in object oriented programming what is a constructor?

a. the attributes that allow a programmer to imagine a new object
b. the behaviors that allow a programmer to design a new object
c. the code that allows a programmer to create a new object
d. the template that allows a programmer to modify a new object

Answers

Answer 1

Answer:

The answer is A.

Answer 2

Answer:

A. the attributes that allow a programmer to imagine a new object

Explanation:

Got the answer right on the test!


Related Questions

How do I make my mobile number appears switched off to a specific number not with truecaller app...(vivo user)​

Answers

Answer:

Hello, there is no way you can make your mobile number appear switched off to a particular number unless you really switch it off.

However, you can set your phone to "Call Forwarding" on your Android device. What it would do is that when the person calls your number, he gets the message that you are unreachable.

Explanation:

Here's how to set Call Forwarding on your android

Open your phone dialerGo to your Phone Settings Click on Call SettingsSelect Call Forwarding (in some Androids, you'll have to select 'Calling Accounts' first)Select 'Always Forward', 'When Busy', 'When Unanswered' or 'When Unreachable'After selecting your preferred option, you can set the forwarding numberEnable the settings or click 'Ok'

What is the "online disinhibition effect"?​

Answers

Answer:

Online disinhibition is the lack of restraint one feels when communicating online in comparison to communicating in-person.

Discuss three ways in which errors can arise in developing and executing linear optimization models in business situations, and indicate some of the business consequences of such errors. Explain how analytics professionals can help to prevent such errors.

Answers

Answer:

The following are the three-way, in which errors arise and, the process to solve them.

Explanation:

The mistake is something you did, that could not be incorrect. It may consider errors when creating and implementing simulation models in business situations because of some procedure problems. It is not because of bemusement and a few of the other error types were also acceptable even though the correction is affordable.

Type 1 error:  This type of error arises due to limited accuracy issues, in this the gadgets or devices used for the simulation study, quantitative measurements. These errors Often simplified in expectations. It is a concept for analysis, in which experts firstly understand this kind of mistake.  Type 2 error:  These errors may occur due to inaccuracy. If another analytic method behaves differently for two analysts. It tends to cause errors, that are unrecognized by no pre-defined methods for fixing those errors. Type 3 error:  These issues can be reduced by the improper selection of software, and in the implementation period, it can consider this sort of error due to the failure of system integration tools.

What type of camera is a cell phone camera? A.) DSLR B.) manual C.) compact D.) zoom

Answers

Answer:

The correct option is;

D.) Zoom

Explanation:

The six types of camera found on smart phones includes the monochrome, macro camera, ultra-wide camera, periscope zoom camera, the main phone camera, and the depth sensor camera

The zoom cameras on smart phones can be found mainly in the top range models of smart phones due to the costs of the camera components including the sensor.

Smart phones also have digital zooming that make use of the high mega pixels that come with the phone.

15 points please help!!!!


David works at a company that provides financial solutions. He wants to create an interactive presentation for his company. Which interactive platforms can David use for this presentation?

David can use an interactive or a for his presentation.

Answers

Answer:

Powerpoint presentation

Explanation:

Powerpoint presentation is a part of Microsoft office that is established by Microsoft. PowerPoint. It is used to present the company visions, missions, key points in a short and in an attractive way by using the various designs, pictures, audio clips, etc

Here David wants to create an interactive presentation so he should use the powerpoint presentations so that he could present the company visions, objectives, etc

What steps are needed for word to create an index

Answers

Answer:

Do this:

Position the insertion pointer where you want the index to appear. If you want the index to start on a new page, create a new page in Word. ...

Click the References tab.

In the Index group, click the Insert Index button. The Index dialog box appears. ...

Click the OK button to insert the index into your document.

Answer:

Position the insertion pointer where you want the index to appear.

(the insertion point is the point where the next characters typed from the keyboard will appear)

If you want the index to start on a new page, create a new page in the program you're using

Then you click the References tab.

In the Index group, click the Insert Index button.

When the Index dialog box appears, click the OK button to insert the index into your document.

Website reputation is an important part of page quality (PQ) rating. Reputation can justify the Highest rating and the Lowest rating.

Answers

Answer:

The given statement is false.

Explanation:

A Website reputation seems to be a built-in feature or tool. It retains knowledge about users, through visiting pages. The committed resources for this site depending on either the website as well as the basic details about its design. The reputation including its Website has been used to strengthen the safety of phishing attacks or malicious content.

Therefore the solution given above is the right one.

How a student can use computer to improve academic performance?

Answers

Answer:

k Nishant

Explanation:

he can learn many things internet by using computer he change his self by learning about many things

Answer:

A student can use it by searching up things with his/her computer.

Browse for different new things everyday that gives knowledge.

Ask questions.

Do new things everyday.

A computer can easily input grades and send data.

Explanation:

Okay.

learn to accept your mistakes even when you have done your ​

Answers

Answer:

besttttttttttttttttttttttt

Answer: done your best :)

what's the answer to this​

Answers

Answer:

S

Explanation:

The index operator will address individual characters in the string.

Upon running the ifconfig command, the IP address is listed along with the subnet mask in dotted decimal notation listed as 255.255.255.224. You have installed a remote access software that has an address field that requires the address to be configured in CIDR notation. Which of the following is the equivalent CIDR notation for the subnet mask listed?a. /23b. /24c. /27d. /28

Answers

Answer:

The answer is "Option c"

Explanation:

In the given question only option c is correct because "/27" is the IP "255.255.255.224" is the same as "/27" in the terminology in CIDR, in which it uses the compact IP address as well as corresponding prefix expression and it terminology consists of an IP with a slash ('/') or a decimal number. Its count of 1-bit proceeding to the mask traditionally referred to it as the network mask.

i will mark brainalist! ​

Answers

Answer:

I would say

1) Weather Station

2) (word missing)

3) Robot perihen devices

4) Bit

5) Primary Key

6) Algorithim

7) Flow Chart

8) Table Wizard

9) Design View

10) SIMS

Answer:

i think it would be 1) Weather Station

2) (word missing)

3) Robot perihen devices

4) Bit

5) Primary Key

6) Algorithim

7) Flow Chart

8) Table Wizard

9) Design View

10) SIMS

Explanation:

A system has defined specifications that describe how signals are sent over connections. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model provides this function

Answers

Answer:

"Transport" is the correct answer.

Explanation:

Two platforms resemble the transport layer: TCP, as well as UDP. This same different network IP protocol continues to provide a sequence number to the target server from some kind of destination node. That whenever a server user requests to another server, that indicates the enslaved person delivers a response to a network interface.

So that the above would be the correct approach.

Which function will add a grade to a student's list of grades in Python? add() append() print() sort()

Answers

Answer:

It will be add()

Answer:

A

Explanation:

(Rocks Mineral
When limestone undergoes several changes, it forms
2
(marblelse
PA
For
the
are underground natural resources.
3. Metals are extracted from their
4. Molten rock inside the earth is called
5.
is used in making glass.
L
(magmalla
(Limestone/Sla
Yo
# Science-5​

Answers

Answer:

TENDRIAS QUE PONER LA PREGUNTA MEJOR

Explanation:

Identify characteristics of structured programming design. Choose all that apply.
The code is easy to test and debug.
It creates a program made of modules that can be called when needed.
The code is difficult to modify due to the use of modules.
It uses logic flow.
The code is easier to follow.
The code is easier to modify.

Answers

Answer:

The correct options are;

The code is easy to test and debug

It creates programs made of modules that can be called when needed

It uses logic flow

The code is easier to follow

The code is easier to modify

Explanation:

The approach of structural programming is one such that the problem is well understood and the solution is economical

Features of structural programming includes;

Error debugging are facilitated by structural programs and as such testing to debugStructural program creates program modules that are reusableStructural programs can be easily modified hence maintainedStructural program emphasizes on logicThe structural program code is easily read and understood, and therefore, it is easier to follow

Answer:

A.B.D.E.F.

Explanation:

pretty much everything except C.

:)

You administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. You want the routers on the network to send you notices when they have exceeded specified performance thresholds. Which protocol should you use to enable the routers to send the notices

Answers

Complete Question:

You administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. You want the routers on the network to send you notices when they have exceeded specified performance thresholds. Which protocol should you use to enable the routers to send the notices?

Group of answer choices

A. ARP

B. SMTP

C. SNMP

D. Telnet

Answer:

C. SNMP.

Explanation:

In this scenario, you administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. Also, you want the routers on the network to send you notices when they have exceeded specified performance thresholds. Hence, you should use the SNMP to enable the routers to send the notices.

SNMP is an acronym for simple network management protocol, which is a standardized application-layer protocol that is used for monitoring and organizing management information about network devices on either a wide area network (WAN) or local area network (LAN).

Basically, the SNMP helps to provide a common language for network devices such as switches, routers, printers, servers etc to share information with a network management system.

A simple network management protocol (SNMP) is part of the Transmission Control Protocol and Internet Protocol (TCP⁄IP) suite.

What are responsibilities of entrepreneurs? Check all of the boxes that apply.
to own businesses
to work for companies
to be responsible for employees
to be responsible to stakeholders

Answers

to own businesses and to be responsible for employees

Joshua needs to store all of his music (over 2 GB), his movies (4GB), and his pictures (1GB). He wants to be able to access his media wherever he goes. He needs a cheap storage solution. Which type of storage would be best for Joshua?

Answers

Answer:Cloud storage

Explanation:I think that the cloud storage would be his best choice, because there are free cloud storages for use and all you need is access to the internet to upload or download files from them.

An agile team used planning poker to estimate user stories. After all team members read a user story, the facilitator asks everyone to choose a card with estimated number of ideal days to complete a user story and then reveal the card. If estimates were widely different, the facilitator would immediately ask for re-estimates until all the estimates converge. What did the facilitator do wrong?
A. Participants used ideal days as the unit for the estimates.
B. Participants re-estimated immediately after everyone revealed their cards.
C. Cards were revealed when the process should have been anonymous.
D. The facilitator did nothing wrong and played by the rules.

Answers

Answer:

The answer is "Option B"

Explanation:

In the given-choices, the only option B is correct because by reassessing instantly, the team loses is its advantage of debating its projections and how it chose those assessments, and the wrong choice can be defined as follows:

In choice A, Mostly as a unit for the projections, respondents should not use the ideal days.  In choice C, Whenever the procedure should've been anonymous, no cards were released. In choice D, Its mediator was incorrect and the laws were followed.

A user has multiple web pages open and is using email. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for sorting the data to send email and web pages to the appropriate location

Answers

Answer: Transport layer

Explanation: The Transmission Control Protocol / Internet Protocol both combine to aid aod transmission of data through the internet. While the Transmission control protocol handles the establishment and Maintainace of network connection through applications , the Internet Protocol handles how the established data is being sent. The Transmission Control Protocol is forms a part of the transport layer which aids in the data transmission m ensuring that data is sent to the correct source. The transport layer is able to avoid errors as it ensures that established c is nnectio is maintained until data exchange is complete.

List out analog computer​

Answers

Answer:

1. Wall clocks.

2. Analog watches

3. Measuring instruments with callibration

Explanation:

Declare an array of int values westboundHollandTunnelTraffic that can store the number of vehicles going westbound through the Holland Tunnel - on a particular hour (numbered 0 through 23) - on a particular day (numbered 0 through 6) - on a particular week (numbered 0 through 51) - over the last ten years (numbered 0 through 9). The innermost dimension should be years, with the next being weeks, and so on.

Answers

Answer:

Following are the declaration of the array:

int westboundHollandTunnelTraffic [10] [52] [7] [24];  //defining an integer array  that holds days, week, hour, and year value

Explanation:

In the above-given code, an array that's name is " westboundHollandTunnelTraffic " is declared and the type of the storing elements in the array is an integer.

In this array, it first stores the year's value, and in second, it stores week values, in third, it stores day value, and the last it stores hours value.    

What tends to happen to the accuracy of our savings goals as our investment horizon becomes longer? A. It is not useful to have long-term savings goals. B. We are less able to accurately estimate the amount we will need. C. We can estimate the amount we need more accurately. D. The accuracy of our savings goals doesn't change.

Answers

Answer:

The answer is "Option B".

Explanation:

The Secured Goals are a part of your account, which is configured to just save your cash and also save it, and all the differences are good dividend savings accounts to shield this from accidental expenses. While opening the protected savings fund, the saving goal would be automatically created or loan rates invested only at the end of each month, that's why in this question "option B" is correct.

The less able to the accurate estimate of the amount we will require. Thus the option B is correct.

What is the saving goals of investment?

The saving or the secured Goal is a part of the account, it tells how to adjust and configure your save. When opening the protected saving fund the dating goal would be automatically to create the loan and rate the investment at the end of the month. Thus we can accurately estimate the amount we need.

Find out more information about the saving goals.

brainly.com/question/6903609

1. Here is a program segment to find the quantity base . Both base and exp are entered at the keyboard. System.out.println("Enter base and exponent: "); double base = IO.readDouble();// read user input double exp = IO.readDouble(); // read user input /* code to find power, which equals baseexp */ System.out.print(base + " raised to the power " + exp); System.out.println(" equals " + power); Which code is a correct replacement for /* code to find power, which equals baseexp */ ?

Answers

Answer:

The correct code to this question can be de4fined as follows:

double power;

power = Math.pow(base, exp);

Explanation:

In the given question the choices were missing, that's why we defined the correct code only.

In the given code a two double variable "base and exp" is declared, that input the value from the user-side, and store its value into there respective variables. In the next step, "power", that is a double variable is declared, which uses the  "Math.pow" function that calculates given values power and prints its value.

please find the attachment of the full code.

The application layer process that sends mail uses __________. When a client sends email, the client process connects with a server process on well-known port __________. A client retrieves email, however, using one of two application layer protocols: ________ or ________. With ________, mail is downloaded from the server to the client and then deleted on the server. The server starts the __________ service by passively listening on TCP port __________ for client connection requests. However, when a client connects to ta server running __________, copies of the messages are downloaded to the client applications. The original messages are kept on the server until they are manually deleted.

Answers

Answer:

1. SMTP.

2. 25.

3. POP.

4. IMAP.

5. POP.

6. POP.

7. 110.

8. IMAP-capable server.

Explanation:

The application layer process that sends mail uses Simple Mail Transfer Protocol (SMTP). When a client sends email, the client process connects with a server process on well-known port 25. A client retrieves email, however, using one of two application layer protocols: Post Office Protocol (POP) or Internet Message Access Protocol (IMAP). With POP, mail is downloaded from the server to the client and then deleted on the server. The server starts the POP service by passively listening on TCP port 110 for client connection requests. However, when a client connects to a server running IMAP, copies of the messages are downloaded to the client applications. The original messages are kept on the server until they are manually deleted.

What is the key function of a sales team?
A. to maintain customer-retailer interaction
B. to create appealing advertisements
C. to maintain fan–developer communication
D. to develop customer–fan relationships

Answers

Answer:

A. to maintain customer-retailer interaction

Explanation:

A sales team is a subdivision in a company that is dedicated to making sales for the company and they are responsible for meeting the growth goals of that company.

The key function of a sales team is to maintain a healthy customer-retailer relationship or interaction because it is from this good relationship that goods and services are sold.

client, Warren, reports CMOS mismatch errors at startup. Further conversation with Warren reveals that he had forgotten the startup password he assigned in CMOS, and he had to clear all CMOS settings for his computer to complete a successful startup. Although he can now start his computer, he continues to observe CMOS errors each time he starts the computer. He replaced the CMOS battery, but the problem continues. Which component should you investigate first to resolve the problem

Answers

Answer:

The answer is "The system board jumper settings "

Explanation:

It must first look only at jumpers configurations of its computer motherboard, especially that runner used it to clear the CMOS configuration.

This Jumper is a couple of connecting points positioned also on computer CPU socket or connector card, electric contacts. It placed to jump on the pads, which completes a contact, once they set a jumper. It acts as a switch if an electrical grid is closed or opened.

You find a list of websites that relate to your chosen topic and click on the first one. You ask yourself the three questions presented in this lesson to see if this site is reliable: 1) Who wrote it? There isn't an author listed anywhere that you can find. 2) What type of site is it? The site name ends in . 3) How current is the information? You see the site was updated yesterday. Is this website reliable and worth examining further? True or False?

Answers

Answer:

False

Explanation:

Information reliability is essential in production. sourcing information from a reliable source is base on several criteria. They are; the author of the resource file, the type of media platform holding the information, the frequent revision of the information, additional support or collaboration to publish public information, etc.

A government website ( with the site-address ending with a '.gov' ) which is concurrently revised by the institute, gives a piece genuine and reliable information, whereas a commercial website with no author and just recently revised or published, would be judged as an unreliable source of information

What purpose does the underlined portion of this excerpt

serve in the argument that Americans should agree to pay

more taxes to raise money for entering the war?

Answers

Answer:

The below mentioned portion is missing from the question

A part of the sacrifice means the payment of more money in taxes. In my Budget Message I shall recommend that a greater portion of this great defense program be paid for from taxation than we are paying today. No person should try, or be allowed, to get rich out of this program; and the principle of tax payments in accordance with ability to pay should be constantly before our eyes to guide our legislation.

The passage provides the reason why extra taxes must be collected should America decide to join the war  or it introduces the claim that patriotic Americans should be willing to sacrifice and pay extra taxes.

Other Questions
Walter Utilities is a dividend-paying company and is expected to pay an annual dividend of $1.45 at the end of the year. Its dividend is expected to grow at a constant rate of 6.50% per year. If Walter's stock currently trades for $15.00 per share, what is the expected rate of return? Which of the following best describes the graph shown below?16A1114O A This is the graph of a linear functionB. This is the graph of a one-to-one functionC. This is the graph of a function, but it is not one to oneD. This is not the graph of a function A 250.0 kg rock falls off a 40.0 m cliff. What is the kinetic energy of the rock just before it hits the ground (hint: conservation of energy)? What are the solutions to the equation 3(x 4)(x + 5) = 0? x = 4 or x = 5 x = 3, x = 4, or x = 5 x = 3, x = 4, or x = 5 x = 4 or x = 5 What is the suffix of impatiently? Compute the range and interquartile range for the data collected for boys and girls. Describe their differences in detail using specific terms of spread. (4 points) Select the correct pronoun in the box. Give the letters to Jean and ___. A. I B. me Please help!A. summerB. autumnC. winterD. spring For a ,a relationship to be a function, which values cannot repeat: the x-values or the y-values? * How does 4D shape look like? Are bacteria eukaryotes Throughout the novel, there are references to light and darkness, which take on different meanings if they are understood either literally or figuratively. What does the light figuratively symbolize? What does the darkness figuratively symbolize? (Hint: think back to Plato's "The Allegory of the Cave.") 3. What two characteristics do you need to include when defining a force? (a) speed and direction (b) strength and direction (c) acceleration and time (d) distance and direction 4. When a bug traveling west hits the windshield of a car that is traveling east, what can be said about the collision? (a) The bug feels a stronger force than the car. (b) The car and the bug feel the same size force. (c) The car accelerates more than the bug. (d) The bug does not accelerate due to the force. 5. What is the reaction force to the force on a baseball from a bat? (a) The force of the bat on the ball (b) The force of the ball on the ground (c) The force of the bat on the players hand (d) The force of gravity on the A member of the human resources department received the following email message after sending an email containing benefit and tax information to a candidate: Your message has been quarantined for the following policy violation external potential PII.Pls contact the IT security admin for further details. Which of the following BEST describes why this message was received?a. The DLP system flagged the message. b. The mail gateway prevented the message from being sent to personal email addresses c. The company firewall blocked the recipient's IP address. d. The file integrity check failed for the attached files. Place the respiratory structures into the order that air would pass through them during a normal inspiration.Outside of Body1. nares2. vestibule3. nasal cavity4. choanae5. nasopharynx6. oropharynx7. laryngopharynx8. larynxInside of Body Which describes the molecule below A 10kg block with an initial velocity of 10 m/s slides 1o m across a horizontal surface and comes to rest. it takes the block 2 seconds to stop. The stopping force acting on the block is about solution for 2x is equal to 10 We want to model the daily movement of a particular stock (say Amazon, ticker = AMZN) using a homogeneous markov-chain. Suppose at the close of the market each day, the stock can end up higher or lower than the previous days close. Assume that if the stock closes higher on a day, the probability that it closes higher the next day is .65. If the stock closes lower on a day, the probability that it closes higher the next day is .45. (a) What is the 1-step transition matrix? (Let 1 = higher, 2 = lower) (b) On Monday, the stock closed higher. What is the probability that it will close higher on Thursday (three days later) Sandra spotted the sailboat from the shore and measured the angle from the waterline to the top of the boats mast to be 7 if the top of the mask is 23 feet above the water how far is the middle of the sailboat from the shore? Estimate your answer to the nearest tenth.