Characteristics of the classs objects

Assignment Help Computer Engineering
Reference no: EM131065521

Question 1.
The entire list of parent classes from which a child class is derived constitutes the __________ of the subclass.
children
ancestors
subordinates
derivatives

Question 2.
A derived class always "__________" case or instance of the more general base class.
has a
make a
redefines
is a

Question 3.
A __________ is a rectangular object you can click; when you do, its appearance usually changes to look pressed.
label
check box
button
text box

Question 4.
A method's name and parameter list together are its __________.
signature
header
profile
interface

Question 5.
In all languages, subscript values must be __________.
characters
non-sequential
real numbers
integers

Question 6.
The true benefit of using an array lies in your ability to use a __________ as a subscript to the array.
constant
loop
command
variable

Question 7.
A __________ is a temporary detour in the logic of a program.
sequence break
control break
control sequence
break control

Question 8.
A __________ is a collection of data stored on a nonvolatile device in a computer system.
computer message
computer interface
computer file
computer selector

Question 9.
The number of bytes in an array is always a multiple of the number of __________ in an array.
subscripts
elements
iterators
indexes

Question 10.
A __________ is a set of program statements that tell you the characteristics of the class's objects and the methods that can be applied to its objects.
class interface
class definition
class reference
class model

Question 11.
The screen design issues that make programs easier to use for people with physical limitations are known as __________ issues.
usability
interface
accessibility
management
interface
management

Question 12.
A(n) __________ in a class diagram indicates private access.
minus sign
plus sign
exclamation point
period

Question 13.
By using __________, you can use reasonable, easy-to-remember names for methods and concentrate on their purpose rather than on memorizing different method names.
inheritance
inference
polymorphism
relationships

Question 14.
When you base a class on another using inheritance, the original class is the __________.
peer
subordinate
parent
child

Question 15.
__________ methods are those for which no object needs to exist.
Dynamic
Public
Static
Private

Question 16.
In object-oriented programming, procedures are called __________.
interfaces
pointers
methods
actions

Question 17.
Methods that set values are called __________ methods.
modifier
mutator
creator
access

Question 18.
The __________ is the location on your computer screen at which you type entries to communicate with the computer's operating system.
GUI
IDE
system terminal
command line

Question 19.
When you write a program that stores a value in a variable, you are using __________ storage.
permanent
temporary
resilient
resident

Question 20.
Array subscripts are always a sequence of __________.
large numbers
characters
negative values
integers

Question 21.
Object-oriented programmers sometimes say an object is one __________ of a class.
enumeration
instantiation
member
reference

Question 22.
A __________ represents a picture or sketch of a screen the user will see when running a program.
cue book
run book
storyboard
skeleton

Question 23.
In most programming languages, before an application can use a data file, it must __________.
open the file
close the file
read the file
prepare the file

Question 24.
One advantage to using a named constant is that the statement becomes __________.
self-perpetuating
self-documenting
self-referencing
self-mitigating

Question 25.
All array elements have the same group __________.
subscript
name
memory location
value

Reference no: EM131065521

Questions Cloud

Identify security solutions and assumptions : Be sure to clearly identifies and articulates the cost of the overall security solution. Also Clearly identify security solutions and assumptions that consist of people, processes and technologies related to the risks.
What is the median team payroll : what is the median team payroll?
Using regression analysis in criminal justice research : For this Discussion, select one of the articles in this week's Learning Resources. Examine the article, focusing on which regression technique was used by the article's author when conducting the research presented. Consider the implications of th..
Classification and division research paper : Classification and division essays are the result of writers grouping information into categories (classes).  A single topic can possibly be classified in more than one way, depending on the authors purpose(s) and audience.
Characteristics of the classs objects : You can use reasonable, easy-to-remember names for methods and concentrate on their purpose rather than on memorizing different method names - screen design issues that make programs easier to use for people with physical limitations
What is the mean of the normal distribution appropriate : What is the standard deviation for the Normal distribution appropriate to approximate the probability model for the proportion of green m&ms in this sample of 200?
At what age is the percentage of income spent on health care : At what age is the percentage of income spent on health care 15%?
What is the percentage return : What is the percentage return?
What is the relationship between the atc and avc curves : Draw the graphs of the ATC, AVC, and MC curves. What is the relationship between the ATC and AVC curves? Between the MC and AVC curves? Suppose that Al discovers new technology that boosts the productivity of his workers, so that more bicycles can..

Reviews

Write a Review

Computer Engineering Questions & Answers

  This is an individually prepared assessment task in this

q. that governments need to do more to safeguard the internet from hacking and cyber warfare because such activity

  A school cafeteria is providing an electronic survey to its

a school cafeteria is giving an electronic survey to its students to improve their lunch menu. create an app that uses

  Explain the characteristics of a high performance team

Listing and define six major SDLC phases and the products of each. Indicate the CASE tools that would be used to support each phase.

  You have just been hired as an information security

you have just been hired as an information security engineer for a large multi-international corporation.

  Explain the concepts of information systems security as

you are the information security officer for a small pharmacy that has recently been opened in the local shopping mall.

  Discuss five characteristics of direct manipulation systems

question 1 discuss five characteristics of direct manipulation systems according to shneidermanquestion 2 give four

  Give difference between standard forms, mdi parent forms

define the difference between standard forms, MDI parent forms, and MDI child forms in an MDI application. How is each type of form created? Give examples of when to use each type of form.

  Save the punch in or punch out date

Display an input field called "Choice" to input one of the four options - Inputting an incorrect option shall display a prompt indicating that the input was invalid and to try again.

  Present the business case for technology investments

paper describing how to formulate and present the business case for technology investments

  What are the characteristics of application

offer examples of business applications that exhibit these characteristics. You can provide examples of applications from any client/server development environment. The two main platforms are Microsoft .NET and Sun JAVA J2EE.

  Recognize the top-level objects of the microwave

make a table with the following four column headings: Top-Level Objects, Communicates With, Incoming Messages, and Outgoing Messages.

  Recognizing the asset and threat

Propose the reasonable values for items in the risk register for this asset and threat, and offer the justifications for your choices.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd