that If we use polymorphism so we can apply the names that could be easy to remember for the methods' purpose.

Learn more about the behavior here: brainly.com/question/9152289


Related Questions

3. Explain why the process of project planning is iterative and
why a plan must be continually reviewed during a software
project.
Ans:​

Answers

Answer:

because they inspecting or checking how there works good or not good there are under there work what a result cause they want a good and beautiful work

They're inspecting or checking how there works good or not good there are beneath there job what a result because they want a nice and beautiful work.

What is project planning?

The discipline of project planning focuses on how to complete a project within a predetermined timeframe, often with predetermined stages and resources. According to one method of project planning, the first stage is to set definable goals. scheduling the deliverables definition.

A project plan is made in order to effectively provide a result for the internal or external client. Project deliverables include, for instance, software products, design documentation, and other assets listed in the project plan. Deliverables for projects are frequently asked for as software products.

A project plan is a group of official documents that describe the execution and control phases of the project. The strategy considers risk management, resource management, and communications in addition to scope, cost, and schedule baselines.

Thus, They're inspecting or checking how there works good or not good.

For more information about project planning, click here:

https://brainly.com/question/27992266

#SPJ2

3. What are the first steps that you should take if you are unable to get onto the Internet? (1 point)
O Check your router connections then restart your router.
O Plug the CPU to a power source and reboot the computer.
O Adjust the display properties and check the resolution
Use the Control Panel to adjust the router settings.​

Answers

Answer:

Check your router connections then restart your router.

Explanation:

When the internet connection is not displaying properly then the first step is to check the router. The network icon on the internet displays the availability of internet. Adjust the router and see if the router is working properly. If not restart the router so that it adjusts its settings to default. The connection will be available on the computer and internet will start working normally.

what level of security access should a computer user have to do their job?

Answers

Answer:

A computer user should only have as much access as required to do their job.

Explanation:

A computer user should not be able to access resources outside of their job requirement, as this poses a potential attack vector for an insider threat.  By limiting the scope of resources to just what is needed for the user's specific job, the threat to the system or company can be mitigated with additional access control features for the computer user.  Never allow permission higher than what are needed to accomplish the task.

Cheers.

Given the following code: public class Test { public static void main(String[] args) { Map map = new HashMap(); map.put("123", "John Smith"); map.put("111", "George Smith"); map.put("123", "Steve Yao"); map.put("222", "Steve Yao"); } } Which statement is correct?

Answers

Answer:

There are no statements in the question, so I explained the whole code.

Explanation:

A map consists of key - value pairs. The put method allows you to insert values in the map. The first parameter in the put method is the key, and the second one is the value. Also, the keys must be unique.

For example, map.put("123", "John Smith");   -> key = 123, value = John Smith

Even though the key 123 is set to John Smith at the beginning, it will have the updated value Steve Yao at the end. That is because the keys are unique.

Note that the key 222 also has Steve Yao for the value, that is totally acceptable.

What type of function is being performed when a router screens packets based on information in the packet header

Answers

Answer:

"Router screening" is the correct option.

Explanation:

A router that philters packets like a firewall. For certain instances, the whole firewall system is such a single scanning router.Often connected to a network stage as well as a container-filter firewall has been the scanning router firewall. This rather firewall operates by filtering protocol characteristics from received packets.

So that the above seems to be the correct approach.

Which website allows you to host your podcast for at a cost that includes your domain name? (Correct answer only)

A. Podbean
B. Blogger
C. WordPress
D. HostGator
E. Buzzsprout

Answers

Answer:

D I think it

Explanation:

Answer:

I think it is HostGator

Explanation:

I took the test and I put Podbean and it was wrong.

why am i doing the investigation​

Answers

Because it’s your interest

Do each of the following in the main function:
a) Write the function prototype for function zero, which takes a double array big_nums and does not return a value.
b) Write the function call for the function in part a.
c) Write the function prototype for function add1AndSum, which takes an integer array one_small and returns an integer.
d) Write the function call for the function described in part c.

Answers

Answer:

a)

void zero(double big_nums[]);  

b)

zero(big_nums)  

c)

int add1AndSum (int one_small[]);

d)

add1AndSum(one_small);

Explanation:

a)

void zero(double big_nums[]);  

in this statement:

zero is the name of the function

void is used as the function does not return a value.

The function zero takes an array parameter i.e. big_nums[]

big_nums is the name of the array

big_nums[] array has a data type double

b)

zero is the name of the function

In part a) function zero has a parameter which is the array big_nums. So in order to call this function an array has to be passed as a parameter to this function.

So in this statmenent zero(big_nums) the array big_nums is passed to the zero function. You can also declare a new  double type array with a different name in main() function and can pass this to the zero function as:

double array[ ] = { 20.6, 30.8, 5.1};

zero(array);

Look at the following program for the better understanding of part a) and b)

#include <iostream>   //for using input output functions

using namespace std;  //to access objects like cin cout

void zero (double big_nums[]);   // function prototype

int main() {  //start of main() function

double a[ ] = { 20.6, 30.8, 5.1};  // double type array a with elements

zero(a);    }   //calls zero function passing array a to the function

void zero(double big_nums[]){      // function zero with double type array big_nums as parameter and the function returns no value

   int i;    

   for(i=0;i<3;++i)     {

        cout<<big_nums[i];     }  }  //prints the elements of array

c)

add1AndSum is the name of the function

int is used as the function does not return an integer.

The function add1AndSum takes an integer array parameter i.e. one_small[]

one_small is the name of the array

one_small[] array has a data type int

d)

add1AndSum is the name of the function

In part c) function add1AndSum has a parameter which is the array one_small. So in order to call this function an array has to be passed as a parameter to this function.

So in this statement add1AndSum(one_small); the array one_small is passed to the add1AndSum function. You can also declare a new  int type array with a different name in main() function and can pass this to the add1AndSum function.

Write steps to Delete data from ‘Datagridview’

Answers

Explanation:

private void btnDelete_Click(object sender, EventArgs e)

{

if (this.dataGridView1.SelectedRows.Count > 0)

{

dataGridView1.Rows.RemoveAt(this.dataGridView1.SelectedRows[0].Index);

}

}

the property of doing work automatically by the computer​

Answers

Answer:

Automation

Explanation:

What is Processor to Memory Mismatch problem?

Answers

direct-mapped cache;
fully associative cache;
N-way-set-associative cache.
That is all I could find sorry I can’t help

If every company is now a technology company, then what does this mean for every student attending a business college

Answers

Answer:

Explanation:

There are all sorts of possibilities for, say, inserting new technologies into existing processes. But most of these improvements are incremental. They are worth doing; in fact, they may be necessary for survival. No self-respecting airline, for instance, could do without an application that lets you download your boarding pass to your mobile telephone. It saves paper, can't get lost and customers want it.

But while it's essential to offer applications like the electronic boarding pass, those will not distinguish a company. Electronic boarding passes have already been replicated by nearly every airline. In fact, we've already forgotten who was first.

3. How many bytes of storage space would be required to store a 400-page novel in which each page contains 3500 characters if ASCII were used? How many bytes would be required if Unicode were used? Represent the answer in MB

Answers

Answer:

A total of 79.3mb will be needed

PROGRAM 8: Grade Converter! For this program, I would like you to create a function which returns a character value based on a floating point value as

Answers

Answer:

This function will return a character grade for every floating-point grade for every student in the class.

function grade( floatPoint ){

      let text;

      switch ( floatPoint ) {

        case floatPoint < 40.0 :

             text= " F ";

             break;

        case floatPoint == 40.0 :

             text= " P ";

             break;

        case floatPoint > 40.0 && floatPoint <= 50.0 :

             text=  " C ";

             break;

        case floatPoint > 50.0 && floatPoint < 70.0 :

             text=  " B ";

             break;

        case floatPoint >=70.0 && floatPoint <= 100.0 :

             text= " C ";

             break;

        default :

            text= "Floating point must be between 0.0 to 100.0"

      }

     return text;

}

Explanation:

This javascript function would return a character grade for floating-point numbers within the range of 0.0 to 100.0.

Marco travels often and does not have consistent wireless Internet service. He frequently uses his mobile phone service to provide Internet access to his tablet.

Which network type is Marco using?


LAN


PAN


WAN


MAN

Answers

Answer:

PAN

Explanation:

For wireless devices like laptops, tablets, wireless desktops, and cellphones to communicate, a wireless LAN normally has a Wi-Fi router or wireless access point. A wireless LAN is essentially a LAN that doesn't use cables. Thus, option B is correct.

What are the PAN  network type is Marco using?

The computer network that links computers and other devices within a specific person's range is known as a personal area network (PAN). PAN stands for personal area network and gives a network range within a person's range, often within a range of 10 meters (33 feet).

A PAN is a network that primarily serves a tiny space, usually a single small room. It allows computer devices to share data and information with other nearby computers.

Therefore, Whereas in LAN, computers are connected via a network over a short distance, such as within a building, or in a single computer network made up of several computers.

Learn more about network type here:

https://brainly.com/question/29515062

#SPJ2

Đánh giá hoạt động thanh toán điện tử của sinh viên

Answers

Answer:

CMON BRO

Explanation:

I DUNNO YOUR LAGUAGE

a) Code a statement that creates an instance of an Account class using the default constructor and stores the object that’s created in a variable named account.
b) Code a statement that creates an instance of the Account class using a constructor that has two parameters named firstName and age, and store the object in a variable named account. Assume that variables with those names have already been declared and initialized so you can pass those variables to the constructor.
c) Code a statement that sets the value of the Age property of an Account object named account to the value in a variable named newAge.
d) Code a statement that will get the value of a public static field named Count that’s defined in the Account class, and store the value in a new int variable named count. Assume that you’ve already created an object from this class that’s named account.

Answers

Answer:

a)

Account account = new Account();

b)

Account account = new Account(firstName, age);

c)

account.Age = newAge;

d)

int count = Account.Count;

Explanation:

a)

new is the keyword which is used to create an object.

Account is the class name.

account is the name of an object of class Account.

account object is created to access the class Account.

Account() is the constructor of Account class. This is the default constructor and it has no parameters. Constructor has the same name as class. When a account object is created, constructor Account will be invoked.

b)

Account is the class name.

account is the name of an object of class Account.

Account() is the constructor of Account class. This is the parameterized constructor and it has two parameters i.e. firstName and age. Constructor has the same name as class. When a account object is created, constructor Account will be invoked.

c)

account.Age = newAge;

Here account is the object name. The Age property to access and update the private field of the Account class is set to the variable named newAge.

d)

This int count = Account.Count; statement gets the value of a public static field named Count that’s defined in the Account class, and stores the value in a new int variable named count.

Write a program that reads the input.txt file character by character and writes the content of the input file to output.txt with capitalize each word (it means upper case the first letter of a word and lowercase remaining letters of the word)

Answers

Answer:

def case_convertfile( file_name):

    with open(" new_file","x") as file:

         file.close( )

    with open("file_name", "r") as txt_file:

     while True:

            word = txt_file.readline( )

            word_split= word.split(" ")

            for word in word_split:

                  upper_case = word.uppercase( )

                  file= open("new_file","w+")

                  file= open("new_file","a+")

                  file.write(upper_case)

     txt_file.close( )

     file.close( )

Explanation:

This python function would open an existing file with read privilege and a new file with write and append privileges read and capitalize the content of the old file and store it in the new file.

I need someone to explain gor me python coding!

Answers

Answer:

Explanation:

Python is a computer programming language often used to build websites and software, automate tasks, and conduct data analysis. Python is a general purpose language, meaning it can be used to create variety of different programs and isn't specialised for any specific problems

"The principle of ______________ states that programs tend to access data and instructions nearby recently used data and instructions."

Answers

Answer:

Locality of reference.

Explanation:

In computing, The principle of locality of reference is the probability of a processor to repeatedly access the same set of memory locations within a small time interval. This reference of locality can be spatially based (repetitive usage of data within the same location on the computer memory), or temporally based (repetitive usage of a particular data or resources within a shot time interval). The ability of some computing system to perform this action increases their predictability, and efficiency of memory hierarchy use, among other abilities.

the part of the computer that contains the brain , or central processing unit , is also known the what ?

Answers

Answer:

system unit

Explanation:

A system unit is the part of a computer that contains the brain or central processing unit. The primary device such as central processing unit as contained in the system unit perform operations hence produces result for complex calculations.

The system unit also house other main components of a computer system like hard drive , CPU, motherboard and RAM. The major work that a computer is required to do or performed is carried out by the system unit. Other peripheral devices are the keyboard, monitor and mouse.

Reasons why operating system is pivotal in teaching and learning

Answers

Answer:

Explanation: The operating system simply acts as the communication interface between the user and the components if a computer including it's hardware. The reasons why an operating system is pivotal in leaching and learning includes :

In most cases, teaching and learning requires the use of application programs or softwares which could be the program to be learnt or that which is used to aid learning. Irrespective of the type of application program, it's installation and usage depends and is made possible with the help of an operating system. Programs used for video sessions during teaching, writing programs and document editors all require an operating system in other to aid installation and ultimately function.

who is considered as the father of computer science?​

Answers

Charles Babbage is known as father of computer science because he designed the original programmable computer .

I hope it helps and if you want to have good answer follow me, I will be your second sight on your any problems♥️♥️

Management wants to ensure any sensitive data on company-provided cell phones is isolated in a single location that can be remotely wiped if the phone is lost. Which of the following technologies BEST meets this need?a. Geofencingb. containerizationc. device encryptiond. Sandboxing

Answers

Answer:

B. Containerization.

Explanation:

In this scenario, management wants to ensure any sensitive data on company-provided cell phones is isolated in a single location that can be remotely wiped if the phone is lost. The technology which best meets this need is containerization.

In Computer science, containerization can be defined as a process through which software applications are used or operated in an isolated space (environment). It uses an operating system level virtualization method, such as a single host OS kernel, UFS, namespaces, Cgroups, to run software applications.

Hence, using the containerization technology makes it easy to wipe off the cell phones if lost because it is isolated in a single location.

What is the science and art of making an illustrated map or chart. GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps? a. Automatic vehicle locationb. Geographic information systemc. Cartographyd. Edge matching

Answers

Answer:

c. Cartography.

Explanation:

Cartography is the science and art of making an illustrated map or chart. Geographic information system (GIS) allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps.

Basically, cartography is the science and art of depicting a geographical area graphically, mostly on flat surfaces or media like maps or charts. It is an ancient art that was peculiar to the fishing and hunting geographical regions. Geographic information system is an improved and technological form of cartography used for performing a whole lot of activities or functions on data generated from different locations of the Earth.

Answer:

C. Cartography

Explanation:

1. Cases Prudence has a special (cubic) die. The values on its face are the integers from 1 to 6, but they are not arranged ae in a normal die. When Prudence first tosses the die, the sum of the values on the four side faces is 15. In her second toss, the sum of these values is 12. Find what value appears in the face opposite 6 on Prudence’s special die. (Hint: what are possible values for the top and bottom face when the sum of the side faces is 12).

Answers

Answer:

The definition of the subject in question is presented in section elsewhere here.

Explanation:

The total value of almost all of the quantities mostly on unique die features will indeed be:  

⇒  [tex]1+2+3+4+5+6[/tex]

⇒  [tex]21[/tex]

The number of the 4 lateral sides throughout the first tossing will be 15, therefore determines the total of both top and bottom features would be:

⇒  [tex]21-15[/tex]

⇒  [tex]6[/tex]

The compositions including its {top and bottom} current valuations that give a total of Six include {1, 5}, {5, 1}, {2, 4}, as well as {4, 2}. Consequently, because neither of those variations includes Six, it indicates that six doesn't really feature on the very first toss mostly on high or low hand.  

And then let's look at second tossed situation. Throughout this particular instance, the total amount obtained would be 12.

Which means it has to be the number of top and bottom:

⇒  [tex]21-12[/tex]

⇒  [tex]9[/tex]

{4, 5},{5, 4}, {6, 3}, and {3, 6} seem to be the {top, bottom} facial variations that provide a total of Nine.  

Currently regarding all the tosses, {6, 3} and perhaps {3, 6} have been the only situations wherein the 6 emerge towards top or bottom. Then the value of the unique die mostly on face identical to 6 must've been 3.

You bought a monochrome laser printer two years ago. The printer has gradually stopped feeding paper. Which printer component should you check first

Answers

Answer:

Pick up roller

Explanation:

you should first check the pickup roller component. This component is the part of the printer that picks paper up from the paper tray. The pickup roller links the printer and the paper. When the printer printer is running, the roller would take paper from the paper tray for the printer to print on. One of the issues it can have is Paper jam where the roller would stop turning so that it will no longer be picking papers up from the tray.

Algorithm
Read marks and print letter grade according to that.

Answers

Answer:

OKAYYYY

Explanation:

BIJJJJJJJSGJSKWOWJWNWHWHEHIWJAJWJHWHS SJSJBEJEJEJEJE SJEJBEBE

Develop a CPP program to test is an array conforms heap ordered binary tree. This program read data from cin (console) and gives an error if the last item entered violates the heap condition. Use will enter at most 7 numbers. Example runs and comments (after // ) are below. Your program does not print any comments. An output similar to Exp-3 and Exp-4 is expected.
Exp-1:
Enter a number: 65
Enter a number: 56 // this is first item (root,[1]) in the heap three. it does not violate any other item. So, no // this is third [3] number, should be less than or equal to its root ([1])
Enter a number: 45 // this is fourth number, should be less than or equal to its root ([2])
Enter a number: 61 // this is fifth number, should be less than or equal to its root ([2]). It is not, 61 > 55. The 61 violated the heap.
Exp-2:
Enter a number: 100
Enter a number: 95 1/ 95 < 100, OK
Enter a number: 76 // 76 < 100, OK
Enter a number: 58 // 58 < 95, OK
Enter a number: 66 1/ 66 < 95, OK
Enter a number: 58 // 58 < 76, OK
Enter a number: 66 // 66 < 76, OK
Exp-3:
Enter a number: -15
Enter a number: -5
-5 violated the heap.
Exp-4:
Enter a number: 45
Enter a number: 0
Enter a number: 55
55 violated the heap.

Answers

Answer:

Following are the code to this question:

#include<iostream>//import header file

using namespace std;

int main()//defining main method

{

int ar[7];//defining 1_D array that stores value      

int i,x=0,l1=1,j; //defining integer variable

for(i=0;i<7;i++)//defining for loop for input value from user ends  

{

cout<<"Enter a Number: ";//print message

cin>>ar[i];//input value in array

if(l1<=2 && i>0)//using if block that checks the array values  

{

x++;//increment the value of x by 1  

}

if(l1>2 && i>0)//using if block that checks the array values  

{

l1=l1-2;//using l1 variable that decrases the l1 value by 2  

}

j=i-x;//using j variable that holds the index of the root of the subtree

if(i>0 && ar[j]>ar[i])// use if block that checks heap condition  

{

l1++; //increment the value of l1 variable

}

if(i>0 && ar[j]<ar[i])// using the if block that violate the heap rule  

{

cout<<ar[i]<<" "<<"Violate the heap";//print message with value

break;//using break keyword  

}

}

return 0;

}

Output:

1)

Enter a Number: -15

Enter a Number: -5

-5 Violate the heap

2)

Enter a Number: 45

Enter a Number: 0

Enter a Number: 55

55 Violate the heap

Explanation:

In the above-given C++ language code, an array "ar" and other integer variables " i,x,l1, j" is declared, in which "i" variable used in the loop for input values from the user end.In this loop two, if block is defined, that checks the array values and in the first, if the block it will increment the value of x, and in the second if the block, it will decrease the l1 value by 2.In the next step, j variable is used that is the index of the root of the subtree. In the next step, another if block is used, that checks heap condition, that increment the value of l1 variable. In the, if block it violate the heap rule and print its values.

Which of the factors below is NOT a cause of online disinhibition?
O Anonymity
O Lack of nonverbal cues
Lack of tone of voice
Smartphones

Answers

Answer:

Lack of tone of voice

Explanation:

Remember, online disinhibition refers to the tendency of people to feel open in communication via the internet than on face to face conversations.

A lack of tone voice isn't categorized as a direct cause of online disinhibition because an individual can actually express himself using his tone of voice online. However, online disinhibition is caused by people's desire to be anonymous; their use of smartphones, and a lack of nonverbal cues.

Other Questions
PLEASE HELP PLEASE WILL MARK BRAINLY Find the area of triangle ABC to the nearest tenth if AB = 11 ft, BCA = 67 , and CAB = 28 . If you were interested in medical coding and working specifically with hospitals, which certification might you pursue?A. CHPSB. CCS-PC. RHITD. CCS Given a stock index with a value of $1,200, an anticipated dividend of $45, and a risk-free rate of 6%, what should be the value of one futures contract on the index A mass M slides downward along a rough plane surface inclined at angle \Theta\:= 32.51 in degrees relative to the horizontal. Initially the mass has a speed V_0\:V 0 = 6.03 m/s, before it slides a distance L = 1.0 m down the incline. During this sliding, the magnitude of the power associated with the work done by friction is equal to the magnitude of the power associated with the work done by the gravitational force. What is the coefficient of kinetic friction between the mass and the incline? Mention any five ways to preserve our art, religion and culture. Classicism vs. RomanticismConsider the differences between classicism and romanticism. Then place each concept in the correct categorycelebrated the individualClassicismRomanticismevoked emotions and sentimentemphasized traditionfocused on imaginationimitated the art of ancient Greecefocused on a love of nature what color would you get if you mixed red and yellow Which are examples of an expository writing style? Select 3 options. More than a hundred million e-mails are sent around the world each day, and they are all vulnerable to interception. Other attacks include the use of viruses and Trojan horses. But how can you bury a mountain of soil? Before long, the army engineers came up with a plan that would allow them to do just that. Only a small fraction of the information flowing around the world is securely encrypted. Hall well understood the gamble the Germans were taking. When the war began, Elizabeth Van Lew was considered a southern "spinster." Using Tour Notes2. Categorizing Using your notes, list the cultures found in the Northeast What is the central idea of this article? What is the perimeter of a square which has the same area as a circle with circumfrence of 4 Rewrite to make true: The sequence 8,8,8,8,8, ... is neither arithmetic or geometric. The Quimbys obtain a loan that starts out at 5.5% interest. After five years, the interest rate will adjust to whatever the current market rate is and adjust every year thereafter. This is a/an What is the percent change from 75 to 14? 5^-4 over 5^3 simplifyA. 5^7B. 5^-1C. 1/5D. 1/5^7 The Golden Company issues of %, 10year bonds at on March 31, 2019. The bonds pay interest on March 31 and September 30. Assume that the company uses the straightline method for amortization. The journal entry to record the issuance includes a Diana is working on an Access file. She added a rectangle to the title of her form and would like to change the color of the rectangle border. To complete this task, Diana goes into Design view, clicks on Property Sheet, and then clicks on the Other tab. She is unable to find the Border Color option to make the change. What error did Diana make? A.She should have used Format view instead of Design view. B.She should have clicked Controls before clicking Property Sheet. C.She should have clicked on the Format tab after clicking Property Sheet. D.She should have looked for the Border Width option instead of the Border Color option. Can someone use trundle in a sentence Why did many Americans purchase stocks at this time?