Encapsulation means ________. 1. that data fields should be declared private2. that a class can extend another class 3. that a variable of supertype can refer to a subtype object 4. that a class can contain another class

Answers

Answer 1

Answer:

Option 1 is the correct answer for the above question.

Explanation:

Encapsulation means rapper the data or variable or method on some pack and denies to give direct access for any private data. The above question wants to ask about the Encapsulation. The option 1 is correct for its because this option suggests a scenario, where a class field is declared as private and we know that private data members of the class can not be accessed by outside the class. It can access only the inside of the class. So it proves both the property of encapsulation one is to rapper the data and the other is to deny the directly accessed outside. So this option is correct while the other is not because--

Option 2 states that another class is extended by the base class which is not the property of encapsulation. Option 3 states that a sub-type object can be referred by the variable of super-type which is also not the property of encapsulation. Option 4 states that a class is contained by the other class which does not hold both the property of encapsulation.

Related Questions

A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?

Answers

Answer:

Ransomware

Explanation:

commonly encrypts data on a computer and makes the data unavailable until the computer user pays a specific sum of money.

Final answer:

Ransomware is the type of malware that encrypts user data and requests payment, typically in Bitcoin, to allow the user to regain access. It can affect individuals and businesses, causing significant losses and privacy breaches.

Explanation:

The type of malware described in the question is known as ransomware. This kind of malicious software restricts access to the user's data by encrypting it and then demands payment, usually in the form of cryptocurrencies like Bitcoin, for the decryption key.

Ransomware not only affects individuals but also businesses and can lead to significant financial losses and breach of privacy. Vigilance when clicking on links and managing emails, as well as implementing strong security practices, are critical in preventing such attacks. Once infected, recovery can be difficult and there is no guarantee that paying the ransom will actually restore access to the encrypted data.

Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What should Sherri consider prior to taking the laptop apart? (Select all that apply.)
a. Try an external device before replacing the motherboard.
b. Make sure you have the correct processor for the motherboard.
c. Verify that the laptop is not under warranty.
d. Determine whether a teardown procedure is available.

Answers

Answer: Option(b), (c) and (d) are correct.

Explanation:

According to the question,Sherri should check that process is right for motherboard as incorrect processor may not be able to process instruction and operation successfully and rapidly.

She should also check the warranty of the laptop.If in case , laptop is under warranty then she can get it repaired or replaced as per the policy of laptop company. Tear-down process can be verified so that laptop can be dismantled to investigate the components of processor that is causing issue in processing or other part is responsible for slow execution.Option (a) is incorrect because external devices is attached with motherboard with help of ports and cables.Processor is the actual unit that can cause slow execution and external devices are not responsible for it.Thus, the correct options is option(b),(c) and(d).

Final answer:

Sherri should check if her laptop is still under warranty, ensure she has a compatible processor for her motherboard, and locate a guide for the proper teardown procedure before attempting to replace her laptop's processor.

Explanation:

Sherri should consider several factors before attempting to replace the processor on her laptop to address its slow performance. Firstly, she should verify that the laptop is not under warranty. Tampering with the hardware can void the manufacturer's warranty, and if the laptop is still covered, it might be more beneficial to seek professional repairs.

Secondly, it is essential to make sure you have the correct processor for the motherboard. Not all CPUs are compatible with every motherboard due to socket type, chipset, and power requirements. Lastly, Sherri should determine whether a teardown procedure is available to guide her through disassembling and reassembling her laptop safely.

Missing this step could lead to damage to the laptop components or render it completely inoperable when done incorrectly.

In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for attempted logon retries.A) True B) False

Answers

Answer:

B, False.

Explanation:

Remote access is the ability of a device in a network to achieve a remote connection and control of another system. Its connection is not physical but uses telecommunication or the internet to access systems that cannot be accessed physically.

The RDP or remote desktop protocol is an example of protocols used to remotely access other computers in a network. It connects to the graphical interface of the other computer. When private data is compromised in a remote access, automatic blocking cannot be used to cancel an already established connection, but the system should be shutdown to prevent further exposure.

A digital certificate confirms that the macro created by the signer has not been altered since the digital certificate was createdA. TrueB. False

Answers

Answer: False

Explanation:

Digital certificate is defined as entity identification in digital form that is used by a user or firms to share their information along with authentication and security. It uses public key cryptographic technique and so it is also know as public key certificate.

Digital signature is the signature that is done digitally to secure data or document.It maintains security of the content present  in message of information that is being exchanged through e-signature.It follows encryption technique for maintaining authenticity.Therefore, digital signature is the signing feature that protects macro after being made to maintain its authenticity.Thus, the given statement is false.

Most programming languages allow you to ask two or more questions in a single comparison by using a(n) ____ operator that joins decisions in a single statement.

Answers

Answer:

And is the correct answer for the above question.

Explanation:

And operator is an operator in the programming language which described two decisions in a single statement and it gives true if both the condition defined in the statement is true and it gives false if any of the conditions defined in the statement gives the false result.The above question-statement asked about that operator by which the user can write the two conditions in a single statement. Then the answer is And operator. One example for And operator in c language with if statement is-- if(a>=5&&a<=10), in which && symbols represents AND operator.
Final answer:

Logical operators like AND and OR in programming languages allow you to ask two or more questions in a single comparison. The AND operator requires both conditions to be met, while the OR operator requires at least one of the conditions to be met.

Explanation:

Most programming languages allow you to ask two or more questions in a single comparison by using a logical operator that joins decisions in a single statement. Logical operators include AND and OR operators. The AND operator (often symbolized as & or &&) allows for two conditions to be met, whereas the OR operator (often symbolized as | or ||) stipulates that at least one of the conditions be met. For example, in the statement if (age > 18 && citizenship == 'American'), both conditions (the age being greater than 18 and the citizenship being American) have to be satisfied due to the AND operator.

Learn more about Logical Operators here:

https://brainly.com/question/36193462

#SPJ3

What is the output of the program below? public class Java1234 { public static void main(String args[ ]) { int matrix[ ][ ]; matrix = new int[3][4]; for(int p = 0; p < 3; p++) { for(int q = 0; q < 4; q++) System.out.prin

Answers

Given the complete question to be:

What is the output of the program below?

public class Java1234 {

   public static void main(String args[ ]) {

       int matrix[ ][ ];

       matrix = new int[3][4];

       for(int p = 0; p < 3; p++) {

           for(int q = 0; q < 4; q++)

           System.out.print(matrix[p][q]);

       }

   }

}

Answer:

000000000000

Explanation:

The output of program will be 0's in twelve places since the line " int matrix[ ][ ];"  declared an array of unknown size which will consist of zeros as it's element.

The  line "matrix = new int[3][4];" declared the size of the matrix to be 3 by  4 while the for loop printed the elements of the arrays by looping through it.

Actual Question:

What is the output of the program below?

public class Java1234 {

  public static void main(String args[ ]) {

      int matrix[ ][ ];

      matrix = new int[3][4];

      for(int p = 0; p < 3; p++) {

          for(int q = 0; q < 4; q++)

          System.out.print(matrix[p][q]);

      }

  }

Answer:

000000000000

Explanation:

Going through the code line after line;

=> Line 1

public class Java1234 {

This is just a class declaration where the class name is Java1234. Every program in Java is run in a class

=> Line 2

public static void main(String args [ ] ) {

This is the main method declaration. Execution in Java starts at the main method.

=> Line 3

int matrix [ ][ ];

This is a declaration of a 2 dimensional array matrix to hold integer variables.

=> Line 4

matrix = new int[3][4];

Here the array variable matrix has been initialized to be an array of 3 rows and 4 columns. Therefore, it can hold 12 integer variables.

In Java, when an array is initialized this way, its values assume their default values. And since it is an array of integers, integer variables have a default value of zero(0). Therefore, the array matrix contains 12 integer variables with each value set to 0.

=> Lines 5 through 8  

for (int p = 0; p < 3; p++) {

   for (int q = 0; q < 4; q++)

   System.out.print(matrix[p][q]);

}

This is a nested for loop that cycles through each of the element in the array.

The outer loop goes from 0 to 2 (less than 3). And at each cycle, the inner loop goes from 0 to 3 (less than 4) and prints the array element at the index determined by p and q. i.e

when p = 0, q will go from 0 to 3

=> at p = 0, q = 0, 1, 2, 3

=> for each value of q, the matrix[p][q] will be calculated as follows

matrix[0][0] = 0

matrix[0][1] = 0

matrix[0][2] = 0

matrix[0][3] = 0

when p = 1, q will go from 0 to 3

=> at p = 1, q = 0, 1, 2, 3

=> for each value of q, the matrix[p][q] will be calculated as follows

matrix[1][0] = 0

matrix[1][1] = 0

matrix[1][2] = 0

matrix[1][3] = 0

when p = 2, q will go from 0 to 3

=> at p = 2, q = 0, 1, 2, 3

=> for each value of q, the matrix[p][q] will be calculated as follows

matrix[2][0] = 0

matrix[2][1] = 0

matrix[2][2] = 0

matrix[2][3] = 0

Therefore, the loop will run 12 times altogether and at each cycle, it prints 0 since the array has not been actually initialized with any value and so it assumes its default value which is 0 for an integer.

Output:

000000000000

What type of object is a GUI widget the user can click to select an option, and allows for any number of these objects to be selected at the same time?

Answers

Answer:

Checkbox

Explanation:

I remember this question.

A(n) ______ is software that finds websites, webpages, images, videos, and other information related to a specific topic. Group of answer choices

Answers

Answer:

A web search engine or internet search engine

Explanation:

A web search engine or an internet search engine is a software program that enables users to retrieve information with a response to the user queries.

A network interface card has a place where which kind of cable can be plugged in and connected to a router or switch?
HDMI
Ethernet
USB
Coax

Answers

The Ethernet is your answer
Ethernet

The ethernet cable can be plugged in and connected to a router to enhance the internet connection of the device.


A technician is training a new hire on sealing an RJ-45 connector to the end of an Ethernet cable. Which tool is the technician handing the new hire in order to perform this task?
Cable striper
Crimper
Loopback plug
Punchdown tool

Answers

The answer is Crimper.

Crimper is a networking device that would allow RJ-45 pins to get attached to UTP(Unshielded Twister Pair), CATs (Category Ns) and STPs (Shielded Twisted Pair) Cables. These are common type of cables used in computer networking. A crimper looks like a pliers only it has narrow ends with a hole where you would put RJ-45 devices together with the cables. In order to make the cable hold on to the RJ-45, the two hands must be squeezed together with an exact force (not too much force). Once the crimper made a sound, that means, your RJ-45 is now locked with the cables inside.  

You must be very careful when using this device. Sometimes crimpers has blades that could peel off cables or cut them for alignment and proper attachments. A pair of gloves and googles are also advisable to wear when you use this device for safety measures.

Juan's web server was down for an entire day last september. It experienced no other downtime during that month. Which one of the following represents the web server uptime for that month?
A. 96.67%
B. 3.33%
C. 99.96%
D. .04%

Answers

Answer: A- 96.67%

Explanation: Juan's web server was down for an entire day last September.

The web server up time for the month of September is 1/30=0.0333 which is one day out of the 30 days in the month.

Therefore 1-0.0333= 0.96667 *100 = 96.67%

Dr. Bassin, a hiring manager, is using the employee screening and selection device that is used more frequently than any other employee screening and selection device. Which device is she using?

Answers

Answer:HIRING INTERVIEWS

Explanation: Hiring interview is the most widely used employees screening and selection device,this involves the questioning of the potential employee,this process also involves various forms of assessment which may include the person's ability to express himself on the interview questions,the person's dressing and overall presentation. The person is assessed by a panel of persons which may be from the organisation or from external hiring companies.

What is a type of application that allows users to interact with certain stimuli by projecting a realistic graphical representation, often in three dimensions?

Answers

Answer:

The application that allows users to do what is stated in the question is known as "Visual Simulation"

Explanation:

Visual simulation otherwise referred to as computer simulation projects a realistic graphical representation as it interacts with a particular stimuli. A very clear example is the popular flight simulator. It can be also used in the medical field and in business.

Going further, visual simulation has been expanded to virtual reality devices that are being used in many ways. Even though, the use of virtual reality devices for visual simulations is on the increase, many people still relate to visual simulation through games. These games project a two-dimensional image to look like a three-dimensional image using advanced graphics.

Individuals who work on visual simulation have some form of degree in engineering precisely, computer engineering. This is because it projects the basics in programming and engineering.

What type of IPv6 address should you use when you have multiple routers on a subnet and want hosts to use the nearest router for packets that should be delivered to remote networks?
-Unicast
-Anycast
-Multicast
-Broadcast

Answers

Answer:

Anycast

Explanation:

Anycast is linked with the BGP protocol which ensures that all of a router’s neighbors are aware of the networks that can be reached through that router and the topographical distance to those networks. The main principle of anycast is that an IP address range is advertised in the BGP messages of multiple routers. As this propagates across the Internet, routers become aware of which of their neighbors provides the shortest topographical path to the advertised IP address.

We have a file that has a name in it, but the name is written one character per line. We need to write this name to the screen. What is wrong with the following code? ifstream fileIn; fileIn.open("file.txt"); char ch; fileIn.get(ch) while(!fileIn.eof( ))

Answers

Answer:i think it is using alot of stuff also keyboard and document and the mouse

Explanation:

Dynamic Host Configuration Protocol is the protocol that assigns __________ to devices joining a network.
names
websites
ranges
IP addresses

Answers

Answer:

Option D: IP addresses

Dynamic Host Configuration Protocol is the protocol that assigns IP addresses to devices joining a network.

Explanation:Dynamic host configuration protocol is abbreviated as DHCP.Networks are managed according to DHCP protocol widely.It is used to assign IP address to the devices in a network.While using Static protocol, we are allowed to assign he IP addresses to the connected users ourself from a given range.Where as in DHCP, each device is assigned IP address dynamically from a pool of addresses.DHCP is thus a ast and efficient way of assigning IPs to the devices as it gives each device a unique IP.

I hope it will help you!

A computer user who enters an incorrect formula in a spreadsheet that results in a serious error is a victim of which common problem?

Answers

Answer:

User mistake

Explanation:

Where is line-of-sight Internet common?
In space
Outdoors
Inside
In businesses

Answers

Answer:

In businesses

Explanation:

Line of Sight internet provides an over-the-air internet connection to buildings that have a clear line of sight to a dedicated mast. This means no underground cables, quicker installation times and lower latency. It is common in businesses.

Consider the following numbers given in Binary (BIN), Decimal (DEC), and Hexadecimal (HEX) representations:
BIN: 1110
DEC: 13
HEX: F
Which of the following lists the numbers in order from least to greatest?
a. BIN: 1110, DEC: 13, HEX: F
b. DEC: 13, BIN: 1110, HEX: F
c. DEC: 13, HEX: F, BIN: 1110
d. HEX: F, DEC: 13, BIN: 1110

Answers

Answer:

b. is the right answer.

Explanation:

we can turn all numbers to decimal and then compare.

BIN: 1110 = 14

Hex: F = 15

so 13-14-15 is right order.

B is the answer hope i helped

This organization is the largest developer of international standards in the world for a wide variety of products and services. It is known for its Open System Interconnection (OSI) reference model.

Answers

Answer:

The correct answer to the following question will be "ISO".

Explanation:

The International Organization for Standardization (ISO) seems to be an international benchmark-setting agency consisting of members from different organizations of national standards.The company is the world's largest provider of global standards for a broad range of products and facilities.

Therefore, It's the right answer.

Which is true about TCP and UDP? Choose two answers.
TCP is a connection-oriented protocol
TCP is often used in video streaming apps
UDP is often used for sending documents
UDP does not acknowledge a receipt of data

Answers

Answer:

TCP is a connection-oriented protocol

UDP does not acknowledge a receipt of data

Explanation:

TCP (Transmission Control Protocol) is a protocol to transfer data, this is one of the most important protocols on the entire internet, this method was implemented from the beginning of the network.

UDP (User Datagram Protocol) this is a protocol faster than TCP because this method doesn't establish a connection to sent data, in this case, always sent data, but TCP is more secure than UDP, and for that UDP is used to transfer music or videos, and TCP websites and database.

UDP doesn't need acknowledgment is done by UDP, is only concerned with speed.

Windowok Inc. implemented a new pay policy for its employees. According to the policy, all employees who exceed their performance targets will earn a bonus in addition to their regular pay. What has Windowok implemented?

Answers

Answer:

Performance bonus policy is the correct answer.

Explanation:

The term performance bonus refers to a way of additional compensation that is given to an employee or a department; it is a reward paid for achieving particular goals or hitting predetermined targets. In this case, Windowok Inc. is paying to employees who exceed their performance targets as a bonus.

The ________ is made up of a series of tabs that organize the various buttons, drop-down lists, and galleries of options by a broad category. Within each tab are groups which further organize the commands to help you find and execute commands efficiently.

Answers

Answer:

ribbon

Explanation:

Ribbon is the space at the top of the programs like excel and word, where we can find a lot of options to do in our presentations, this ribbon is divided in other categories where we can find specific options like font, number, and styles, this options was implemented from 2007 and is still used today, in addition we can modify and add other components at the ribbon

A method of participant observation designed to help a researcher experience a culture's complex web of meaning is called textual analysis.True / False.

Answers

Answer:

The answer is "False".

Explanation:

The textual analysis is a method of research, that is used to describe and provides the understanding feature to understand the given text.

A process of observation by participants that helps a scientist knowledge of the complex network of the meaning of societies is known as Ethnography, that's why the given statement is false.

The entrance facility is the place where the connection to a WAN is located. It is basically the point where the LAN begins and ends. What is another name for this point?

Answers

Answer:

Demarcation point.

Explanation:

A LAN is a private network within a small geographical location. It is the interconnection of end user devices and other intermediate network devices. For a LAN to access other external WAN networks, an default route must be configured on the edge router that connects directly to the WAN in a point called the Demarcation point.

Demarcation point or Demarc is a point where the wide area network (WAN) is connected to a private local area network (LAN). It is the point where a srevice provider network ends and the customer's network begins or ends.

The FaceSnap app has permission to use many devices on your smartphone, including the camera. A data privacy concern that arises from this is that the company could access the camera to see what you're doing without your knowledge.

Answers

Question:

Why is it not given points for Row 6(identifying data that is used by innovation and how the data is consumed), and Row 7 (identify one data storage, privacy, or security concern)

Answer:

The statement provides shares details on the computer innovation and does not show how the data is used by the app, what FaceSnap does with the information given to it.

Row 7: No specific data security concern

Natalie is a secretary and must complete a large amount of filing this afternoon. At 1:00 PM, the office receptionist gets sick and goes home. The manager asks Natalie to fill in at the front desk for the rest of the afternoon. Which trait does Natalie demonstrate by adjusting her schedule?

Answers

Answer:

flexibility

Explanation:

she is able to adjust to the task that is being asked of her

CompX Inc. is an online retailer of electronic products, including laptops and tablets. The company is known for its unique approach to customer support, which is known for going above and beyond in satisfying customer complaints and issues. What kind of a strategy is CompX using?

Answers

Answer:

Differentiation

Explanation:

Differentiation is a business strategy used by organizations for gaining a competitive edge over competitors in the market.

During this approach, the organizations/business introduces a special strategy which goal is to differentiate their product or service in a positive way, from other products that are alike.

In this scenario the organization(CompX Inc) is offering a superior customer support.

memory is a small unit of ultra-fast memory that is used to store recently accessed or frequently accessed data so that the CPU does not have to retrieve this data from slower memory circuits such as RAM.

Answers

Answer:

The answer is "Cache memory".

Explanation:

Cache memory, which is specifically created for the circuits of the CPU, that is also called the primary cache, and the secondary cache is called the memory cache contained on an external circuit. It is used to access information from the cache easily, instead of having to get, it from the main memory of the computer.

If your computer requires that you install memory in pairs, it doesn't matter if the two memory modules are the same type, size, or speed.True / False.

Answers

Answer:

False

Explanation:

If your computer requires that you install memory in pairs you should always keep in mind that

1. Both are the same type(DDR4+DDR4, DDR3+DDR3, DDR2+DDR2...)

2. Both are the same size (2GB+2GB, 4GB+4GB, 8GB+8GB...)

3. Both are the same speed (800MHz+800MHz, 1666MHz+1666MHz, 3200MHz+3200MHz...)

This is important, because of the predefined slots that are located on the Motherboard.

Although you can change the RAM speed from the BIOS you can not change the predefined slot values

Other Questions
A math class has 5 girls and 5 boys in the seventh grade and 5 girls and 7 boys in the eighth grade. The teacher randomly selects a seventh grader and an eighth grader from the class for a competition. What is the probability that the students she selects are both girls? Write your answer as a fraction in simplest form. What should the time signature for the following example be? After teaching nursing students about childhood exanthems, the instructor determines that the teaching was successful when the students identify what as the primary cause? The registered nurse is teaching the nursing process in psychiatric mental health nursing to a group of student nurses. Which statement made by the registered nurse needs correction? Whatistherelationshipbetweenthemassesoftheobjectsandthegravitationalforcebetweenthem? What is the name of the king whose conversion to Christianity was significant in the overall conversion of the Viking people to Christianity? Brenda's working on improving a Google Search Ads quality score so it potentially gets a better ad rank and performs better in the ad auction. What change to Brenda's ad might improve the Ad Rank? Write a word problem that can be solved using the equation 0x4=0. Then solve In humans alkaptonuria is a metabolic disorder in whichaffected persons produce black urine. Alkapotonuria results from anallele(a) that is recessive to the allele for normal metabolism(A). Sally has a normal metabolism, but her brother hasalcaptonuria. Sally's father has alcoptonuria, and her mother hasnormal metabolism. a) Give the genotype of Sally,her mother,father and herbrother. b) If Sally's parents have another child what is theprobabilty that this child will have alkaptonuria? c) If Sally marries a man with alkaptonuria, what is theprobability that their child will have alkaptonuria? . List at least one law that was passed in the colonies that helped to secure the practice of slavery Most cloudiness and precipitation associated with a cold front occur as a relatively _________ band along or just ahead of where the front intersects Earth's surface.a. narrowb. broad your brother traveled 200 miles in 4 hours to come home from school party. what's the average speed that he was traveling? The information gathering technique that enables the analyst to collect facts and opinions from a wide range of geographically dispersed people quickly and with the least expense is the___________.a. document analysisb. interviewc. JAD sessiond. observatione. questionnaire The immigrant tenements in New York City lower east side had many challenges for Lillian Wald in giving nursing care. These challenges included: Over crowding, Insufficient lighting, No indoor plumbing TRUE or FALSE Learning to deal with anger includes which of the following steps?Expressing angry, aggressive feelings so everyone will know how you feel.Concentrating on the event that triggered your anger so that you won't forget it.Experimenting with alcohol and other drugs to numb the anger.Going for a run, listening to music, or doing something that redirects your anger into constructive behavior. What is the distance between (8, -3) and (4, 7)? How will you ensure that all of the network's applications and tcp/ip services also support ipv6? Carson Morris worked two separate jobs for Horwath Company during the week. Job A consisted of 36 hours at $16.00 per hour; Job B entailed 14 hours at $17.50 per hour. Determine his gross pay for that week if the employer uses the average rate basis for the overtime pay A 0.600 kg block is attached to a spring with spring constant 15 N/m. While the block is sitting at rest, a student hits it with a hammer and almost instantaneously gives it a speed of 44 cm/s. What is the amplitude of the subsequent oscillations? Answer should be in cm. What is the block's speed at the point where x= 0.70 A? Answer should be in cm/s. 15. Explain how you can make a prediction for the atomic mass from only the atomic mass of each isotope and the ratios of isotopes that are present. Steam Workshop Downloader