Represent valid comments

Assignment Help Basic Computer Science
Reference no: EM13773446

1. Which of the following statements is/are true?

A. Object names are***** the bottom section of a UML diagram.

B. Attribute names are***** the bottom section of a UML diagram.

C. Method names are***** the bottom section of a UML diagram.

D. Class names are***** the bottom section of a UML diagram.

E. None of the above

2. Java, C#, and C++ all allow use of comments. Which of the following represent(s) valid comments in these three languages?

A. /* Comment */

B. //* Comment */

C. // Comment //

D. //Comment

E. All of the above

F. None of the above

3. Attributes represent the _____ of an object because they store information about that object.:

A. state

B. behaviors

C. size

D. accessibility

4. If a programmer explicitly defines a constructor that accepts parameters, he or she should also define a _____ version, as a best practice.

A. private

B. public

C. static

D. default

E. None of the above

5. One of the ways object-oriented languages protect object data is through _____.

A. integration of objects

B. universal data access

C. encapsulation

D. the public accessor

E. All of the above

6. Accessors such as "+" and "-" can be used to dictate how external programs, objects, and entities interact with _____.

A. an entire class only

B. all attributes and methods in a class

C. attributes of a class only

D. methods of a class only

E. None of the above

7. A black box is a term used to describe a system that can be understood solely based on its inputs, the resulting outputs and _____.

A. its object-specific instantiated behavior

B. its object-specific state at any given time

C. a detailed understanding of its implementation

D. a basic understanding of its implementation

8. One of the benefits of _____ is that it allows the implementation of a class to change without affecting external entities using that class.

A. abstraction

B. encapsulation

C. instantiation

D. construction

9. Which of the following is a proper implementation setter?

A. int setAge() { return age;}

B. void setAge(int age) {this.age = age;}

C. void setAge(int newAge) {return age;}

D. void setAge() {return age;}

10. Identify the attribute declaration(s) below that most likely contribute to the concept of information/data hiding and is correctly declared.

A. private age;

B. int age;

C. int private age;

D. public int age;

E. None of the above

Reference no: EM13773446

Questions Cloud

The obtained value of the appropriate statistic for testing : 1. For a given N, the interval that bounds the population mean at the 99% confidence level is ____ that which bounds the population mean at the 95% confidence level. A. equal to B. greater than C. less than D. can't be determined
Explain why is it necessary to have principles for policies : Be sure to list your references at the end of your post a minimum of two references. References must be in APA citation format. All posts must be a minimum of 300 words combined. Why is it necessary to have principles for policies
Distribution of survey instrument within correction facility : There are four parts to this Project, each of which is worth a quarter of the Project Paper grade: Distribution of the survey instrument within a corrections facility and Research of the issues presented based on survey results
Impact infiltration and evaporation from the ground : How would drought conditions impact infiltration and evaporation from the ground?
Represent valid comments : Java, C#, and C++ all allow use of comments. Which of the following represent(s) valid comments in these three languages
Write classification essay on styles of eating in cafeteria : Write a classification essay on Styles of eating in the cafeteria.
The main greenhouse gases issues : What are some predicted environmental damages if carbon dioxide emissions are not reduced?
What are the three most acidic ptcrtons in molecule : Draw out the other two staggered Newman Projections for this molecule - What are the three most acidic ptcrtons in molecule.
Description the nature and scope of problem-issue : Your paper must be well documented using current AMA format. You are required to use at least 10 professional, peer-reviewed, scholarly sources in the reference page of your paper.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  As a network administrator for a company you want to

consider the following scenarioas a network administrator for a company you want to configure an ip route between two

  Write a console program

Write a console program that repeatedly prompts the user to enter data until they type done (any case, Upper, Lower, or Mixed). As they enter the data, assign it to a two-dimension array where the first dimension contains exactly what they type an..

  Modify the btod procedure

Modify the BTOD procedure so that leading zeros are replaced by blanks. For example, if the result is "0" - "5" - "9," the leading 0 in the hundreds position gets replaced by a blank, giving " " - "5" - "9."

  Conversely determine the effect of information technology

q1. evaluate and discuss the human resource security privacy and stability issues affected by information technology.

  From time to time words become obsolete

One more requirement, from time to time words become obsolete. When this happens, such word must be removed from the dictionary. Your program must account for this also.

  Find the fraction of the conversion

Hint: use the logical operators to combine the 3 pins into one number, then divide that number by 8 (23) to find the fraction of the conversion and multiply that by 5V which would be the Arduino operating voltage.

  Implements a wireless network

Describe the security threats that a company will face when it implements a wireless network. Assume that the company occupies the six middle floors in a 12- story office building that is located in a downtown business area between two other building..

  Describing equivalence relation

Let X = Z × (Z {0}). Define the relation  on X by (x, y)  (z, t) ↔ xt = yz for every (x, y), (z, t) ∈ X. Show that this is an equivalence relation on X.

  Important ideas for legislators to get from your testimony

Suppose the legislature in your state is debating the adoption of UCITA. What are the three most important ideas you want your legislators to get from your testimony?

  Evaluate the following postfix expressions

Evaluate the following postfix expressions by using the algorithm given. Show the status of the stack after each step of the algorithm. Assume that division is integer division as in java and the identifiers have the following values: a=7;b=3;c=12..

  Both the userid and the person''s full name

a report and not just a listing:The report might be created with awk but it should have a heading. it should list both the userid and the person's full name (a person's fullname can be found in /etc/passwd file)

  Make the contents of your script resident in memory

Modify your whoisthere function so that you can enter "These are the folks logged in:" as an argument to appear before your list of who is logged in to the system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd