Characteristics of the classs objects

Assignment Help Computer Engineering
Reference no: EM131065521

Question 1.
The entire list of parent classes from which a child class is derived constitutes the __________ of the subclass.
children
ancestors
subordinates
derivatives

Question 2.
A derived class always "__________" case or instance of the more general base class.
has a
make a
redefines
is a

Question 3.
A __________ is a rectangular object you can click; when you do, its appearance usually changes to look pressed.
label
check box
button
text box

Question 4.
A method's name and parameter list together are its __________.
signature
header
profile
interface

Question 5.
In all languages, subscript values must be __________.
characters
non-sequential
real numbers
integers

Question 6.
The true benefit of using an array lies in your ability to use a __________ as a subscript to the array.
constant
loop
command
variable

Question 7.
A __________ is a temporary detour in the logic of a program.
sequence break
control break
control sequence
break control

Question 8.
A __________ is a collection of data stored on a nonvolatile device in a computer system.
computer message
computer interface
computer file
computer selector

Question 9.
The number of bytes in an array is always a multiple of the number of __________ in an array.
subscripts
elements
iterators
indexes

Question 10.
A __________ is a set of program statements that tell you the characteristics of the class's objects and the methods that can be applied to its objects.
class interface
class definition
class reference
class model

Question 11.
The screen design issues that make programs easier to use for people with physical limitations are known as __________ issues.
usability
interface
accessibility
management
interface
management

Question 12.
A(n) __________ in a class diagram indicates private access.
minus sign
plus sign
exclamation point
period

Question 13.
By using __________, you can use reasonable, easy-to-remember names for methods and concentrate on their purpose rather than on memorizing different method names.
inheritance
inference
polymorphism
relationships

Question 14.
When you base a class on another using inheritance, the original class is the __________.
peer
subordinate
parent
child

Question 15.
__________ methods are those for which no object needs to exist.
Dynamic
Public
Static
Private

Question 16.
In object-oriented programming, procedures are called __________.
interfaces
pointers
methods
actions

Question 17.
Methods that set values are called __________ methods.
modifier
mutator
creator
access

Question 18.
The __________ is the location on your computer screen at which you type entries to communicate with the computer's operating system.
GUI
IDE
system terminal
command line

Question 19.
When you write a program that stores a value in a variable, you are using __________ storage.
permanent
temporary
resilient
resident

Question 20.
Array subscripts are always a sequence of __________.
large numbers
characters
negative values
integers

Question 21.
Object-oriented programmers sometimes say an object is one __________ of a class.
enumeration
instantiation
member
reference

Question 22.
A __________ represents a picture or sketch of a screen the user will see when running a program.
cue book
run book
storyboard
skeleton

Question 23.
In most programming languages, before an application can use a data file, it must __________.
open the file
close the file
read the file
prepare the file

Question 24.
One advantage to using a named constant is that the statement becomes __________.
self-perpetuating
self-documenting
self-referencing
self-mitigating

Question 25.
All array elements have the same group __________.
subscript
name
memory location
value

Reference no: EM131065521

Questions Cloud

Identify security solutions and assumptions : Be sure to clearly identifies and articulates the cost of the overall security solution. Also Clearly identify security solutions and assumptions that consist of people, processes and technologies related to the risks.
What is the median team payroll : what is the median team payroll?
Using regression analysis in criminal justice research : For this Discussion, select one of the articles in this week's Learning Resources. Examine the article, focusing on which regression technique was used by the article's author when conducting the research presented. Consider the implications of th..
Classification and division research paper : Classification and division essays are the result of writers grouping information into categories (classes).  A single topic can possibly be classified in more than one way, depending on the authors purpose(s) and audience.
Characteristics of the classs objects : You can use reasonable, easy-to-remember names for methods and concentrate on their purpose rather than on memorizing different method names - screen design issues that make programs easier to use for people with physical limitations
What is the mean of the normal distribution appropriate : What is the standard deviation for the Normal distribution appropriate to approximate the probability model for the proportion of green m&ms in this sample of 200?
At what age is the percentage of income spent on health care : At what age is the percentage of income spent on health care 15%?
What is the percentage return : What is the percentage return?
What is the relationship between the atc and avc curves : Draw the graphs of the ATC, AVC, and MC curves. What is the relationship between the ATC and AVC curves? Between the MC and AVC curves? Suppose that Al discovers new technology that boosts the productivity of his workers, so that more bicycles can..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd