answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna [14]
2 years ago
3

6-Analyze and write a comparison of using C++ pointers and Java reference variables to refer to fixed heap-dynamic variables. Us

e safety and convenience as the primary considerations in the comparison. Write a report (7-15 lines)
Computers and Technology
1 answer:
nalin [4]2 years ago
5 0

Answer:

Check the explanation

Explanation:

- C++ permits arithmetic among pointers but Java references not.

-java doesn’t support pointer explicitly, but Java uses pointer absolutely.

-Memory access via the pointer in C++ is basically unsafe but in java, robust security model does not allow arithmetic among pointers for this reason.

- References in Java are the strong types. Unlike c++ we cannot just cast int* to char* and just re-interpret the memory at that location.

-Manipulation of pointers is unsafe as compared to references in Java.

You might be interested in
Determine the number of bytes necessary to store an uncompressed binary image of size 4000 × 3000 pixels.
miss Akunina [59]

Answer:

12,000,000 bytes.

Explanation:

If we want to store an uncompressed binary image, assuming that we will use 256 different levels to represent all tones in a monochromatic image, each pixel will be stored as an 8-bit sample, i.e. one byte per pixel.

The complete image will have 4000 pixels wide by 3000 pixels height, so an entire image will need 3000*4000= 12,000,000 pixels.

As we will use 8 bits= 1 Byte per pixel, we will need to store 12,000, 000 bytes for a complete uncompressed monochromatic (white & black) image.

5 0
2 years ago
Explain why types of technology valued can vary
Viefleur [7K]
Types of technology valued can vary because all technology is unique to its category so to speak. you have to realize a fork is a former of technology. just as much as a microwave is
6 0
2 years ago
Read 2 more answers
Assign courseStudent's name with Smith, age with 20, and ID with 9999. Use the printAll() member method and a separate println()
vekshin1

Answer:

Following are the program in the java language  

public class Main // Main class  

{

   String courseStudentsname; // variable declaration  

   int age; // variable declaration  

   int ID; // variable declaration  

   Main() // default constructor

   {

courseStudentsname="Smith";//assign the values mention in the question              

       age=20;//assign the values which is mention in the question  

       ID=9999;//assign the values which is mention in the question    

   }

void printAll() // method definition of printAll()  

   {

      System.out.print("Name: " + courseStudentsname ); // display name

      System.out.print(", Age: " + age); // display age

      System.out.print(", ID: " + ID); // display id

   }

public static void main(String[] args) // main fuunction()

{

Main ob=new Main(); // create the object of Main class  

ob.printAll(); // calling the method printAll()

}

}

Output:

Name:"Smith, Age:20, ID:9999

Explanation:

Following are the description of program

  • Create a constructor of "Main" class and store the respective values of courseStudentsname,age and ID in that constructor .
  • create a method printAll() and print the respective values in the given format which is mention in the question by using   System.out.print method.
  • In the main function create an object of "Main" class i.e "ob".
  • Finally, call the printAll() method by using the object of Main class.

4 0
2 years ago
Ethan is a systems developer. He is working on a system where he will implement independent solutions for different processes. W
Igoryamba
The correct answer for this question is this one: " c.huge initial investment"
<span>Ethan is a systems developer. He is working on a system where he will implement independent solutions for different processes. The possible drawback of using such a system is that </span><span><u>huge initial investment</u>
</span>
Hope this helps answer your question and have a nice day ahead.
8 0
2 years ago
3. Personal Trainer is very concerned about the security and protection of the information they collect in the new information s
Sever21 [200]

Answer:

Check the explanation

Explanation:

in order to make sure that the built into the new systems, the below input and output levels of security control have to be considered for personal trainers staff.

There are:

   Network Security

   Application security

   Physical security

   User security

   File security

   Procedural security

These securities levels are consistent and advantage in building the decisions regarding system security.

There are the following policies applied to each control:

Network Security: Network interface and traffic controlling, encryption of data.

Application Security: Verification of data input/output and update of software proceedings.

Physical Security: Security to servers, computers and physical environment.

User Security: Protection passwords and identify management skills.

File Security: Access Permission allocated to users and editing authorizations given to users.

Procedural Security: Certify safety protection to perform decision-making activities and document shredders.

Finally, consider another main point is depends the new system performance are system response time, throughput, bandwidth time and turnaround time.

7 0
2 years ago
Other questions:
  • What is a cursor?
    6·2 answers
  • Why are digital calendars considered to be a convenient way to maintain a study schedule?
    10·2 answers
  • On the Picture Tools Layout tab, you can preview results of the numerous styles, borders, effects, and layouts by _______ comman
    7·2 answers
  • Suppose you define a java class as follows: public class test { } in order to compile this program, the source code should be st
    14·1 answer
  • Following are groups of three​ phrases, which group states three ways to improve your​ concentration?
    13·1 answer
  • Adrian has decided to create a website to catalog all the books he has in his personal library. He wants to store this informati
    11·2 answers
  • What company built its first computer from a wooden box
    12·2 answers
  • Templates contain common layout and formatting that can save you time by not having to recreate documents from scratch. True or
    10·1 answer
  • A website updated daily could be considered _____. a. authoritative b. objective c. accurate d. timely
    8·1 answer
  • Select the correct answer.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!