answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVEN [57.7K]
2 years ago
13

The data components of a class that belong to every instantiated object are the class's ____ variables.

Computers and Technology
2 answers:
ryzh [129]2 years ago
7 0
The data components of a class that belong to every instantiated object are the class's Instance variables.
Sveta_85 [38]2 years ago
3 0

Answer:

instance variables

You might be interested in
What protocol communicates data between routers representing the edges of autonomous systems?Distance-vectorLink stateInterior g
Nata [24]

Explanation:

Exterior gateway protocol are the routing protocols that are used on the internet for exchanging routing information among the autonomous system. These autonomous systems can be gateway protocol, vector routing protocol.

8 0
2 years ago
Given an array of ints named x and an int variable named total that has already been declared, write some code that places the s
Marizza181 [45]

Answer:

Following are the code:

Code:

total = 0; //assign value to total variable.

for (int i=0; i<x.length; i++) //for loop

{

total=total+x[i]; //add all array elements in total variable.

}

Explanation:

In the following question, it is defined that x and total is variable. Where variable x is an integer type array and total is an integer variable. we define some code for calculating the sum of the array element. In the above code, we use for loop that calculates sum of array elements that can be described as:

  • To calculate the sum we use the total variable. In total variable, we assign value 0.
  • Then we define for loop in loop we use total variables that add all array (x[]) elements.

8 0
2 years ago
Which of the following stakeholders makes policies for a green economy?
miskamm [114]

Answer:

government is the answer

7 0
2 years ago
A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n
mylen [45]

Answer:

EMI, and RFI

Explanation:

EMI stands for Electromagnetic Interference when in the radiofrequency spectrum can also be known as Radio-Frequency Interference (RMI).

An unshielded ethernet cable (which is made of copper) can act as an antenna, any noise that leaks to it will cause an interference with the signal, and thus causing data corruption and signal distortion.

6 0
2 years ago
Jason, a penetration tester, is testing a web application that he knows is vulnerable to an SQL injection but the results of the
Mrac [35]

Answer:

Blind SQL injection

Explanation:

  • SQL Injection is a database hacking technique.
  • It uses a series of SQL queries to get access to the Database Management System ( DBMS ).
  • The hacker ( unauthorized user ) tries to find the login credentials of the database system.
  • SQL Injection are of multiple types. One such technique is Blind SQL Injection.
  • Here the attacker is using wait for delay command which implies the attacker is using the time based SQL injection.
  • The time based SQL Injection is " Blind SQL Injection "
  • In this type of SQL Injection, the attacker uses True / False questions on the database and the web application.
  • Here, the attacker asks the True / False questions to the database with some delay in the query and sees the response in the web application. In this way, the attacker tries to hack the database.
  • Ex: The attacker tries to find the database name by using SQL queries with the query meaning to "If the first letter of database name is 'A' wait for 10 secs " next  "If the first letter of database name is 'B' wait for 10 secs " and so on till "If the first letter of database name is 'Z' wait for 10 secs" till finding the whole database name.
  • So, option (a) is correct.
  • Options (b), (c) and (d) are different type of SQL Injections which don't involve wait delay. SO, options (b), (c) , (d) are not the correct options.
6 0
2 years ago
Other questions:
  • Which of the following best describes the concept behind Web 2.0
    5·1 answer
  • When you examine a computer chip under a microscope, what will you see?
    6·1 answer
  • Allows you to manually add an entry to the arp cache that resolves the ip address inetaddr to the physical address etheraddr. wh
    13·1 answer
  • Frank works for an organization that wishes to install a software program on a single server with multiple users connected. Whic
    8·1 answer
  • Have you ever tried to teach a class full of restless, active sixth-graders? I have. I taught sixth-grade students for 12 years.
    15·1 answer
  • if you had two proxy servers located in the same room, what use could you make of them? nothing create a hub sell one of the ser
    14·2 answers
  • A summer camp offers a morning session and an afternoon session.
    5·1 answer
  • Translate the following MIPS code to C. Assume that the variables f, g, h, i, and j are assigned to registers $s0, $s1, $s2, $s3
    8·1 answer
  • Use the single-server drive-up bank teller operation referred to in Problems 1 and 2 to determine the following operating charac
    10·1 answer
  • A school has 100 lockers and 100 students. All lockers are closed on the first day of school. As the students enter, the first s
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!