Mối quan hệ giữa đối tượng và lớp
1. Lớp có trước, đối tượng có sau, đối tượng là thành phần của lớp
2. Lớp là tập hợp các đối tượng có cùng kiểu dữ liệu nhưng khác nhau về các phương thức
3. Đối tượng là thể hiện của lớp, một lớp có nhiều đối tượng cùng thành phần cấu trúc
4. Đối tượng đại diện cho lớp, mỗi lớp chỉ có một đối tượng

Answers

Answer 1

Answer:

please write in english i cannot understand

Explanation:


Related Questions

I have a variable and set it equal to 5. 1 then send it as an argument to a function that adds 5 to the variable passed in. Outside the function print the variable (after the function executes).
What will it print?
A. 5+1
B. 4
C. 6
D. 5

Answers

Answer:

D. 5

Explanation:

If the variables original value was 5 then the value that will be printed is 5. This is because the variable is being passed as a parameter into the function and 5 is being added to the parameter value, not the actual global variable outside. Therefore, in order for the adjusted value to be printed then that new value that is returned by the function needs to be saved in a new variable. This can be seen in the example code below.

The term __________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term __________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network. A. data in transit, data on record B. data at rest, data in transit C. data in transit, data at rest D. data on record, data in motion

Answers

Answer:

B. data at rest, data in transit

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Data at rest refers to a form of data that is stored on devices such as; a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server.

Data in transit is simply any data that exists in a mobile or dynamic state on the network, such as data on the Internet, wireless networks, or a private network.

Consider the following JavaScript code fragment:var greeting = function ( name ) {console.log ( name )}The best answer for what is wrong with this code is:Group of answer choices

Answers

Answer:

name is a reserved word in JS and cannot be used as an identifier

Explanation:

From the group of answer choices provided the only one that may be a problem would be using the word name as a parameter. Although name is not a reserved word per say in JS it is in HTML, and since JS targets HTML it could cause some errors. This however does not prevent this code from running correctly. JS does not require semicolons anymore, and the opening and closing braces for a body of code does not need to be on their own lines. Also, variable names are not Strings and do not need to be inside quotes, even for console.log()

Which factors are involved in search engine optimization​

Answers

Answer:

A Secure and Accessible Website.

Page Speed (Including Mobile Page Speed)

Explanation:

What Internet access method would be suitable for a business requiring a high bandwidth connection where no cabled options exist?

Answers

Answer:

Fiber Optic, it allows for speeds up to 1200 mbps

Explanation:

Essay on "Impact of Digitalization"​

Answers

Answer:

Digitization has a proven impact on reducing unemployment, improving quality of life, and boosting citizens' access to public services. Finally, digitization allows governments to operate with greater transparency and efficiency

Suppose you and four of your friends are wirelessly connected with the home wireless router. [03] At this moment router is not transmitting data to the outgoing link and all of you want to browse internet and send packets of same size to the router. Consider the bandwidth of the outgoing link is20Mbps , packet size is 2500 bytes and the processing delay of each packet is
2μs . If your packet is queued at position eleven, calculate the delay after which your packet will be transmitted

Answers

format please? i cant understand

AWS's EC2 is primarily considered which type? OA OB. Maas O Claas O D. None of the above O E. Serverless​

Answers

Answer:

IaaS (Infrastructure as a Service)

"Amazon takes the responsibility of networking, storage, server and virtualization and the user is responsible for managing the Operating System, middleware, runtime, data and application."

Write a program that accepts the lengths of three sides of a triangle as an input from the user: A, B, C

Validate the user input so that the user can only enter positive values for sides A, B, C. All three must be true:

A > 0
B > 0
C > 0

Answers

Answer:

The program in Python is as follows:

A = int(input("A: "))

B = int(input("B: "))

C = int(input("C: "))

while A<=0 or B <= 0 or C <= 0:

   A = int(input("A: "))

   B = int(input("B: "))

   C = int(input("C: "))

print("Valid inputs")

Explanation:

Get input for A, B and C

A = int(input("A: "))

B = int(input("B: "))

C = int(input("C: "))

The loop is repeated until inputs for A, B and C are above 0

while A<=0 or B <= 0 or C <= 0:

Get input for A, B and C

   A = int(input("A: "))

   B = int(input("B: "))

   C = int(input("C: "))

Print valid inputs when user inputs are correct

print("Valid inputs")

Identify the statement about Windows tasks that is FALSE.


To launch an application, click the Windows icon, select "All Programs," and then click an application.


The boot process is the process for powering off a computer.


A common way to shut down the computer’s operating system is by using the Start menu.


Users log into their accounts on the Welcome screen, before Windows is ready to use.

Answers

The statement about Windows tasks that is FALSE is

The boot process is the process for powering off a computer.

According to the question, we are to discuss about Windows tasks and how it works as regards to the computer.

As a result of this we can see that  in launching an application;

we need to click on Windows iconselect "All Programs," click an application.

Therefore, The boot process is not the process for powering off a computer.

Learn more about Windows tasks .

https://brainly.com/question/1594289

The statement that is false is: The boot process is the process for powering off a computer, which is the second option. The boot process is actually the process of starting or powering on a computer, not powering it off.

The boot process refers to the sequence of events that occur when a computer is powered on or restarted. It is the process of starting up the computer's hardware and loading the operating system into memory so that it is ready for use. During the boot process, the computer's firmware (such as the BIOS or UEFI) performs a series of checks and tests to ensure that the hardware components are functioning correctly. It then searches for the operating system on connected storage devices, such as the hard drive or solid-state drive, and loads it into memory.

Learn more about the boot process here.

https://brainly.com/question/24355262

#SPJ6

Give three reasons to use a hard drive as mass storage.

Answers

Answer:

With that in mind, let's take a look at five places where hard drives shine.

Backups and Archives. ...

Media Libraries. ...

Large Capacity Storage. ...

NAS Drives and Security. ...

RAID Arrays. ...

Other Uses.

1011111 ÷ 11 in numerical​

Answers

Answer:

91919.18182

Explanation:

Answer:

91,919 .1

HOPE IT HELPS .

An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task

Answers

Question Completion with Options:

A. device flow correlation

B. simple detections

C. application blocking list

D. advanced custom detections

Answer:

The outbreak control method that is used to accomplish the task of configuring AMP for endpoints and to block certain files from executing is:

C. application blocking list

Explanation:

The application blocking list creates a list of application files, which the AMP continuously tracks and analyzes to compare the file activities with previous cyber attacks.  Specifically, the AMP for Endpoints is a cloud-managed endpoint security solution, which provides a retrospective alert to prevent cyber-security threats, and rapidly detects, contains, and remediates malicious files on the endpoints.

continuously tracks and analyzes files and file activities across your systems, and compares these events to what preceded or happened in past attacks. If a file exhibits malicious behavior, the AMP provides you with a retrospective alert which enables you to stop a potential threat from succeeding.

If every company is now a technology company, then what does this mean for every student attending a business college

Answers

Answer:

Explanation:

There are all sorts of possibilities for, say, inserting new technologies into existing processes. But most of these improvements are incremental. They are worth doing; in fact, they may be necessary for survival. No self-respecting airline, for instance, could do without an application that lets you download your boarding pass to your mobile telephone. It saves paper, can't get lost and customers want it.

But while it's essential to offer applications like the electronic boarding pass, those will not distinguish a company. Electronic boarding passes have already been replicated by nearly every airline. In fact, we've already forgotten who was first.

Consider an Erlang loss system. The average processing time is 3 minutes. The average inter-arrival time is 3 minutes. The number of servers is 3. What is r (sometimes referred to as the offered load)

Answers

Answer:

r = 1

Explanation:

Average processing time ( p ) = 3 minutes

Average inter-arrival time ( a ) = 3 minutes

number of servers ( m ) = 3

Determine the value of r

r ( offered load ) = p/a

                          = 3 / 3  = 1

∴ value of r ( offered load ) = 1

Write a recursive function named is_decreasing that takes as its parameter a list of numbers. It should return True if the elements of the list are strictly decreasing (each element in the array is strictly less than the previous one), but return False otherwise.

Answers

Answer:

c

Explanation:

Output is the act of is the act of entering the data to the computer?​

Answers

Answer:

Output is the act of the computer display information based on your input

Explanation:

Funny thing is that output is the exact opposite of what you just described

Which of the following views is the best view to use when setting transition effects for all slides in a presentation?

Answers

Answer:

Slide sorter view

Answer:

Slide sorter view !!!!!

Binary search is a very fast searching algorithm, however it requires a set of numbers to be sorted.

a. True
b. False

Answers

I’m sure the answer is true

Which statement is accurate to describe a spreadsheet versus an Excel workbook?
a) worksheets have one or more workbooks.
b) workbooks have one or more worksheets.
c) workbooks are the same as word documents.
d) worksheets always refer to real paper.

Answers

C is the correct answer

how do you format a cd or a DVD ​

Answers

No. The DVD format can't be read by a CD.

__________ makes the hardware usable, while __________ commands it to perform specific tasks. a.) The operating system, RAM b.) The CPU, RAM c.) The application software, the hard disk d.) The operating system, the application software

Answers

Answer:

a then c

Explanation:

Without an operating system you just have a pile of metal, and the program contains code, which is just a series of commands

Answer:

d.) The operating system, the application software

A security analyst recommends implementing SSL for an existing web service. A technician installs the SSL certificate and successfully tests the connection on the server. Soon after, the help desk begins receiving calls from users who are unable to log in. After further investigation, it becomes clear that no users have successfully connected to the web server since the certificate installation. Which of the following is MOST likely the issue?
A. DA Incorrect firewall rules are blocking HTTPS traffic.
B. Users are still accessing the IP address and not the HTTPS address.
C. DC Workstations need an updated trusted sites list.
D Users are not using tokens to log on.

Answers

C- I think. I hope this helps you.

7. System software is the set of software programs that helps run the computer and coordinates instructions between application software and hardware devices. It consists of the operating system (OS) and utility programs. How does the mindset of the designer affect the design of the operating system (e.g., Windows vs. Linux)

Answers

Answer:

Explanation:

The main goal when designing an operating system (OS) is to make sure that the system is as efficient and intuitive as possible. This is the mindset that designers have when creating the operating system. However, this also creates drastically different designs between designers, mainly because one design structure will feel much more natural and intuitive to one designer but not another. Since the designer's own personal taste/mindset drastically affects the design, most companies find their target audience and survey/test various designs. This is done in order to find what features and styles best fit the vast majority of the people.

A technique that uses data that is labeled to train or teach a machine.
Reinforcement
Unsupervised
Supervised

Answers

Answer:

computer.

Explanation:

it uses data that is labeled to train.

Explain what 10CLS program does and the write the output​

Answers

(CLS)


This text is being printed via the PRINT command."
On the next line, I'll use CLS, which will clear everything I just printed, so you won't even see the preceding text."
Also, you can't give CLS a line to PRINT; it won't actually do anything"
(CLS)
Finally, on line 80, I

The speed of a computer is measured in____?​

Answers

Answer:

gigahertz

Explanation:

The clock speed measures the number of cycles your CPU executes per second, measured in GHz (gigahertz)

[tex]\sf{}[/tex]

ANSWER => gigahitrz

Explanation:

The speed of a computer is measured in gigahitrz

https://ref.surveyj.co/Oware111​

Answers

What is the link?

IS IT A HACKING LINK

write the full form of E-mail?​

Answers

Answer:

Electronic Mail. This is your answer.

A network administrator needs 10 prevent users from accessing the accounting department records. All users are connected to the same Layer 2 device and access the internal through the same router. Which of the following should be Implemented to segment me accounting department from the rest of the users?

a. Implement VLANs and an ACL.
b. Install a firewall and create a DMZ.
c. Create a site-to-site VPN.
d. Enable MAC address filtering.

Answers

Answer:

C

Explanation:

definitely C you’re welcome
Other Questions
Can someone please help me with my maths question From June to the end of September, Jennifer wants to save at least $1,500. Her monthly expenses are $600. Jennifer saves whatever money she has left after paying her expenses each month. Jennifer is scheduled to work 80 hours in September. Find the minimum sales she needs in September to meet her goal of saving at least $1,500. Will give brainliest need a quick answer The Thames Barrier is a (16)________major____ part of the flood defence scheme for protecting London (17)___________rising water level. The defenses (18)__________ included raised embankments and (19)_________________ flood gates at strategic points, including the Barking Barrier. The unique structure that is the Barrier spans the 520 meter wide Woolwich reach and (20) ______________ of 10 separate movable gates, each pivoting and supported between concrete structures which house the operating machinery. When raised, the four main gates (21)____________ stand as high as a five storey buildings and as wide as the opening of Tower Bridge. Each (22)___________3700 tonnes. During the first twelve years of (23)___________, the Barriers has been closed twenty times to protect London. (24)___________ the Barrier from the comfortable cafeteria. Picnic on the riverside. Picnic on the riverside embankment. Enjoy beautiful view from the riverside walk. Visit the shop which stocks a large selection of souvenirs, books and Barrier information. There is a children play are suitable for 4- to 12- year olds, located adjacent to the riverside walk. A visit to the spectacular Thames Barrier is a (25)_____________experience. 16. A. major B. frequent C. similar D. various 17. A. against B. for C. between D. with 18. A. and B. also C. still D. too 19. A. addition B. add C. additional D. additionally 20. A. consists B. includes C. involves D. contains 21. A. which B. every C. each D. none 22. A. measures B. costs C. calculates D. weighs 23. A. operation B. surgery C. vocation D. profession 24. A. Sight B. View C. Hear D. Explore 25. A. forgettable B. memorable C. forgetful D. memorized An ideal exercise plan incorporates variety, balance, and moderation. Determine whether each scenario is describing exercise in variety, balance, or moderation. B. Bob used to run for a cardiovascular workout. After sustaining shin splints, he has taken up bicycling and swimming as non-weight bearing cardiovascular alternatives to running. C. Tina used to thing that doing only cardiovascular exercise was the ideal way to keep fit. Now she realizes the benefits of balance, strength, and endurance workouts interspersed with cardio. A. In high school, Charlie used to run until his knees would almost give out. Now that he is older, he values the importance of regular exercise but stays fit without overdoing it during his workouts A. Moderation B. Balance C. Variety Round the number to the given place value. 47,709,982; millions find the value of 16% of 174 What is (0,6] n (6,8]? When a sprinkler is installed in the ground, the spray of water goes up and falls in the pattern of a parabola. The height, in inches, of a spray of water is given by the equation h(x)=160x16x2 where x is the number of feet away from the sprinkler head the spray is. What is the height of the spray 2 feet away from the sprinkler head? What is the meaning of merits According to the Federal Election Commission, 53.6% of all registered voters in 2012 voted in the US presidential elections in 2012. A political study conducted in January 2016 surveyed 1,251 eligible voters and found that 86% said they planned to vote in the 2016 presidential election. Based on this information, match each term to its value.1. 1,251 2. 53.6% 3. 86%a. statistic b. sample size c. parameter Prove that angle ABD is congruent to angle CBEwith solution! What was the general public opinion on sending US troops into Vietnam in 1965? A. The public was strongly against it B. The public strongly supported sending in troops C. The public was not told initiallyD. The public was fairly evenly split for and against troop deployment Which of the following best describes a similarity between Thomas Hobbesand Jean-Jacques Rousseau? What are the four main types of tissues found in the human body?stratified, muscle, nervous, simpleconnective, cardiac, stratified, epithelialstratified, simple, smooth, cardiacconnective, muscle, epithelial, nervous Function g can be thought of as a scaled version of f(x)=|x| A correct description of the line defined by y-6= -1/2(x+7) isa. it is a line through (-7,6) with a slope of 1/2b. it is a line through (7,-6) with a slope of -1/2c. it is a line through (-7,6) with a slope of -1/2d. it is a line through (7,-6) with a slope of 1/2 PLEASE HELPPPPPPPPPP h. Mrs. Mili cut her finger while cutting vegetables with a knife. What kind of accident it is? Is there any way to avoid such kind of accidents? Write in 5 sentences. 1+5=6 The unit quantity standard of a product is 3 pounds per package, and the unit quantity standard for machine hours is 0.40 hours per package. During August, 190,000 packages were produced. 430,000 pounds and 77,000 hours were used in production. How many pounds and how many machine hours should have been used for the actual output