answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVEN [57.7K]
2 years ago
13

The data components of a class that belong to every instantiated object are the class's ____ variables.

Computers and Technology
2 answers:
ryzh [129]2 years ago
7 0
The data components of a class that belong to every instantiated object are the class's Instance variables.
Sveta_85 [38]2 years ago
3 0

Answer:

instance variables

You might be interested in
1. Discuss why it is so important for all application builders to always check data received from unknown sources, such as Web a
Ivan

Answer:

1. It is so important for all application builders to always check data received from unknown sources before using that data. This is because of the Security related reasons and vulnerabilities .For example the data received might contain harmful hidden viruses.  Web applications are accessed by internet and these are the most vulnerable to attacks by hacker or intruders using harmful data containing malware. This can cause security breaches due to the security flaws or bugs in Web applications. So to overcome such security risks which can cause damage in the Web applications, data from unknown sources should be checked.

Explanation:

2. When the Website is being used and running, there is a room for possible glitches or other bugs and issues. To understand, handle and address  issues successfully, the website operators carefully and consistently patch and configure their systems. The administrators collect the user data which enables them to have enough data in order to make the requisite alterations or improvements in the website. This also helps to improve the website performance. The patching and configuring of systems fix problems in the website which reduces the risk of website damage and the website works smoothly this way. Moreover it identifies vulnerabilities, solve configuration issues and upgrades in website features provide additional capabilities to the website.

8 0
1 year ago
During which stage does the central processing unit analyze the instruction and encode it in the form of a number, and then gene
guapka [62]

Answer:

<em>a. fetch</em>

Explanation:

<em>The device collects a program command from its memory during the run cycle of the fetch. </em>

It then defines and performs the activities needed for that command.  The CPU continuously repeats the cycle of fetching, decoding, and executing a command while  the computer is switched on.

4 0
2 years ago
What makes you normally visit the site-graphics, layout, or content? Why?​
Vinvika [58]

Answer:

robux

Explanation:

robux

8 0
1 year ago
Read 2 more answers
To what extent are the following computer systems instances of artificial intelligence:
ss7ja [257]

Answer: Supermarket bar code scanners and Voice-activated telephone menus are not instances of artificial intelligence

Explanation:

(a)Supermarket bar code scanners are only able to read the code however they are not able to perform any kind of machine learning techniques to be able to learn a sequence from the codes. As machine learning is a important part of artificial intelligence (AI) so they are not instances of AI. Similarly for Voice-activated telephone menus they could only display and cannot perform any intelligent task.

Web search engines and Internet routing algorithms are very dynamic and intelligent in processing and retrieving information to the end user.

So they are instances of AI.

8 0
2 years ago
5. Assume a computer has a physical memory organized into 64-bit words. Give the word address and offset within the word for eac
spin [16.1K]

Answer:

see explaination and attachment

Explanation:

5.

To convert any byte address, By, to word address, Wo, first divide By by No, the no. of bytes/word, and ignores the remainder. To calculate a byte offset, O, in word, calculate the remainder of By divided by No.

i) 0 : word address = 0/8 = 0 and offset, O = 0 mod 8 = 0

ii) 9 : word address = 9/8 = 1 and offset, O = 9 mod 8 = 1

iii) 27 : word address = 27/8 = 3 and offset, O = 27 mod 8 = 3

iv) 31 : word address = 31/8 = 3 and offset, O = 31 mod 8 = 7

v) 120 : word address = 120/8 = 15 and offset, O = 120 mod 8 = 0

vi) 256 :word address = 256/8 = 32 and offset, O = 256 mod 8 = 0

6. see attachment for the python programming screen shot and output

4 0
2 years ago
Other questions:
  • Which of the following is ideal for long distance communication ?
    5·1 answer
  • A two-dimensional array can have elements of ________ data type(s).
    7·1 answer
  • Column, bar, pie, line, and scatter are all types of_____
    9·1 answer
  • Import java.util.scanner; public class sumofmax { public double findmax(double num1, double num2) { double maxval; // note: if-e
    10·1 answer
  • If you are viewing a webpage with customized or regenerated content, such as updated stock quotes, what type of webpage are you
    5·1 answer
  • What three requirements are defined by the protocols used in network communications to allow message transmission across a netwo
    11·1 answer
  • Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention
    9·1 answer
  • Identify the articulation site that allows us to nod our head ""yes"".
    13·1 answer
  • Amanda a recently moved into a new home. Everyone has their own tablet, and wants to connect to the same network, no matter wher
    12·1 answer
  • Write a print statement that displays a random integer between 5 and 5000. Assume the random library is imported.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!