a. stateTaxRate - A good variable name because it represents what it holds, the state sales tax rate, without being too wordy. Also correctly capitalized in camelcase.
b. txRt - A bad variable name because while short and simple, it is too hard to understand what the variable represents.
c. t - A very bad variable name if you plan on using the variable often. Far too short and you will forget what it represents and is needed for.
d. stateSalesTaxRateValue - A bad variable name because it is just too wordy. Cutting it down to A's variable name is much more reasonable
e. state tax rate - A bad variable name and probably invalid because it has spaces in the name.
f. taxRate - A good variable name if there are no other tax calculations other than state tax rate. Otherwise you would confuse state vs local tax rate or something, making it a bad variable name.
g. 1TaxRate - A bad variable name because the number 1 has no reason being in the variable name. It doesn't add anything to the name.
h. moneyCharged - A bad variable name because it is not specific enough in explaining why the money is being charged and what for.
Answer:
b) objects are resuable
Explanation:
In OOP there's code reuse where a method or any other body of code is defined once and called or reused severally.
Answer:
SURVEILLANCE-SPECIFIC DESIGN.
Explanation:
Defensible space offers a series of architectural guidelines that can be used in the design of new urban residential complexes to promote both the residential group’s territorial claim to its surroundings and its ability to conduct natural surveillance. The designs are: site interrelationship design, site design, street design and surveillance-specific design.
Surveillance-specific design can be used to increase general visibility by providing adequate lighting, by reducing or eliminating physical barriers to visibility, and by the visibility-promoting location of key areas (entrances, lobbies, elevator waiting areas, parking areas e.t.c.) so as to be directly visible from as many viewpoints as possible.
Since the data center designer requested additional lighting for the entrance to the data center as well as the removal of a object which is blocking security's view of the entrance, then it is an example of SURVEILLANCE-SPECIFIC DESIGN.
Answer: b. 11
Explanation:
//The initial value is 1
//let call the value as x
x = 1
//then the user updated the value to 10
//so now x is 10
x = 10
// and update the workflow to 11
//so now the value of x is 11
x = 11
even if the programmer print x, so the output will be 11
Answer:
SSL has operate in Application Layer to encrypt the information from user and pass it to the TCP. To enhance TCP security developer can integrate the code of SSL with application layer.
Explanation:
SSL certificate is used to enhance the security of user data and encrypt the information of passwords, data transfer and other information to make it secure. This certificate is installed at application layer to make all the information secure and send it to the Transmission Control Protocol (TCP) to send it further. The TCP can be enhanced more by adding SSL code to the application Layer of the Network.