A derived class is generally smaller than its base class

Assignment Help Computer Engineering
Reference no: EM132217619

1. A class diagram consists of a ____ divided into three sections.
A) square
B) rectangle
C) circle

2. The set of all the values or contents of a class objectâ€TMs instance variables is also known as its ____.
A) classification
B) state
C) core

3. Arrays, unlike simple built-in types, are passed by ____.
A) type
B) class
C) reference

4. A class can contain another classâ€TMs objects as data members.
A) True
B) False

5. Programmers refer to hidden implementation details as existing in a ____.
A) white box
B) white hole
C) black box

6. When an array is a method parameter, the ____ in the method header remain empty and do not hold a size.
A) place holder
B) square brackets
C) parentheses

7. Programmers say the data items are ____ only after they have been declared and within the method in which they are declared.
A) available
B) identified
C) visible
D) useable

8. The parent class constructor “takes care” of the child classâ€TMs requirements before performing any other actions.
A) True
B) False

9. In an event-driven program, you design the screens, define the objects, and define how the screens will connect.
A) True
B) False

10. By making data fields private and allowing access to them only through a classâ€TMs methods, you protect the ways in which data can be altered and accessed.
A) True
B) False

11. In some programming languages, such as C#, Visual Basic, and Java, every class you create is a child of one ultimate base class, often called the ____ class.
A) Top
B) Object
C) Main

12. With procedure-driven programs, the user might initiate any number of events in any order.
A) True
B) False

13. The ____ type for a method can be any type, which includes numeric, character, and string, as well as other more specific types that exist in the programming language you are using.
A) return
B) data
C) variable

14. When you create your own transitive inheritance chains, you want to place fields and methods at their most ____ level.
A) simple
B) general
C) narrow

15. A derived class is generally smaller than its base class.
A) True
B) False

16. Using a method name to encapsulate a series of statements is an example of the feature that programmers call ____.
A) grouping
B) packaging
C) encapsulation
D) abstraction

17. A ____ is an environment in which you can create programs by dragging components such as buttons and labels onto a screen and arranging them visually
A) visual development environment
B) virtual development environment
C) virtual design environment

18. Fortunately for todayâ€TMs computer users, operating system software allows them to use a mouse or other pointing device to select pictures, or ____, on the screen.
A) objects
B) selectors
C) icons

19. A(n) ____ shows the relationship between screens in an interactive GUI program.
A) relationship diagram
B) relationship plan
C) interactivity diagram

20. Performing an operation on an icon causes a(n) ____, which is an occurrence that generates a message sent to an object.
A) operation
B) event
C) trigger

21. A ____ class contains methods that allow you set physical properties such as height and width.
A) container
B) method
C) property

22. A ____ in a class diagram indicates public access.
A) plus
B) dash
C) minus

23. When you overload a method, you run the risk of creating ____ methodsâ€"a situation in which the compiler cannot determine which method to use.
A) ambiguous
B) uncertain
C) unclear

24. In most programming languages, you are allowed to include multiple ____ statements in a method.
A) return
B) end
C) back

25. An overloaded method is not ambiguous on its ownâ€"it becomes ambiguous only if you create an ambiguous situation.
A) True
B) False

26. The concept of class inheritance is partially useful because it makes class code reusable.
A) True
B) False

27. A(n) ____ class is one from which you cannot create any concrete objects, but from which you can inherit.
A) open
B) polymorphic
C) abstract

28. ____ is the correct sequence of words and symbols that form the operating systemâ€TMs command set
A) Perfect language
B) Grammar
C) Syntax

29. Simple non-array variables are usually passed to methods by ____.
A) value
B) reference
C) class

30. GUI components are often referred to as ____.
A) widgets
B) gadgets
C) objects

31. The ability to use methods without knowing the details of their contents is a feature of ____.
A) abstraction
B) encapsulation
C) construction

32. When you program with event-driven languages, the emphasis is on the objects that the user can manipulate, such as buttons and menus, and on the events that the user can initiate with those objects, such as clicking or double-clicking.
A) True
B) False

33. The computerâ€TMs ____ is the software that you use to run a computer and manage its resources.
A) operating system
B) graphical system
C) command system

34. ____ is the process of acquiring the traits of oneâ€TMs predecessors.
A) Heritage
B) Legacy
C) Inheritance

35. From the 1950s right through the 1960s and 1970s, almost all interactive dialogues between people and computers took place at the ____.
A) operating prompt
B) command prompt
C) operating line

36. Any component you place on the screen has a horizontal, or ____, position.
A) x-axis
B) y-axis

37. In Java, you write the word “inherits” to use inheritance.
A) True
B) False

38. ____ variables and constants are those that are known to an entire class.
A) Global
B) Local
C) Comprehensive

39. With ____, you make a request to a method without knowing the details of how the method works.
A) implementation masking
B) implementation hiding
C) method masking

40. A method ____ (or method declaration) is the entry point to the method.
A) title
B) space
C) header
D) opener

Reference no: EM132217619

Questions Cloud

Sensitivity analysis-what is the value of maximum profit : In product-mix-problem, X1, X2, X3, and X4 indicate the units of products 1, 2, 3 and 4, respectively and linear programming model is.
Manage risk and increase agricultural efficiency : Which of the following is prompting farmers in many developed nations to discover new ways to manage risk and increase agricultural efficiency?
What does the asia pacific regions hospitality landscape : What does the Asia Pacific regions hospitality landscape look like? Homogeneous? Heterogeneous? Explain.
Discuss the role of unions in the history of american labor : Discuss the role of unions in the history of American labor. Are unions today good, bad, or needed for companies?
A derived class is generally smaller than its base class : In some programming languages, such as C#, Visual Basic, and Java, every class you create is a child of one ultimate base class, often called.
Create student login and student account page using html : Successful login will take you to the Account Information screen. They must provide a unique username that is at least 6 characters.
The director of it security is generally in charge : The tunnel can be created between a remote workstation using the public Internet and a VPN router or a secure browser and ________ Web site.
Which of the algorithms results in the minimum average : What is the turnaround time of each process for each of the scheduling algorithms in part a? Which of the algorithms results in the minimum average waiting time
What does the following code do : What would be the value of discountRate after the following statements are executed?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd