Question 5 of 10
How does a programmer instruct a video game on how to function?
A. By choosing parameters in a creative manner
B. By using phrases that can be interpreted in several different way=
C. By writing an algorithm using a computer language
OD. By creating a range of variables within the game
SUBMIT

Answers

Answer 1

Answer:

either C or D

Explanation:

From a logical and practical view, computer and technology is about code


Related Questions

true or false? a solid-state drive (ssd) attached to an m.2 port must be using the non-volatile memory host controller interface specification (nvmhci) or nvm express (nvme).

Answers

The correct answer is False.

An M. 2 SSD will support either SATA or PCIe, but not both at the same time. In addition, system board sockets will be designated by manufacturers to support either SATA, PCIe, or in some cases, both.

What is M.2?

The M.2 form factor specification was introduced in 2012 to replace the mSATA standard. The form factor specification defines the physical size and shape of the SSD card that can be connected to your system. The M.2 form factor is intended to maximize PCB (printed circuit board) performance while taking up the least amount of space in your PC or laptop. Your motherboard must have an M.2 port in order to connect an M.2 SSD.

To learn more about M.2 port, visit: https://brainly.com/question/15095188

#SPJ1

suppose the ram for a certain computer has 4m words, where each word is 16 bits long. a) what is the capacity of this memory expressed in bytes?

Answers

The capacity of this memory expressed is 2 bytes.

Why is RAM important in a computer?

The information that enables your computer complete its most crucial activities, like loading apps, accessing websites, and editing documents, is kept in RAM.Because your computer can quickly access the information in its short-term memory thanks to RAM, you can open apps and files more quickly.Random access memory is referred to as RAM.Because the data can be swiftly read and updated in any sequence, it is called random access.Contrast this with more traditional storage medium like CD-RWs, where data is accessible in a slower, predetermined sequence.The data and instructions that are now being used are stored in RAM.

To learn more about RAM refer,

https://brainly.com/question/29245369

#SPJ4

which dhcp option should you modify to make sure you are not wasting addresses used by students who have left for the day?

Answers

The lease duration for the clients computer  dhcp option should you modify to make sure you are not wasting addresses used by students who have left for the day.

What is DHCP?

An IP network device can access network services like DNS, NTP, and any protocol based on UDP or TCP by being automatically configured using the Dynamic Host Configuration Protocol (DHCP), a network administration protocol. Each device on a network receives a dynamically assigned IP address and other network setup information so they can connect to other IP networks. DHCP is an improvement of the BOOTP protocol from the past. A key component of the DDI system is DHCP (DNS-DHCP-IPAM).

What are the DNS?

The hierarchical and distributed naming system known as the Domain Name System is used to identify machines that may be accessed via the Internet or other Internet Protocol networks. Domain names are linked to various types of information by resource records in the DNS.

What are the types of DNS?

There are three main kinds of DNS Servers — primary servers, secondary servers, and caching servers.

Learn more about DHCP click here:

https://brainly.com/question/14407739

#SPJ4

in an interview, the interviewer asks you to boot a pc. before the boot process begins, an interface asks you to choose between windows 10 and ubuntu linux. the interviewer then asks you to identify the type of vr monitor program being used. what should your reply be

Answers

With images and things that seem real, a virtual reality (VR) environment gives the user the impression that they are completely engrossed in their surroundings.

What are the characteristics of  VR monitor program?

The term “virtual reality” (VR) refers to a computer-generated experience in which a person interacts with a virtual, three-dimensional world while wearing electronic devices, such as special glasses with screens or gloves with sensors. A virtual tour is an illustration of virtual reality.

In addition to offering popular VR platforms like the Oculus Rift S, Oculus Quest, and Oculus Go, Oculus also sells the potent VR development tool called Medium.

Therefore, It is a complete program that enables you to produce 3D assets. The VR objects you produce can be painted, sculpted, and modelled.

Learn more about VR here:

https://brainly.com/question/28315651

#SPJ1

an attack has been detected in your network system by one of the network engineers. analyzing the attack, you come to know that the system was accessed through one of the switches where the hacker fed his own vlan traffic into the port and accessed the network. what kind of an attack have has been experienced in this scenario?

Answers

The kind of attack that has been experienced in this scenario is called switch spoofing.

What is switch spoofing?
Switch
spoofing occurs when an attacker attempts to negotiate a trunk with a switch by sending Cisco's Dynamic Trunking Protocol (DTP) packets. The dynamic auto or dynamic desirable default switch modes are the only ones that make it possible. When a trunk is attached to the computer, the attacker has access to every VLAN.

By connecting a malicious switch to an interface set up in "dynamic desirable," "dynamic auto," or "trunk" modes, Switch Spoofing can also be accomplished. The attacker can obtain traffic from every VLAN once the trunk link has been established. Now that the VLANs are all open, the attacker can sniff their traffic.

To learn more about switch spoofing, use the link given
https://brainly.com/question/14725094
#SPJ1

how do you connect an android phone to a android auto in car and still take and make calls without car radio

Answers

The main way that Android Auto works is by using a USB cable to connect your phone to your automobile.

The main way that Android Auto works is by using a USB cable to connect your phone to your automobile. After disconnecting the USB wire, Android Auto Wireless enables you to preserve that connection. The biggest advantage of Android Auto Wireless is that you won't have to constantly plug and unplug your phone.

Android Auto is an app that makes using your phone while driving safer. It offers a wide variety of apps that enhance your driving experience. To make your travels simple and seamless, it includes EV charging, parking, and navigation apps. You can read and send messages from messaging apps right from the launcher screen with Android Auto.

To know more about Android click here:

https://brainly.com/question/28234050

#SPJ4

which patented inspection process enables the firewall administrator to gain visibility and ensure that only those who have a business need have access to an application

Answers

The User-ID patented inspection process enables the firewall administrator to gain visibility and ensure that only those who have a business need have access to an application.

Define a firewall.

A firewall in computing is a network security device that keeps track of and manages incoming and outgoing network traffic in accordance with pre-established security rules. The Internet is an example of an untrusted network that is often separated from a trusted network by a firewall.

A firewall, at its most basic level, is essentially the wall that separates a private internal network from the public Internet. A firewall has the primary function to let safe traffic through while blocking harmful traffic.

To learn more about a firewall, use the link given
https://brainly.com/question/13693641
#SPJ1

how can i remove someone from an email thread and then re-add them without them seieng my previous messages

Answers

An individual can be removed from an email conversation by Examine your contact information, lists, audiences, and subscriptions. A checkmark should be next to each contact you want to delete.

What is meant by email thread?An email thread is a collection of linked responses and forwarded emails that follow the original email that serves as the conversation's starting point. An email thread is made up of the original message, any replies, and any messages that have been forwarded. Email threading tools group together related messages for easy inspection. Consider sending a lunch invitation via email to a friend. The friend agrees and makes a restaurant recommendation. a collection of emails that includes the original message, all replies and forwards from the sender and recipients, and any additional or blind copies

To learn more about email thread refer to:

brainly.com/question/20654884

#SPJ4

suppose a computer using direct mapped cache has 64 kbyte of byte-addressable main memory, and a cache of 512 blocks, where each cache block contains 32 bytes. a) how many blocks of main memory are there? b) what is the format of a memory address? provide the names and the sizes of the fields. c) to which cache block will the memory address 0x2fa map?

Answers

a) Number of blocks in the main memory = 2^32 / 2^6 = 2 ^ 26 blocks.

b) block offset size is 6 bits and size of the block filed is 3 bits.

c) The cache has 2 ^ 3 blocks (0 block, 1 block, 7th block), the given address maps to 6th block.

What is address maps?

Address mapping, also called pin mapping or geocoding, is the process of giving addresses in a database a location on a map.

Given that,

a) It is given that the size of the main memory= 2^32 bytes

Cache size = 512 bytes = 2 ^ 9 bytes

And block size = 64 bytes= 2^6 bytes

Therefore number of blocks in the main memory = 2^32 / 2^6 = 2 ^ 26 blocks

b) From the given information block size = 64 bytes= 2^6 bytes

Therefore the block offset size is 6 bits.

Number of blocks in the cache= Cache capacity(C)/ Block size (b)

= 2 ^ 9 / 2 ^ 6

= 8 blocks

= 2^3 blocks

Therefore, the size of the block filed is 3 bits.

Since the main memory is byte addressable and the size of the main memory is 2 ^ 32 bytes, 32 bits are required to refer a byte in main memory.

Tag bits = (size of the main memory address- size of the block field(i.e. index) – size of the block offset)

= (32-6-3)

= 23 bits

Therefore the size of the tag field is 23 bits.

c) Given memory address is (13A4498A)

table for convert hexadecimal into binary given in the uploaded picture.

Since, the cache has 2 ^ 3 blocks (0 block, 1 block, 7th block), the given address maps to 6th block.

Learn more about address mapping click on this:

https://brainly.com/question/23851218

#SPJ4

an internet service provider has hired you to frame cables for a network connection using tia/eia standards so that it can transmit up to 10 gbps or 40 gbps at short distances. however, you do not want to disrupt the previous cabling equipment as it will increase the cost. which of the tia/eia 568 standard twisted-pair cables will you use to carry out this operation without having to go through the equipment changes?

Answers

You should utilize a Cat 7 to complete this procedure because it is compliant with the TIA/EIA 568 standard for twisted-pair connections.

What do cables do?

A cable is a sort of connected connector that is either made of glass or copper and used to link network devices to one another in order to create a computer network and make it possible for data to be continuously transmitted between them.

There are various twisted-pair cable types used in computer networking, including:

Cat6 (Class E) (Class E)

Cat6a (Class EA) (Class EA)

Cat7 (Class F) (Class F)

You should utilize a Cat 7 to complete this operation because it can transfer up to 10 Gbps or 40 Gbps at short distances, such 100 meters, based on the TIA/EIA 568 standard twisted-pair cables.

To learn more about Cable refer to:

brainly.com/question/25337328

#SPJ4

during a mail merge what item aer merged​

Answers

Answer: The mail merge process involves taking information from one document, known as the data source.

Explanation:

log(10×

[tex]log(10x4 \sqrt{10)} [/tex]

in a security review meeting, nathan proposed using a software-defined network for easy reconfiguration and enhanced security. how will an sdn enhance the security of nathan's enterprise network?

Answers

a SND enhance Nathan's company's security

They enforce virtual network operations with data and monitoring accessible through a single user-friendly interface.

What is software and network security?Your network and data are safeguarded by network security against hacks, intrusions, and other dangers.This is a broad and all-encompassing phrase that refers to processes, regulations, and configurations pertaining to network use, accessibility, and overall threat protection, as well as hardware and software solutions.In order to achieve software-defined network security, security functions are virtualized away from the conventional hardware they typically run on. data and monitoring available through a single user-friendly interface, they enforce virtual network operations.

To learn more about software-defined network security refer,

https://brainly.com/question/28836420

#SPJ4

A SND enhance Nathan's company's security. They enforce virtual network operations with data and monitoring accessible through a single user-friendly interface.

What is software and network security?Your network and data are safeguarded by network security against hacks, intrusions, and other dangers.This is a broad and all-encompassing phrase that refers to processes, regulations, and configurations pertaining to network use, accessibility, and overall threat protection, as well as hardware and software solutions.In order to achieve software-defined network security, security functions are virtualized away from the conventional hardware they typically run on.data and monitoring available through a single user-friendly interface, they enforce virtual network operations.

To learn more about software-defined network security refer to:

brainly.com/question/28836420

#SPJ4

our organization has just approved a special budget for a network security upgrade. what procedure should you conduct to develop your recommendations for the upgrade priorities?

Answers

The first step that you have to do is posture assessment. It is needed to  to help you to  identify areas of strength and also understand the organization's current state posture.

In business, posture assessment also known as posture validation. Posture assessment generally can be defined as the act of applying a set of rules to the posture data. Posture assessment or posture validation is needed to provide an posture token or also assessment of the level of trust that you can place in that endpoint. The posture token can be described as the one of the conditions in the authorization rules for network access.

Here you can learn more about posture assessment https://brainly.com/question/4606013

#SPJ4

which of the following statements is false? a scalar processor processes one data item at a time. vliw architectures execute instructions in parallel based on a fixed schedule determined when the code is compiled. superscalar architectures with speculative executions are suitable for embedded processors in a vector processor, a single instruction operates simultaneously on multiple data items.

Answers

It is false that superscalar architectures with speculative executions are suitable for embedded processors in a vector processor, a single instruction operates simultaneously on multiple data items.

A superscalar processor is a CPU that uses instruction-level parallelism, a type of parallelism, on a single processor. A superscalar processor can execute more than one instruction during a clock cycle in contrast to a scalar processor, which can only carry out one instruction at a time. This is accomplished by simultaneously dispatching numerous instructions to various execution units inside the processor.

As a result, it enables higher throughput than would otherwise be possible at a specific clock rate (the number of instructions that can be executed in a unit of time). Each execution unit is an execution resource within a single CPU, such as an arithmetic logic unit, rather than a separate processor (or a core if the processor is a multi-core processor).

To know more about superscalar click here:

https://brainly.com/question/16017283

#SPJ4

we receive several blocks of ciphertext in cbc mode. an error has changed a single bit in the middle of the ciphertext. how much of the plaintext will be affected by the error when we decrypt it?

Answers

The error will have an impact on the plaintext when we decrypt it. One block and one bit.

What is encryption and decryption?Transforming plain text data (plaintext) to something that appears random and meaningless is the process of encryption (ciphertext). The process of turning ciphertext back to plaintext is known as decryption.The process of converting information into a secret code that conceals its true meaning is known as encryption. Cryptography is the study of information encryption and decryption. In the world of computers, ciphertext refers to encrypted data and plaintext to unencrypted data.Data is converted into another form, or code, via data encryption so that only those with a secret key (officially referred to as a decryption key) or password may decipher it. Unencrypted data is referred to as plaintext, while encrypted data is frequently referred to as ciphertext.

To learn more about encryption and decryption refer to :

https://brainly.com/question/4280766

#SPJ4

how to arrange the following in descending order pb, kb, b, byte, tb, gb​

Answers

Answer:

pb, tb, gb, kb, byte, b

Explanation:

trust me bro

What is the name of the narrow strip along the bottom of the windows environment?.

Answers

In the Windows environment, the narrow strip along the bottom is called the taskbar.

The taskbar on a computer screen with the Windows operating system is a narrow strip of icons. The taskbar on the Windows screen is usually located at the bottom. The taskbar provides information about that currently open files/programs/windows as well as allows switching between these programs or windows.

In the latest versions of Windows operating systems, the taskbar has an added feature that enables users to 'pin' files or programs on the taskbar to have quick access to them, just with a single click. Due to the prominence of the taskbar on the computer screen, it ususly provides a notification area too; which uses interactive icons to provide real-time information about the state of the computer systems and some of the programs active on it.

You can leanr more about Taskbar at

https://brainly.com/question/28147966

#SPJ4

you need to recommend an iaas solution that allows all virtual machines (vms) to communicate with each other by default. what should you do?

Answers

A company can run an operating system that functions like a totally other computer in an app window on a desktop thanks to virtual machines (VMs).

What is VMs in virtual machine?A system virtual machine (VM) is a completely virtualized environment running its own OS and housed on a physical server. The VM utilizes some of the physical resources of the host yet offers a full environment for running programs and services much like a physical machine without the added overhead.VMs are IAAS (Infrastructure as a Service) because you can control what operating system and software are installed on them.The Digital Equipment Corporation's (DEC) older mid-range PCs use the VMS (Virtual Memory System) operating system. VMS was created in 1979 as a new operating system for DEC's VAX computer, which was the PDP-11's replacement.A virtual machine is a computer file that functions like a real computer. These files are generally referred to as images.

To Learn more About  virtual machines Refer to:

https://brainly.com/question/27939176

#SPJ4

transport layer protocols, like tcp and udp, introduce the concept of a port. how many bits is a port field?

Answers

The correct answer is transport layer protocols, like tcp and udp 16-bit number, meaning there are theoretically 65,535 possible values it can have.

TCP is a connection-oriented protocol, whereas UDP is a connectionless protocol. A key difference between TCP and UDP is speed, as TCP is comparatively slower than UDP. Overall, UDP is a much faster, simpler, and efficient protocol, however, retransmission of lost data packets is only possible with TCP.

To learn about tcp and udp click the link below:

brainly.com/question/16984740

#SPJ4

a. Consider the worksheet given alongside showing the common germs and diseases associated with them. i. What formatting features have been used in the cells A2:B11?​

Answers

To change the formatting of cell numbers in Excel without changing the actual number, use the format cells function. We can modify the number, alignment, font style, border style, fill options, and protection with the aid of the format cells.

What does cell formatting entail?

You can only alter how cell data appears in the spreadsheet by using cell formats. It's critical to remember that the data's value is unaffected; only how the data is presented has changed. The formatting options include options for fractions, dates, timings, scientific alternatives, and more.

For instance, enter the following formula into a spreadsheet cell to obtain the SUM of the values in cells B2 and B11: =SUM (B2, B11). When you hit "Enter," the cell will display the sum of the numbers that are currently entered in cells B2 and B11.

Any cell's default format is general. Excel will determine the best number format when you enter a number into the cell.

To learn more about format cells function refer to

https://brainly.com/question/26660016

#SPJ1

To change the formatting of cell numbers in Excel without changing the actual number, use the format cells function. We can modify the number, alignment, font style, border style, fill options, and protection with the aid of the format cells.

What does cell formatting entail?You can only alter how cell data appears in the spreadsheet by using cell formats. It's critical to remember that the data's value is unaffected; only how the data is presented has changed. The formatting options include options for fractions, dates, timings, scientific alternatives, and more.For instance, enter the following formula into a spreadsheet cell to obtain the SUM of the values in cells B2 and B11: =SUM (B2, B11). When you hit "Enter," the cell will display the sum of the numbers that are currently entered in cells B2 and B11.Any cell's default format is general. Excel will determine the best number format when you enter a number into the cell.

To learn more about Excel  refer to

https://brainly.com/question/25863198

#SPJ1

why do you need to create your own machine key if your asp .net application is hosted in a server farm environment?

Answers

You are required to create your own machine key if your ASP.NET application is hosted in a server farm environment because it is not guaranteed that successive requests will be handled by which server.

A server farm is a collection of servers hosted in a single location called a data center in order to operate as a coordinated group that can be managed and controlled easily. The server farm is used to accomplish functions that a single machine cannot be capable of doing such as serving various numbers of people on a specific application or website or providing more resources in a cloud-based environment.

A server farm is also known as a web farm or a server cluster.

You can leran more about server farm at

https://brainly.com/question/28447813

#SPJ4

black holes select an answer and submit. for keyboard navigation, use the up/down arrow keys to select an answer. a cannot be detected because they emit no radiation. b have been detected because infalling matter emits x-rays. c have been detected because they block starlight. your answer d have been detected as pulsing radio sources.

Answers

Black hole have been detected because in falling matter emits X-rays.

What is a black hole?A black hole is a cosmic object with an incredibly strong gravitational pull, from which nothing—not even light—can escape. A huge star's demise can result in the formation of a black hole. Such a star's core gravitationally collapses inward onto itself at the end of its existence when its internal thermonuclear fuels run out, destroying the star's outer layers in the process. The dying star is compressed to a point with zero volume and infinite density, known as the singularity, by the crushing weight of constituent matter crashing in from all directions.The general theory of relativity, developed by Albert Einstein, is used to compute the specifics of a black hole's structure.

To learn more about black hole, refer to

https://brainly.com/question/16578695

#SPJ4

1. What is an example of something especially difficult about a sports game's user interface design? Why is it so hard?
2. Let's say you wanted to make an American Football game. What is an example of a legal issue you'd have to watch out for?

Answers

An example of something especially difficult about a sports game's user interface design is the gameplay mechanic.

What exactly is a gaming mechanic?

The rules and procedures that direct the player and determine how the game will react to their moves and actions are known as the game's mechanics. You design the game's mechanics, which determine how it will function for the players.

Game mechanics are the guidelines or rules that control and direct the player's actions and the game's reactions in both tabletop and video games. A lexeme, or play element, is similar to the L-shaped move of the knight in chess while a rule is a set of instructions on how to play.

Game mechanics consist of four components: quantity, spatial, state, and action. Each of them is described in the following chart, along with some illustrations for each.

Learn more about interface design from

https://brainly.com/question/28338016
#SPJ1

you have been tasked with running a penetration test on a server. you have been given knowledge about the inner workings of the server. what kind of test will you be performing?

Answers

During the penetration testing process, the target system is actively analyzed for any potential weaknesses that may arise from incorrect or bad system configuration, known and undiscovered hardware or software defects, operational gaps in process, or technical countermeasures.

What constitutes a successful penetration test?During the penetration testing process, the target system is actively analyzed for any potential weaknesses that may arise from incorrect or bad system configuration, known and undiscovered hardware or software defects, operational gaps in process, or technical countermeasures.The appropriate response to the question is all of the aforementioned.  The process of assessing a computer program, system, and web service to find defects that could be used for malicious activities is known as penetration testing.The three forms of testing that make up the methodology of penetration testing are called black-box assessment, white-box assessment, and gray-box assessment.    

To learn more about  Penetration testing process refer to:

https://brainly.com/question/13068620

#SPJ4

drew wants to use ipsec and needs to be able to determine the ipsec policy for traffic based on the port it is being sent to on the remote system. which ipsec mode should he use

Answers

Drew should use IPsec VPNs mode.

In the term, IPsec IP stands for Internet Protocol and sec stands for secure. IPsec refers to a group of protocols used together to set up encrypted connections between connected devices, with an aim to keep the data sent over the Internet secure. IPsec is usually used to set up virtual private networks (VPNs). IPsec VPNs encrypt IP packets, along with authenticating the source from where the packets come.

According to the given situation where Drew wants to use an IPsec mode through which he is able to determine the IPsec policy for network traffic based on the port it is being transferred to on the remote system,  the appropriate mode to be used is IPsec VPNs.

You can leran more about virtual private network at

https://brainly.com/question/14122821

#SPJ4

What creates, reads, updates, and deletes data in a database while controlling access and security?.

Answers

Answer:

firewall is correct.

Explanation:

which of the following step(s) is/are normally performed by a for loop? i. update the control variable during each iteration ii. test the control variable by comparing it to a maximum or minimum value iii. terminate when the control variable reaches its maximum or minimum value iv. initialize the control variable to a starting value

Answers

When performing a for loop, all the steps mentioned in the question are required,

i) update the control variable during each iteration
ii) test the control variable by comparing it to a maximum or minimum value iii) terminate when the control variable reaches its maximum or minimum value
iv) initialize the control variable to a starting value

What is an iteration?

Iteration is the process of repeatedly performing a step to produce a series of results. A single iteration of the process is every time it is repeated, and the result of each iteration serves as the foundation for the following one. Iteration is a common component of algorithms in mathematics and computer science.

Iteration is a method used in computer programming where a sequence of instructions or structures are repeated until a condition is satisfied or a predetermined number of times. An iteration is a process of repeating the first set of instructions. A loop is defined as the repeated execution of a set of instructions.

To learn more about iteration, use the link given
https://brainly.com/question/28134937
#SPJ4

which file organization is the best option for a random and discrete retrieval of a single record? group of answer choices hashing sequential bitmap indexing

Answers

The file organization that is best option for a random and discrete retrieval of a single record is hashing sequential bitmap indexing.

There are various documents in the File. Our ability to access the records depends on the main key. The sort of file organization that was employed for a particular group of records can influence the type and frequency of access.

A logical relationship between numerous records is file organization. This technique specifies the mapping of file records to disk blocks.

Block placement on the storage media is referred to as file organization, which describes how the records are stored.

Utilizing many files and storing only one fixed length record in each file is the first method of mapping the database to the file. Another strategy is to organize our files.

To know more about file organization click here:

https://brainly.com/question/28269702

#SPJ4

what are the first two steps for creating a powerful multimedia presentation? create graphics first, and then add special effects. write the text first, and then select backgrounds and fonts. choose images that help communicate your message, and move your presentation to the internet.

Answers

The first two steps for creating a powerful multimedia presentation is option B: Write the text first, and then select backgrounds and fonts.

What is a Multimedia presentation?

A multimedia presentation is a standalone presentation that has data given with the help of slides, videos, or digital representations. It also includes sound, which could be in the form of narration, music, or sound effects.

The following are the 7 steps to making a multimedia presentation:

Draw up a plan.Make a software selection.Create the slides.Prepare the necessary media.Write.Include media components.Finalize your work.

Note that  writing the text first, you can be able to make any kind of adjustment to your presentation.

Learn more about multimedia presentation from

https://brainly.com/question/27800459
#SPJ1

what term describes the process of creating a program specific details first and then combining them into a whole

Answers

A computer programming paradigm known as object-oriented programming (OOP) arranges the design of software around data or objects rather than functions and logic.

The object-oriented programming (OOP) paradigm for computer programming organizes software's architecture on data or objects rather than around functions and logic. A data field with specific traits and behavior is called an object.

In OOP, the objects that programmers want to modify are given more weight than the logic required to do so. Large, complex, and frequently updated or maintained programs work well with this development approach. This includes both design and production software as well as mobile applications. Software for manufacturing system simulation, for instance, can use OOP.

The organization of an object-oriented program makes the method advantageous in collaborative development, where projects are divided into groups. The benefits of efficiency, scalability, and reused code are also provided by OOP.

To know more about software click here:

https://brainly.com/question/985406

#SPJ4

The process of turning a task into a series of instructions that a digital device will follow to carry out a particular task.

The process of programming entails classifying the components of a work that a digital device is capable of carrying out, precisely specifying those tasks, and then converting those tasks into a language that the computer's CPU can comprehend.

The issue statement, which explicitly outlines the goal, is one of the initial steps in programming.

If the project is found to be feasible, problem-solving programming will start.

To know more about process of creating programming:

https://brainly.com/question/29346498

#1234

Other Questions
dynamic systems theory provides convincing evidence that motor skill behaviors are group of answer choices gradually organized. governed by a built-in maturational timetable. hardwired. genetically determined. You have been asked to give a presentation dealing with the results of the Japanese attack on Pearl Harbor. Which of the following should you mention?A) The United States decimated the Japanese air force.B) The United States abandoned its base in Hawaii and withdrew its fleet from the Pacific.C) For the next several months, Japan had nearly free reign in the Pacific.D) Japan destroyed the entire fleet of U.S. battleships. How is the author's purpose similar between Always Connected.." and "Believe in Yourself?"To write a short open-ended response, you should:answer the question clearly with an assertion.justify your answer with support from the text (in this case, BOTH pieces must be references).elaborate on the connection between your assertion and the text you chose. Which of the following questions is most relevant to understanding the Calvin cycle?(A) How does chlorophyll capture light?(B) How is ATP used in the formation of carbohydrates?(C) How is NADP+ reduced to NADPH?(D) How is ATP produced in chemiosmosis? a beam of electrons,neutrons and protons can be separated by passing them through an electric field. Which direction does each particle follow? what relationship must exist between water temperature and air temperature for the lake effect snow to develop which option identifies the type of mining technique represented in the following scenario? in west virginia, many companies specialize in mountaintop-removal mining, where miners bulldoze the tops of mountains in order to extract coal from the rock. drilling drilling fracking fracking surface mining surface mining sub-surface mining sub-surface mining In how many ways can a person order one ice cream cone with 3 different flavors of ice cream if there are 11 flavors to choose from and it matters to the person how the 3 flavors are stacked on the one cone? That is, which flavor is on top, middle, and bottom. A cartographer graphed the locations of a light house and all of the islands in the vicinity. He positioned the light house at (-7,9) and the farthest island at (61,9). If eachunit on the graph represents 1 mile, then how far away from the light house is the farthest island?miles Discuss a series of steps needed to generate value and useful insights from data? One leg of a right triangle is 7 units long, and its hypotenuse is 16 units long. What is the length of the other leg? Round to the nearest whole number. What is the value of X? 2d. Identify the extent to which artifacts are reliable sources ofevidence for understanding civilizations in the Americas pre-1600by circling reliable, somewhat reliable, or unreliable, then explainwhy you chose that option. while discussing the preliminary feasibility of a project, your colleague insists that figures used in the economic feasibility analysis be very accurate down to the last cent. his claim is appropriate and not uncommon. group of answer choices true false in the maturity stage of the industry life cycle a. the product has reached full potential. b. profit margins are narrower. c. producers are forced to compete on price to a greater extent. d. a and b only. e. a, b, and c. sharon is the policy owner of a $50 000 life insurance policy. her son, mike is the beneficiary. if sharon must obtain mikes signature in order to change the beneficiary, what kind of beneficiary designation is this A sample of a radioactive isotope had an initial mass of 110 mg in the year 1990 and decays exponentially over time. A measurement in the year 1993 found that the sample's mass had decayed to 90 mg. What would be the expected mass of the sample in the year 2002, to the nearest whole number? What was the system in which laborers are bound to a landowner because of debt called?A. Crop liens B. Share cropping C. PeonageD. Menial labor system you are a network engineer who is working on a very busy network and is concerned why the actual throughput is less than the potential bandwidth. the total signal strength has been estimated to be 1000 watts, and the estimated loss of signal due to noise has been calculated to be 6 db. what is the throughput that is being received at the moment as per your calculations, keeping the 3-db rule in mind? Besides the supinator, which other muscle is a powerful supinator of the forearm?.