which of the four fundamental features of object-oriented programming essentially means we can create classes from old classes, and the new ones inherent aspects of the old one?

Answers

Answer 1

The fundamental features of object-oriented programming that essentially means we can create classes from old classes, and the new ones inherent aspects of the old one is called inheritance.

What is inheritance?

Inheritance is the process of defining a new class based on an existing class. The existing class is referred to as the base class or superclass, while the new class is referred to as the derived class or subclass. The derived class inherits all of the base class's data fields and methods, and it may add new data fields and methods as well.The benefit of inheritance Inheritance enables programmers to build new classes from existing classes without having to create the original class from scratch.

Furthermore, it allows them to reuse the code that has already been developed and tested, resulting in faster and more reliable program development. Inheritance also promotes the creation of new classes that are closely related to existing classes, making code more manageable and maintainable.

To know more about object-oriented programming visit:

https://brainly.com/question/31741790

#SPJ11


Related Questions

Jonathan just purchased a second server so that he can split tasks between the two servers. What term can be used for this system

Answers

Database clustering allows Jonathan to just purchase a second server so that he can split tasks between the two servers.

What is Database clustering?

Database Clustering involves combining more than one server together such that tasks can be shared among them.

These servers can connect to a single database.

Therefore, Database clustering allows Jonathan to just purchase a second server so that he can split tasks between the two servers.

Learn more on server clustering here

https://brainly.com/question/7142205

Authentication is concerned with determining _______.

Answers

Authentication can be described as the process of determining whether someone or something is, in fact, who or what it says it is. Authentication technology serves us to access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server.

There are three basic kind of authentication. The first is knowledge-based — something like a password or PIN code that only the identified user would know. The second is property-based, meaning the user possesses an access card, key, key fob or authorized device unique to them. The third is biologically based.

You can learn more about authentication at https://brainly.com/question/28398310

#SPJ4

Smash Bros. Ultimate Images

Smash Bros. Ultimate Images
Smash Bros. Ultimate Images
Smash Bros. Ultimate Images
Smash Bros. Ultimate Images
Smash Bros. Ultimate Images

Answers

Answer:

I can't see the last one it is glitching

Explanation:

Besides a backup technician, who else would have encrypted backup passwords?

CEO

IT administrator

Data analyst

programmer ​

Answers

Answer:

CEO

Explanation:

your company has approximately 1000 laptop users where the laptops are company provided. users often hold sensitive data on their laptops. in order to ensure data protection, your company (wisely) decides to implement full-disk encryption on each laptop. all laptops come with at least 500 gb hard disks. which type of cipher would your company select for full disk encryption (i.e. for the actual encryption of data and not necessarily for protecting keys themselves) as you evaluate your options.

Answers

For full disk encryption on company-provided laptops, a strong and efficient cipher is essential to protect sensitive data from potential security breaches.

One of the most widely used ciphers for full disk encryption is AES (Advanced Encryption Standard) with a key size of 256 bits. This cipher is considered secure and provides high-speed encryption with minimal performance impact on the system. It is also supported by most operating systems and has been extensively tested for security vulnerabilities. Therefore, based on its security, speed, and compatibility, AES-256 would be the recommended cipher for full disk encryption on company-provided laptops.

To learn more about essential  click on the link below:

brainly.com/question/31203989

#SPJ11

What is greywater? A. waste water contaminated by human waste such as feces B. fresh water running out of taps and sinks C. waste water unpolluted by human waste such as feces D. salty water running out of taps and sinks E. purified water used for drinking purposes

Answers

Answer:

B. fresh water running out of taps and sinks

Explanation:

Greywater is simply the water that is created from activities such as showering, bathing or doing laundry.

Write a Console program, let users to enter prices calculate subtotal, tax, and total.

- Delcare variable data type as decimal (6 variables needed)
decimal apple;

- Conver string to decimal from input
apple = Convert.ToDecimal(Console.ReadLine());

- Do addition for subtotal

- Multiplication for tax (0.065M) --- M or m stands for money value, read page 94.

- Addition for total

- You need to show only two digits after decimal point
Console.WriteLine(" Subtotal: ${0}", String.Format("{0:0.00}", subTotal));



blank line: Console.WriteLine("")



Console.Write(" Apple: $");
apple = Convert.ToDecimal(Console.ReadLine());

Answers

Answer:

Explanation:

This is a project I already submitted, but I never received feedback. All my upcoming assignments will be based on this, so I wanted to make sure it is correct. I got this program to work as far as calculating the information, but I was hoping someone could please let me know if it meets the parameters/requirements?

I did attempt it. It works and adds the items exactly how the example showed in the video. However, I wanted to make sure my code is solid, and not just a mishmash or working because I got lucky, and if there is a better more solid way to do this I want to make sure I can. I do want feedback so I can learn and get better and I am trying my hardest. I always right out all the code I see here and try it and learn what it does piece by piece, because it helps me learn and improve. I also want to make sure it is going to work once I start the code for the next half of the requirements.

i cant really help they dont let us put codes on here

It is advised that Lian should use rubbing alcohol to clean what type of equipment?

Question 2 options:

desktop computer


laptop


computer keyboard


typewriter

Answers

Use rubbing alcohol as a disinfectant and as a degreaser! It dries almost instantly, so you don't need to worry about water damage.

What is desktop computer?A desktop computer is a computer that fits on or under a desk. They utilize peripheral devices for interaction, such as a keyboard and mouse for input, and display devices like a monitor, projector, or television. Desktop computers can have a horizontal or vertical (tower) form factor, or be combined with a monitor to create an All-in-One computer. Unlike a laptop, which is portable, desktop computers are generally made to stay at one location.A desktop computer is a personal computing device designed to fit on top of a typical office desk. It houses the physical hardware that makes a computer run and connects to input devices such as the monitor, keyboard and mouse users interact with.

To learn more about desktop computer refer to:

https://brainly.com/question/24309282

#SPJ1

The development of computer languages is classified into two categories .

true or false​

Answers

Answer:

False

Explanation:

Mark me as a brainliest

What do you hope that people see in your digital footprint 5 years from now? ​

Answers

Answer:

I hope they see me playing with my dog (who died a few months ago) Malikeye

Explanation:

none :)

Which icon indicates that a layer is protected?
The Lock icon
The Shield icon
0 The Key icon
19
The Eye icon

Answers

Answer:

The lock icon.

Explanation:

A padlock icon, or lock icon, displayed in a web browser indicates a secure mode where communications between browser and web server are encrypted.

Q5: Which two sensors would be used in an outdoor intruder safety light system?
Pressure sensor. Or motion sensor best answer shakl get brainliest

Answers

Answer:

Motion sensor.

Explanation:

I think it is easy to track the intruder with a motion sensor rather than with a pressure sensor

Ashley wants to know the oldest form of both water purification and waste disposal. Help Ashley determine the methods. The oldest method of water purification is . The oldest method of waste disposal is .

Answers

Answer: Distillation and Landfill

Explanation:

Distillation is the old method of water purification, these process involves the separation of compounds or components of a mixture based on their different boiling points. Today we have advanced method of seperation, although Distillation is still being used.

Land fill is one of the oldest form of waste disposal, these method involves digging up a large land mass(depending on the waste to be disposed) and dumping the water into the dugged land mass, then cover it up with the sand that was dugged out. Today, they are more advanced ways to handle wastes such as incinerator.

which term defines the practice of collecting evidence from computer systems to an accepted standard in a court of law?

Answers

A computer system is a basic, fully functional setup of hardware and software that includes every element required to carry out computing tasks.

Thus, It makes it possible for people to input, process, and output data efficiently and methodically. A computer system is made up of a number of interconnected, integrated components that work together to complete one or more tasks.

It frequently includes both hardware and software components, including as memory, input/output devices, storage devices, drivers, operating systems, programs, and CPUs.

The invention of mechanical calculators in the early 19th century can be credited as the beginning of computer systems. These devices were developed to carry out calculations. But the actual progress of computer systems began with the introduction of electronic computers.

Thus, A computer system is a basic, fully functional setup of hardware and software that includes every element required to carry out computing tasks.

Learn more about Computer system, refer to the link:

https://brainly.com/question/14583494

#SPJ1

IS EVERYONE ASLEEP!!!!
where the smart people at

PLEASEEEEE HELPPPPPP


you can use the [nav] element to contain the major navigational blocks on the page, as well as links to such things as


a. privacy policy, terms, and conditions.

b. [div] elements

c. header and footer information

d. [article] and [section] elements

Answers

Answer:

a. privacy policy, terms, and conditions

Explanation:

The nav element usually includes links to other pages within the website. Common content that is found within a webpage footer includes copyright information, contact information, and page links

What does disabled clipboard mean on Proctorio?

Answers

Proctorio disables the computer's clipboard by disabling its system's ability to paste and copy information. Copying and pasting text from or into the exam window as it is open is not permitted.

Describe a computer.

A computer is indeed a piece of electrical equipment used to manipulate data or information. It will have the power to store, acquire, and process data. You probably are aware of the reality that you are able use a computer to play games, send emails, browse the web, and compose papers.

What word best sums up a computer?

A computer is an item or equipment that follows instructions from a hardware or software program to carry out tasks, computations, and activities.

To know more about computer's visit:

https://brainly.com/question/20414679

#SPJ1

Final answer:

In Proctorio, 'disabled clipboard' means that the copy and paste feature has been turned off to maintain the integrity of exam processes. This restricts cheating by stopping students from pasting in outside information or sharing the test questions or answers.

Explanation:

In the context of Proctorio, a tool used predominantly for online proctoring during exams, 'disabled clipboard' means that the copy-paste feature has been disabled. This is often done to maintain the integrity of the examination process, preventing students from copying and pasting information from outside sources into the test. It also restricts the capacity for sharing test questions or answers inappropriately.

It's important to note that these set measures can vary depending on the settings chosen by the instructor or institution administering the exam. Some may enable the clipboard, some may limit its usage, and others might disable it entirely.

Learn more about Disabled Clipboard here:

https://brainly.com/question/32111024

What is the correct order or a technological system?

A Input, Output, Process
B Output, Process, Input
C Input, Process, Output
D Process, Resources, Output


POV : the topic is fcm aka family consumer management i don't see any topic for that so i put a different one plz help

Answers

Answer

C

Explanation:

In a system you have to send on input data, then the application processes it and then it returns your output

PLEASE HELP THANK YOU
1. In programming, what is a string?
-Built-in module containing pre-written code for numeric and non-numeric data types -Cable connecting numeric and non-numeric data to the computer hardware
-Function used to print numeric and non-numeric data exactly as they are written
-Non-numeric data, consisting of a sequence of letters, numbers, spaces, and symbols

2. A runtime error means there is a problem with the computer's hardware, making it impossible to execute a program.
-True
-False

3. Which of the following is an example of a logic error in programming?
-Not using quotation marks and parentheses to print a string literal
-Printing an inaccurate statement, like print ("Dogs have wings.")
-Trying to perform an impossible task, like 5 / 0 -Using camelcase when a variable name contains two or more words

4. Which of the following is the proper way to assign a string literal value to a variable in Python?
-variableName = value -variableName = "value" -variable Name = value -variable Name = "value"

5. Read the following code used to calculate the total cost of a meal with a 20% tip:

mealCost = input ("What is the meal total?")
tip = mealCost *mealcost 0.20 totalcost = meal + tip

There is an error in the code. Which additional function needs to be used with the input() function?
-float()
-int ()
-print ()
-str()

Answers

Answer:

1) A string is "non-numeric data".  In other words, it is text.

2) False, a runtime error means that there is a problem, but it will be with the software, not the hardware.

3) An impossible task such as dividing five by zero is a logical error.  Not using quotes on a string would be a syntax error, printing an inaccurate statement is not an error at all (as far as the program is concerned anyway), and using camelcase on a variable with multiple words is a common convention.

4) variableName = "value"

5) The code provided here is illegible, so I can't give a straight answer. It seems to be missing operators.

the type of secondary storage device that uses rigid metallic platters to store programs and very large data files.

Answers

The type of secondary storage device that uses rigid metallic platters to store programs and very large data files is a hard disk.

Hard disks use rigid metallic platters that provide a large amount of storage capacity. They store data and programs by altering the electromagnetic charges on the platter's surface. Hard disks are typically used to store programs and very large data files , and are often used as the primary storage device in a computer system.

A hard disk is a non-volatile storage device used to store digital data. It contains one or more spinning platters that are coated with magnetic material. When the disk spins, a read/write head moves across the platters, which can magnetically read and write data. Hard disks are used for long-term storage of large amounts of data, and are typically much larger than other storage devices like RAM, USB flash drives, and solid-state drives. Hard disks are also relatively inexpensive and are often used in computers, laptops, and other devices for long-term storage.

Learn more about hard disk:

https://brainly.com/question/28476555

#SPJ4

where you can restrict data put into a table, you can change things such as if a field is required or the number of characters allowed. breakup report properties query

Answers

The place where you can restrict data put into a table, you can change things such as if a field is required or the number of characters allowed is the query.

What happens when data that doesn't conform to a validation rule is entered in Access?

A message box alerting the user to the issue is automatically displayed by Access when data is entered that doesn't comply with a validation rule. The AND and OR operators can be combined in a single query. A copy of your database is made using the Back Up Database option.

The way Access data entry be limited are:

Make a rule for record validation.Open the table whose records you want to verify.Click Record Validation Rule after clicking Validation in the Field Validation group on the Fields tab.Make the rule using the Expression Builder.

Learn more about query from

https://brainly.com/question/25694408
#SPJ1

Which method is the most common way used to select the multiple cells shown in the image click and drag method Ctrl key method Shift key method?

Answers

Click and drag method is the most common way used t select multiple cells.

What does the click-and-drag method mean?

A mouse is a strong tool for file selection, and the "drag and drop" feature is a basic and necessary ability for any computer user. Drag and drop is supported by the majority of apps and systems. Learning this technique will help you save time while transferring, copying, or opening files.

In drag and drop, with the help of a left-mouse button, the required cells are clicked and selected by dragging so that different operations can be performed on the data either deletion, updating, copying, etc.

This way the required cells are selected and operations are performed as per the requirements in the table.

To know more about click and drag method, visit:

https://brainly.com/question/25874600

#SPJ1

what is the primary protocol used by cisco ise to exchange policy information with other network components?

Answers

The primary protocol used by  Cisco ISE  to exchange policy information with other network components is pxGrid .

What is pxGrid?

Cisco Platform Exchange Grid (pxGrid) enables multivendor, cross-platform network system collaboration between components of the IT infrastructure like security monitoring and detection systems, network policy platforms, asset and configuration management, identity and access management platforms, and practically any other...

Therefore, The  pxGrid is considered a protocol and it is a protocol framework of high level mechanisms called pxGrid can be used with any kind of transport protocol. It doesn't bind to any transport.

Learn more about network components from

https://brainly.com/question/24133891
#SPJ1

Which of the following best describes what a long-term goal is?

Answers

What are the options?

how do I fix this tech problem I'm having when I press ctrl it mute my sound and when I press the windows key on my keyboard it turns the pc off how to fix this issue


this was not happening yesterday please help me ​

how do I fix this tech problem I'm having when I press ctrl it mute my sound and when I press the windows

Answers

Answer:

You can try reinstalling your keyboard drivers.

You can do this by right clicking the windows icon in the bottom left and click on Device Manager, find the keyboard tab and expand it, right click on your keyboard driver (it will be the same name as your keyboard, or it might have a generic name), then right click it, and press uninstall, then restart your computer to see if it worked.

If that didn't work, you can try reinstalling the USB controller drivers.

You go into device manager just like before, but find the 'Universal Serial Bus controllers' tab and uninstall the devices there, then restart.

If neither of those work, you sadly might have to get another keyboard.

Hope this helps

Programmers do which of the following tasks? Build and maintain computer equipment and network connections Design graphics for websites and web pages Repair computers and servers Write codes that tell computers what commands to follow

Answers

It can be inferred that Programmers do the following tasks: "Write codes that tell computers what commands to follow" (Option D)

What else do programmers do?

Computer programmers create, build, and test software to ensure it meets performance, reliability, and security standards. Computer programmers may create mobile applications, video games, and websites, among other things.

Other examples of what programmers do include:

Creating and testing new software codeExisting programs are being updated.Detecting and repairing coding mistakesRewriting programs for several operating systems.Protect programs from cybersecurity threats.

Programming is often regarded as one of the most difficult skills to master. Given how different it is from traditional types of instruction, such as college degrees in computer science, it's easy to see why some individuals struggle to learn how to code.

There are several reasons to like coding, both technically and philosophically. You can enhance your thinking, rewire your brain, and create fantastic software the possibilities and effects are practically limitless. Programming can truly enable you to make a difference in the world.

Learn more about programmers:
https://brainly.com/question/28085858
#SPJ1

Subject me not to trials,shame not my human form. "Explain".​

Answers

A girl living in a society where everyone has plastic surgery makes her feel increasingly out of place in the Korean body horror short Human Form.

What is Human form?

This animated short is a commentary on plastic surgery and humanity's obsession with what is considered to be "beauty," where we frequently idolize appearances.

It are impossible to achieve naturally and judge natural appearances as not looking "good enough" (which makes everyone a potential "fixer-upper" and gives the beauty industry more and more profits).

And given that several Asian nations have absurd beauty standards, this South Korean short is the ideal commentary on everything.

Therefore, A girl living in a society where everyone has plastic surgery makes her feel increasingly out of place in the Korean body horror short Human Form.

To learn more about Human form, refer to the link:
https://brainly.com/question/8509952

#SPJ5

Answer:

The poet seems to be humiliated and condemns himself for being human just physically. He is sure if Allah subjects him to examination, he would not be successful in it because he cannot tolerate or withstand them like a perfect human being.

Explanation:

Hope it will help ...

Logitech g610 orion red backlit mechanical gaming keyboard.

Answers

When comparing different gaming keyboards, it is important to consider factors such as key switches, build quality, and additional features. In this case, we will examine the Logitech Orion Red Backlit Mechanical Gaming Keyboard.

The Logitech G610 Orion Red features Cherry MX Red mechanical key switches, which are known for their linear, smooth, and quiet keystrokes. The build quality of the keyboard is solid, as it is made with a durable plastic frame and has a matte finish. The keyboard also includes customizable red LED backlighting, which allows users to adjust the brightness and create various lighting effects. Additionally, the Logitech G610 Orion Red offers dedicated media controls, programmable macro keys, and is compatible with the Logitech Gaming Software for further customization.

Overall, the Logitech G610 Orion Red Backlit Mechanical Gaming Keyboard is a reliable and high-quality option for gamers who prefer a smooth and quiet typing experience. With its customizable backlighting and additional features, it is a great choice for enhancing your gaming setup.

To learn more about Logitech, visit:

https://brainly.com/question/15564024

#SPJ11

While using web queries rich text formatting is typically used if we wish to ______.

Answers

While using web queries rich text formatting is typically used if we wish to reproduce web page data in a format close to that of the original.

What do you mean by a web page?A browser may see a simple document known as a web page.The HTML coding language is used to produce these publications.A web page may contain a wide range of resources, such as style information, which controls the page's look and feel.Elements are used to create a web page's structure as well as to communicate information in a variety of ways.JAWS interacts with these elements to provide you with the information you need to view the page's contents.

To learn more about HTML refer,

https://brainly.com/question/21636700

#SPJ4

Explain how malware can be used in cyber warfare or a cyber terrorism attack on a country?

Answers

Answer:

Malware can be utilized to damage infrastructure that utilizes computers. It can manipulate what a computer is doing. In this way, a piece of malware could be designed to target government operations, such as government office computers, and then steal and wipe data from a computer. In other ways, a piece of malware could target the water supply control computers, and removing safety features, or target the power grid. This is why infrastructure necessary for day to day life and survival should be separate from the Internet, which can remove a major vulnerability.

John wants to know the amount of ram memory installed on his computer. in which category of the windows 7 control panel can this information be found?

Answers

John can find the amount of Random Access Memory (RAM) memory installed on his computer with the Windows 7 under the category “System and Security” in the Control Panel.

To know the total amount of installed RAM through Control Panel in the computer with Windows 7, John should follow the steps as:

Click the Windows key Type Control Panel Click the category named “System and Security” Now under “System”, click “View amount of RAM and processor speed” “Device Specifications” section displays the amount of installed RAM in John’s computer

Thus, above are the steps by which John’s can find the amount of installed RAM in his Windows 7 computer’s Control Panel.

What is Random Access Memory (RAM)?

RAM is the temporary memory in computers that stores the data currently being used by the processor.

You can learn more about Control Panel at

https://brainly.com/question/1445737

#SPJ4

Other Questions
The volume of a cube depends on the length of its sides. This can be written in function notation as v(s). What is the best interpretation of v(3)=27?A. # sides of the cube have a total length of 27 feet.B. A cube with side lengths of 3 feet has a volume of 27 cubic feet.C. A cube with a volume of 3 cubic feet has side lengths of 27 feet.D. 3 of these cubes will have a total volume of 27 cubic feet. Sketch the families of level curves of u and v for the following func- tions f = u + iv. (a) f(z) = 1/2, (b) f(z) = 1/22, (c) f(z) = 20. Determine where f(z) is conformal and where it is not conformal. 2. Sketch the families of level curves of u and v for f(2) = Log z = utiv. Relate your sketch to one of the figures in this section. 3. Sketch the families of level curves of u and v for the functions f = u+iv given by (a) f(z) = e?, (b) f(z) = eaz, where a is complex. Determine where f(z) is conformal and where it is not conformal. What are the 4 ethical considerations? true or false. The law of conservation of charge states that the total charge of an area changes as electrons are lost to the environment. review the discussion section of the research article. according to the authors, what component of a pesco vegetarian diet may account for the results observed in this analysis? How many minutes does it take to travel 11 miles if your average speed is 55 miles per hour?(Remember to convert 1 hour = 60 minutes) conflict theorists believe that arguments over values and beliefs have their roots in: FRENCH - Telling TimeAny help on this would be great and thank you! B. Calculate the mass of the following compounds using dimensional analysis:7.5 moles of C6H1206180.8 3.0 moles of NaCl..18.2x5= 5.0 moles of H2O91 I NEED YOUR URGENT HELP PLEASE FOR BRANLY What do the officer ranks in the us military consist of Help please :Dlook at the photo (im really bad at this if a person with a mass of 70kg is standing on scale in an elevator when the cable snaps, what will the reading on the scale be during free-fall? 2. Use an integral to find the area above the curve y=-e* + e(2x-3) and below the x-axis, for x 20. You need to use a graph to answer this question. You will not receive any credit if you use the meth A football player runs due east for 30 yards then cuts up the field due north for adistance of 35 yards before running into the end zone.What is the total displacement of the football player? What is a state and county? Correct the one error.ALL DOG'S MUST BE ON LEASHES Compared to the cells in a healthy body, Elisas cells are getting far fewer _________ molecules. Slete the following: Find the intercepts and domain and perform the symmetry test on each of the following hyperbolas. (a) 9x2 - 16y2 = 144 (g) -9x2 + 16y2 = 144 Graph the vertices, foci, endpoints of the conjugate axis, fundamental rectangle, and asymptotes, then draw the hyperbola for each equation in problem 1. = (6) 9x - y = 9 (d) 2532 - 36 = 900 (1) -25x + 4y = 100 (h) x + 4y = 16 of the martial hyperbola with equation finib ? - al. Find the length of AB using (c) 25x2 4y2 = 100 (e) x2 + y2 = 1 2. Whichof the following settings are appropriate applications of clusteranalysis? (select all that apply)Arecommender system that seeks to predict the rating or preference that a userwould give to an item (e.g., a movie, a book, or a restaurant).A delivery schedulingsystem that assigns delivery trucks to customers in the same generalgeographical areaA cablecompany seeking to identify the number and type of TV packages to offer (e.g.,Basic, Sports, Entertainment, or Premium).An inventory managementsystem for retail pharmacies that attempts to minimize both the probability ofrunning out of stock and the inventory carrying cost.