5. What term is used to describe the process by which objects of one class can link together and share common properties with objects of another class? a. Abstraction b. Inheritance c. Polymorphism d. Encapsulation 6. What is the process of using a function for more than one purpose. It allows the use of different internal structures of the object by keeping the same external interface. a. Inheritance b. Polymorphism c. Abstraction d. Encapsulation
Q: Definition of a System Development Methodology There Are Benefits to Using a Systems Development Met...
A: Introduction: It is said to as one of the most efficient approaches for designing systems in a metho...
Q: а. 10, 20, 30, 40, 50 (in decreasi b. 50, 40, 30, 20, 10 (in decreas: c. H, E, A, P, S, O, R, T (in ...
A: given - Analyze and evaluate the Heapsort algorithms as Transform-and-Conquer technique usea. 10, 20...
Q: Consider the Universal Set U= {1,2,3,...} and sets A={1,2,5,6} „B={2,5,7},C={1,3,5,7,9} the AIC is ....
A:
Q: What amount of storage space is needed for a single image?
A: Introduction: Photos may be a stored in the cloud or on fresh optical devices. But how much space do...
Q: Implement a unique_insert(int num) function which will receive a number as parameter and insert it i...
A: The question is to write a code for the given problem. As no language has been mentioned here C code...
Q: In what sense do you use the term "Computer Forensics"?
A: Step 1) Computer forensics : Computer Forensics: the process of collecting, preserving, analysing ...
Q: Why has the Macintosh environment become one of the most widely used computer graphics environments ...
A: Introduction: Macintosh graphics are one of the most significant components in the design of multime...
Q: REMINDER: - Every recursive function must have one or more base cases, - The general (recursive) cas...
A: The answer given as below:
Q: Identity management in information system security essay with an introduction, a methodology, and a ...
A: Introduction: The task of controlling data about customers on PCs is known as identity management. S...
Q: What exactly is a database management system (DBMS)? Make a list of the positives and downsides.
A: Introduction: A database management system is abbreviated as DBMS. It's a collection of applications...
Q: Given a 4-bit signed input P=P3P2P1P0 and a control input Z, use a 4-bit adder and any logic gates t...
A: 4-bit signed input P=P3P2P1P0 control input Z 4 bit added
Q: What is the purpose of MAC filtering? When, if ever, would you use deny filtering rules and when, if...
A: Do you utilize refuse filtering rules in Mac Filtering? If so, when would you use allow filtering ru...
Q: " Provides a flow of communication between the user and the comput
A: Sorry for that as per the bartleby guidelines we can solve only one question for you if you want to ...
Q: 1- A combinational circuit is defined by the following three functions: F1= XY+ XYZ F2= XY + XYZ F3=...
A: Here, we are going to design the circuit with a decoder and external gates for given 3 functions.
Q: What exactly is autoscaling in the context of Microsoft Azure?
A: Introduction: When resources are dynamically allocated to satisfy performance needs, this is referre...
Q: Sample Input/Output: Depicted below are sample outputs when the program is executed (the items in bo...
A:
Q: data quality in an organization's database, and what are the fac
A: data quality is very essential in an organization's database. Data quality is very important in tak...
Q: Explain how the database may become inconsistent if certain log entries related to a block are not p...
A: The database becomes inconsistent when certain log entries linked to a block are not stored to stabl...
Q: This type of data transmission allows data to be delivered in both directions on a signal carrier at...
A: Introduction: The data transmission mode in the present circumstance is full-duplex.
Q: Q1. The following string data is given to you: "Saudi Arabia traces its roots back to the earliest c...
A: use Regular expression re module to implement this and compile(), search() methods for creating re ...
Q: Explain why it is important that software products are developed and delivered quickly ?
A: Introduction Whenever a firm pays a service request, then sides agree on the project's timeline.
Q: In a short paragraph, explain how the Render Tree will differentiate from the DOM tree, and vice ver...
A: Solution: The DOM tree is essentially the tree containing all of your node HTML elements(nodes), wh...
Q: Fill in the blanks Given the array declaration below. Let i, j, k be the row, column and thíckness i...
A: In the question, we are given a 3- d array and based on its row, column and thickness we will answer...
Q: This syntax separates the execution of statements per labeled case so that there is no "fall-through...
A: The switch case has a switch variable and depending upon this switch variable the different switch c...
Q: Computer science What are the major advantages and disadvantages of cloud-based data storage?
A: Introduction: This question discusses the key advantages and disadvantages of cloud-based data stora...
Q: Computer science In many embedded systems, why are watchdog timers required?
A: Introduction: The following is the significance of a watchdog timer in embedded systems: The watchdo...
Q: (a) Write a linear time ( 6(n) ) divide and conquer algorithm to calculate x", that is x is raised t...
A: A int calculate(int x,int n) { if (n==0) return 1; else if (n%2==0) // if...
Q: Describe the System Management Mode in detail.
A: System Management Mode: System management mode was presented by the organization Intel, that is a wo...
Q: Investigate the many ways in which information systems are employed in various industries.
A: Introduction: It's worth noting that management support systems (MRS), decision support systems (DSS...
Q: Question 10 A [4 x 5] rectangular coding scheme is used. The received signal is given as follows: r=...
A:
Q: Q3 Devise a context-free grammar that generates L {wiw2 : w1, w2 E {0, 1}* and wi # w2}.
A: Context Free Grammar : - It's a type of formal grammar that generates all conceivable strings in a f...
Q: Let U=(2,-1,0,-3) ,V=(1,-1,-1,3) and W=(1,3,-2,2) then U.V is:
A: Lets see the solution.
Q: (a) Construct deterministic finite automata accepting the following languages: (i) {w e {0, 1}"| w i...
A:
Q: Length of walk is the number n of vertices. * O False Skip True
A: length of walks is not the number n of vertices
Q: What are the project deliverables for the software development project, exactly?
A: Introduction: All tangible and intangible results submitted within the scope of a project are referr...
Q: Question; Consider two hosts, A and B, connected by a single link of rate R bps. Suppose that the tw...
A: Express the propagation delay, ????? , in terms of m and s. Propagation Delay= (m meters) / (...
Q: Given: DFA M1 Transition Table Describe the Language L represented by DFA M1 over the alphabet = {a...
A:
Q: rite the minimized output Y for the logic circuit shown:
A: (((A+B)'.C'+(ABC))'®D)' ((((A+B)'.C')'.(ABC)')®D)' ((A+B+C).(ABC)'®D)' (ABC®D)' (ABC)'D+(ABC)D' ® in...
Q: Abstraction is an important tool against complexity. It helps encapsulate constructs which would be ...
A: #include<iostream.h>#include<conio.h>#include<math.h> struct complex{float rel;flo...
Q: A ___________ defines the appearance of a document element. a. list b. status c. site d. style
A: Style defines the appearance of a document element.
Q: hich of the following is the resulting NFA when Thompson's algorithm is plied to 0*(1+£) ?
A: 0*(1+€) means the NFA accepts zero or more 0's followed by 1 or €. Here even empty language is accep...
Q: 5. Consider the following transition table: q 6 (q, a) | 8 (q, b) | & (q, A) {2} {5} Ф 1 Ф Ф 2 {3} Ф...
A:
Q: What role does a security architecture play in the planning and implementation of a security infrast...
A: Creating and enforcing a security infrastructure using a security framework: « A security framework ...
Q: write a program to enter two numbers and print the largest number.
A: Here, we have to write a code in visual basic to find the largest number from given two input number...
Q: There are 2 mother nodes Motijheel, which is the source, and Moghbazar the destination. The other no...
A: Answer is given below-
Q: Which transport layer protocol do time-sensitive applications prefer to use at the transport layer?
A: -User datagram protocol (UDP) can be used for time sensitive applications. -UDP is a transport layer...
Q: Imagine that a major database vendor makes its database system (for example, Oracle or SQL Server DB...
A: Cloud computing makes it possible to only pay for the resources that are really used. If the organiz...
Q: When should a network update be scheduled?
A: Introduction: Network: It is a group of computers that pool their resources and make them available ...
Q: ____________ style sheet allows Web designers to modify the appearance of elements in different file...
A: _______________ style sheet allows Web designers to modify the appearance of elements in different f...
Q: Why is the top-down method preferable to the bottom-up method?
A: Introduction: The arguments for the superiority of the top-down method over the bottom-up approach a...
Step by step
Solved in 2 steps
- 1)In the C++ code segment below, which of the following are valid reasons for making vUnit a member of myClass2? class myClass1 { //other details omitted}; Class myClass2 { myClass1 vUnit; //other details omitted}; A)It allows for polymorphism. It models a has-a relationship in myClass2 to myClass1. B)It uses less memory that inheritance. C)It is a short-hand notation for inheritance. D)It gives myClass2 faster access to myClass1 than could be achieved via inheritance. 2)which of the following represent valid use cases of the ANSI C register storage class specifier? A)A for loop in which the loop index is declared in the initialization. B)A short int inside a block which will be passed by pointer to another function. C)An unsigned short defined inside a function combined with other quantities as a bitmask. D)A parameter list of an external function declared in a header file. E)A char array declare at file…Which (if any) of the following conditions are necessary for using polymorphism? Select all correct answers. The classes involved are in the same hierarchy. None of the classes can be abstract. All of the subclasses involved override the same method. The object reference cannot be of an interface type. An object reference of the superclass is used to call any methods. A superclass object is referenced by a subclass reference. Which of the following (if any) are true of abstract methods? Select all correct answers. Abstract methods must have a method body. Abstract methods cannot be declared in a class that isn't abstract itself. Abstract methods cannot be private or static. Abstract methods can only be declared in an interface. Abstract methods cannot be called. Constructor methods can be abstract.Which (if any) of the following conditions are necessary for using polymorphism? Select all correct answers. The classes involved are in the same hierarchy. None of the classes can be abstract. All of the subclasses involved override the same method. The object reference cannot be of an interface type. An object reference of the superclass is used to call any methods. A superclass object is referenced by a subclass reference. Which of the following (if any) are true of abstract methods? Select all correct answers. Abstract methods must have a method body. Abstract methods cannot be declared in a class that isn't abstract itself. Abstract methods cannot be private or static. Abstract methods can only be declared in an interface. Abstract methods cannot be called.
- 6.Which among the following is correct for the following code? class A { public : class B { public : B(int i): data(i) { } int data; } }; class C: public A { class D:public A::B{ }; }; i Multi-level inheritance is used, with nested classes ii Multiple inheritance is used, with nested classes iii Single level inheritance is used, with enclosing classes iv Single level inheritance is used, with both enclosing and nested classesWhat is a delegate object? Group of answer choices 1. It is a way to unit test your code, by delegating certain tests to one object, and other tests to another. This makes each test clear and puts all related tests in a single object. 2. It’s a way to reuse code through composition. We delegate certain responsibilities to an object that can handle those responsibilities. 3. It’s a way to reuse code through inheritance. The parent class is the delegate object because the child delegates certain responsibilities to the parent class by using the inherited methods without overriding. 4. A delegate object is when you create multiple instances of the same class. One object is created for certain purposes, while the other is delegated to take care of similar purposes. While both objects are from the same class they have different specific purposes.Which of the following are not true about inheritance? (Multiple choice can be selected) A It is the pillar of the OOP paradigm that states that a class' variables and methods can be duplicated by its child classes by inheriting them. B It is done to avoid duplication of codes. C It is used to conceal the implementation of codes. D It is used to protect the integrity of data. E None of the other choices are correct.
- Which of the following best describes inheritance? A. Ability of a class to derive members of another class as a part of its own definition B. Allows for implementation of elegant software that is well designed and easily modified C. Focuses on variables and passing of variables to functions D. Means of bundling instance variables and methods in order to restrict access to certain class members10) Which of the following statements about inheritance is true? Subclasses cannot access private fields and methods of their superclass Subclasses can override private methods of their superclass Subclasses can only inherit methods from their superclass, not fields Subclasses inherit all public and protected fields and methods of their superclass 11) Polymorphism is the ability of an object to take on multiple _____ 12) What is method overloading in Java? Creating a new method with the same name and parameters as a method in a superclass None Creating a new method with the same name but different parameters in the same class Creating a new method with a different name and parameters as a method in a superclasssolve this question using only java object oriented programming, also you will need do use a 4 files in driver class ,d1 will help you to understand the realation between the classes, and d3 to know the function in index A you must define a class named MediaRental that implements the MediaRentalInt interface functionality(index A). You must define classes that support the functionality specified by the interface:. Define a class named MediaRental. Feel free to add any instance variables you understand are needed or any private methods. Do not add any public methods (beyond the ones specified in the MediaRentalInt interface).. The media rental system keeps track of customers and media (movies ,music albums and games). A customerhas a name, address as string , a plan and two lists. One list represent the media the customer is interested inreceiving and the second one represents the media already received (rented) by the customer. There are twoplans a customer can have: UNLIMITED and…
- Which of the following statements are correct? (Select all that applies.) Group of answer choices a) Inheritance is the process by which one object can acquire the properties of another object. b) "super" is used to access the method or member variables from the parent class. c) Constructors are used to initialize a newly created object. d) Method overriding occurs when a child class declares a method that has the same type of arguments as a method declared by one of its parent classes. e) An object that has more than one form is referred to polymorphism.solve this question using java also you will need do use a file in driver class ,d1 will help you to understand the realation between the classes, and d3 to know the function in index A you must define a class named MediaRental that implements the MediaRentalInt interface functionality(index A). You must define classes that support the functionality specified by the interface:. Define a class named MediaRental. Feel free to add any instance variables you understand are needed or any private methods. Do not add any public methods (beyond the ones specified in the MediaRentalInt interface).. The media rental system keeps track of customers and media (movies ,music albums and games). A customerhas a name, address as string , a plan and two lists. One list represent the media the customer is interested inreceiving and the second one represents the media already received (rented) by the customer. There are twoplans a customer can have: UNLIMITED and LIMITED. UNLIMITED allows a customer to…Please help me explain the below. They are on classes and objects - Data Encapsulation Definition - What does a class comprise of? - What are the different access specifiers and the difference between them - What are accessor and mutator methods - How do you create an object for a class - What is data hiding? - What is a constructor used for? - How do you write a constructor for a class? - What is function overloading and constructor overloading? - What is the use of the this keyword? - Passing objects to methods - What is the toString Method used for?