API defines ____ for applications written in a procedural programming language and _____ for applications in object-oriented languages.

Answers

Answer 1

API defines procedure calls for applications written in a procedural programming language and classes for applications in object-oriented languages.

What is API?

API is known to be the short form of  Application Programming Interface. This is known to be a software that acts as an intermediary.

Note that it helps two applications to communicate to one other and as such, API state out procedure calls for applications written in a procedural programming language and classes for applications in object-oriented languages.

Learn more about API from

https://brainly.com/question/12987441

#SPJ1


Related Questions

briefly explain the emerging trends in micro computer technology according to size

Answers

Answer:

Emerging trends in IT include big data analytics, virtual and augmented reality, 5G, and the internet of things. Computer science workers can learn about computer science current events and new technologies by joining a professional organization.Mar 3, 2022

should every presentation have a beggening middle and end​

Answers

Answer:

yes every presentation should have a beginning middle & end.

Explanation:

you should include these 5 parts

- introduction

- objective

- overview

- presentation

- summary/conclusion

The for loop is a count-controlled loop and is used to execute a loop body a predictable number of times.

A. True
B. False

Answers

Answer:

True

Explanation:

For loops:

//This is Java code

for (int i = 0; i < 10; i++)

{

System.out.println("hi");

}

They let you specify the number of times the code inside the loop will execute. Above, it would print "hi" 10 times.

Answer:

true

Explanation:

have a nice day and hope it helps

Which data type does not allow duplicate values-python
A dictionary
B set
C tuple
D list

Answers

Answer:

Set

Explanation:

A set is unique in Python. It does not allow duplicates

Select the correct answer.
Which task is a part of the analysis phase of the SDLC?
A.
installation
B.
coding
C.
planning
D.
testing

Answers

Answer: C. planning

Explanation:

PLS HURRY 100 POINTS

Complete the sentence about information censorship.
Many dictatorial governments only permit .____

1. GOVERNMENT SEARCH ENGINES
2. INDEPENDENT MEDIA
3. VIRTUAL PRIVATE MEETINGS

Answers

The correct option is A that many dictatorial governments only permit GOVERNMENT SEARCH ENGINES.

What do you mean by Government Search Engines?

The main website that is developed by the government in order do their work is  Search.gov. This search engine currently support over 300 millions search queries.

These type of search engines are helpful for provide the service that are covered under the Jurisdiction Indian Government. Most of pages are automatically redirect us to these engines.

On the other hand, dictatorial is defined as the type of government under which one or more person possesses the power.

At last, search engines are used to find specialized data rapidly whereas web directory is used to find a list of different sites.

Therefore, correct option is A.

Learn more about Search engines, refer to the link:

https://brainly.com/question/27509068

#SPJ2

Answer:GOVERNMENT SEARCH ENGINES.

Explanation:

Which type of digital storage stores information primarily on physical computer components in the photographer's possession?
O internal hard drive
O fireproof safe
O cloud storage
O optical storage

Answers

Answer:

Internal Hard Drive

Explanation:

Complete each sentence.

the first part of step 1 involves clicking___
.

an option for step 3 is___ a rule.

the two options identified in step 12 can both be found in the___group under the home tab.

Answers

The first part of step 1 involves clicking styles, edit, editing. An option for step 3 is edit a rule. The two options identified in step 12 can both be found in the editing group.

What is Editing?

Editing is the act of selecting and making changes, any kind of material.

Note that in the above, The first part of step 1 involves clicking styles, edit, editing. An option for step 3 is edit a rule. The two options identified in step 12 can both be found in the editing group.

Learn more about Computer Applications from

https://brainly.com/question/24264599

#SPJ1

Create a class called payroll. instance variables are the name of the employee, the hours person worked and the hourly rate. make sure to include try-catch for the constructor, getter, setter methods. when creating an object, the name cannot be empty string, hours worked cannot be negative and cannot be greater than 56 hours. the hourly rate cannot be negative. also include a method called raise that increase the employee hourly rate. the raise cannot be negative. must use try catch

Answers

So creating code a class called payroll. and complementing with the information given in the edict, found that it will be:

Writing code in JAVA:

import java.util.Scanner;

public class payroll

{

   String name;

   double salary;

   double da;

   double hra;

   double pf;

   double grossSal;

   double netSal;    

   public Pay(String n, double s) {

       name = n;

       salary = s;

       da = 0;

       hra = 0;

       pf = 0;

       grossSal = 0;

       netSal = 0;

   }    

   void calculate() {

       da = salary * 15.0 / 100;

       hra = salary * 10.0 / 100;

       pf = salary * 12.0 / 100;

       grossSal = salary + da + hra;

       netSal = grossSal - pf;

   }    

   void display() {

       System.out.println("Employee Name: " + name);

       System.out.println("Salary: " + salary);

       System.out.println("Dearness Allowance: " + da);

       System.out.println("House Rent Allowance: " + hra);

       System.out.println("Provident Fund: " + pf);

       System.out.println("Gross Salary: " + grossSal);

       System.out.println("Net Salary: " + netSal);

   }    

   public static void main(String args[]) {

       Scanner in = new Scanner(System.in);

       System.out.print("Enter Employee Name: ");

       String empName = in.nextLine();

       System.out.print("Enter Salary: ");

       double empSal = in.nextDouble();        

      payroll = new Pay(empName, empSal);

       obj.calculate();

       obj.display();

   }

}

See more about JAVA code at brainly.com/question/12975450

#SPJ1

Next
Submit Test
Web Design and Development Tools: Mastery Test
Drag each tile to the correct box
Match the DHTML component to its description

scripting language
markup language
document object model
text stylesheet language

HTML
JavaScript
CSS
DOM

Answers

Answer:

script=java

makeup=Html

css=text

dom=document

Explanation:

Answer:  

greatness0003- is correct

I hope this helps

BTW Plato

(proof)

Write a function called middle(string str) that returns a string containing the middle character in str if the length of str is odd, or the two middle characters if the length is even. Write the main that tests this function.

Answers

Answer:

Note: a) If the length of the string is odd there will be two middle characters.

Explanation:

b) If the length of the string is even there will be one middle character. There was a problem connecting to the server. Please check your connection and try running the trinket again.

Select the correct answer.
Leonardo is a student. He is preparing to post his profile on a professional networking website. Which strategy will be most helpful in building
his brand?
OA. talking about his family and friends
OB. mentioning his networking contacts
OC. highlighting his skills and achievements
OD. making remarks about his teachers
OE emphasizing his areas of interest

Answers

Answer:
C. Highlighting his skills and achievements
Explanation:

Some applications require that records be retrievable from anywhere in the file in an arbitrary sequence. These files are known as ___________.

Answers

Answer:

random access files

Explanation:

Some applications require that records be retrievable from anywhere in the file in an arbitrary sequence. These files are known as ___________.

✓ RANDOM ACCESS FILES

The ownership of digtal assets in the emerging metaverse is being driven by what technology that enable the ownership of digital assets, such as gucci digital sneaker?.

Answers

The ownership of digital assets in the emerging metaverse is being driven by Blockchain.

What are digital assets?

Digital asset is known to be any item that can be saved digitally and its  specifically recognized  that firm that can use or realize its value. Examples are documents, audio, etc.

Conclusively, The ownership of digital assets in the emerging metaverse is being driven by Blockchain as it helps to save plenty of its data.

Learn more about digital assets from

https://brainly.com/question/5679893

#SPJ1

which type of shape allows you to add text that can be moved around, formatted with styles and effects, or grouped with other objects?

Answers

The shape which allows you to add text that can be moved around, formatted with styles and effects, or grouped with other objects is text box.

What is text box?

Text box is the different shape box in which any text is written on the drawing area.

Text box in painting comes in many shapes as rectangle, rounded rectangle, circle, oval, thinking cloud, etc.

It can be moved around anywhere on the drawing area and formatted with different fonts and sizes.

Thus, text box is the shape allows to add text that can be moved around, formatted with styles and effects, or grouped with other objects.

Learn more about text box.

https://brainly.com/question/13812028?referrer=searchResults

#SPJ1

A site has been issued the IP address of 192. 168. 10. 0/24. The largest network contained 25 hosts and was given the lowest numbered network number possible. What network number and mask will be assigned

Answers

Answer:

Explanation: The first thing to calculate is what IP addresses are used by the largest LAN. Because the LAN has 100 hosts, 7 bits must be left for host bits.

Explanation:

Explanation: The first thing to calculate is what IP addresses are used by the largest LAN. Because the LAN has 100 hosts, 7 bits must be left for host bits.

Why is it better to organize information using an array instead of simple variables

Answers

Explanation:

Arrays can hold multiple values. This means that if your array has the values of 'cat', 'dog', 'bird', you can access them easily by stating the location. For example, if I wanted to find 'cat' I would use: arrayName(0) and it would give me 'cat'. This is better than using individual variables because if you have a lot of values, creating variables for each value can be unorganized and very inefficient.

Answer: It reduces the amount of code used in the program.

Explanation:

The range of an area where users can access the Internet via high-frequency radio signals transmitting an Internet signal from a wireless router is known as a _____.

Answers

Answer:

A hot spot

Explanation:

Q:

The range of an area where users can access the Internet via high frequency radio signals transmitting an Internet signal from a wireless router is known as a _____. A) HotspotB) PAN…

A:

A) hotspot Bluetooth is for short distance and pan is Personal area networks (PANs) connect an individual's personal devices

Susan performs a full backup of her server every Sunday at 1:00 a.m. and differential backups on Mondays through Fridays at 1:00 a.m. Her server fails at 9:00 a.m. on Wednesday. How many backups does Susan need to restore

Answers

The number of files Susan needs to restore is three because she has full backup and the three files have crashed.

What is differential backup?

The most recent, previous complete data backup is used to create a differential backup. Only the data that has changed since the last full backup is captured in a differential backup. The basis of the differential is the full backup that a differential backup is based on.

Susan performs a full backup of her server every Sunday at 1:00 a.m. and differential backups on Mondays through Fridays at 1:00 a.m.

The server crashed on Wednesday at 9:00 am.

Since the Susan has full backup of her data which she did on Sunday at 1:00 am

Differential backups on Monday through Fridays at 1:00 a.m

So the number of files Susan needs to back up is three because the backup file which is taken on Wednesday at 1:00 am has also failed.

Thus, the number of files Susan needs to restore is three because she has full backup and the three files have crashed.

Learn more about the differential backup here:

https://brainly.com/question/14017082

#SPJ1

Name various input and output devices used with computers.

Answers

Answer:

Input: Keyboard, Mouse, Microphone, Gaming Controller

Output: Monitor, TV, Headphones, Speakers

Explanation:

Input Devices are used to send signals to the computer.

Output Devices use signals from the computer to give you information

Darshan does a self-assessment of his entrepreneurial mindset. he finds that future orientation is a domain
that he wants to improve. what action should he take to improve this?

Answers

The action should he take to improve this is to spend time alone thinking of new ideas.

What is entrepreneurial mindset?

This is known to be the way of thinking that helps a person to be able to get or attain  their goals. Successful entrepreneurs embrace challenges, mistakes, and failure as opportunities to develop new skill sets to help them succeed in the future.

Note that the action should he take to improve this is to spend time alone thinking of new ideas as it will help him to finds that future orientation is a domain that he wants to improve.

Learn more about entrepreneurial mindset from

https://brainly.com/question/24642830

#SPJ1

What was the name of the program that helped to develop a lot of the technology for the apollo program?.

Answers

Answer:

Gemini Program

Explanation:

In conjunction with the Apollo program the US launched the Gemini program which would develop technology for use on the Apollo spacecraft. Under the Gemini program the Americans learned how to change the orbit of a spacecraft, spent significant time in orbit to learn how the human body would be affected, brought two spacecraft together in a rendezvous in space, and also went on the first space walks outside of a space craft.

what is the name of the virus that appears to be a legitimate program but when opened, it can steal passwords or destroy data?

Answers

Answer: A Trojan Horse

Explanation: The name is based on the famous legend, where an army was granted access under the guise of being a safe and trustworthy entity.

The data "10/24/2012" is an example of a ______________ type.

A. string
B. integer
C. boolean
D. float

Answers

Answer:

option B is correct answer

When you are trying to anticipate user errors, which do you think is better to use—an if else statement or a try except statement? Why? Can you think of a rule that you could follow to determine which you should use?

Answers

Answer:

try except

Explanation:

You shouldn't use an if else statement for anticipating user errors since try-except was made for executing statements until encountering an error, while if-else is checking for a condition and if its not met, it will do an else.

Write A Code In Python

Code should be able to
- Save Usernames and Passwords that are entered
- Be able to login to an account when username or password is entered
- Allow Only 3 Log In Attempts

Answers

Answer:

Here is my code below: username = 'Polly1220' password = 'Bob' userInput = input("What is your username?\ n") if userInput == username: a=input("Password?\ n") if a == password: print("Welcome!") else: print("That is the wrong password.") else: print("That is the wrong username.")

Answer:

print('Enter correct username and password combo to continue')

count=0

while count < 3:

   username = input('Enter username: ')

   password = input('Enter password: ')

   if password=='Hytu76E' and username=='bank_admin':

       print('Access granted')

       break

   else:

       print('Access denied. Try again.')

       count += 1

Difference between misinformation and disinformation.

Answers

Both are false information but misinformation is without the intent to harm or deceive

A company sells computers only over the internet. Customers can decide their own computer configuration at the company's website and then place the order for the computer. This is an example of:

Answers

Answer:

This is an example of business to consumer e commerce

________ are not used for querying and analyzing data stored in data warehouses. Group of answer choices Word processing programs OLAP tools MOLAP tools Dashboard tools

Answers

Answer:

Word processing programs

Explanation:

Q:

________ are not used for querying and analyzing data stored in data warehouses.

A:

Word processing programs

Wen is a network engineer. He would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology is best to use

Answers

Answer:

Virtual LAN (VLAN)

Explanation:

Other Questions
What is the main difference between command and market economies?In a command economy only, the government owns most of the businesses and means to make money.In a market economy, the government decides the prices to make sure everyone has equal ability to pay for iterin a command economy, all items are provided.A command economy is reflective of government regulation, while a market economy is reflective of whatconsumers want and need.Competition only hurts the market economy as companies change prices and goods to meet consumer wants. 2. How does the first paragraph contribute to the central idea of the article? A. The author uses clothing to illustrate the strength of the North Korean apparel industry . . The author explains in the first paragraph that it is impossible to demonstrate individuality in North Korea. C. The author provides an example of how much power the North Korean government has over citizens . D. The author describes how clothing is made to help readers understand how research centers work in North Korea. AYO HELP ME OUT ASAP :( Can Wendell make a triangular garden using pieces D, E, and F? Why or why not? Find all sets of four consecutive even integers whose sum is between 155 and 165 HELPP! What do you predict would happen if peppered moths laid fewer eggs and lived for a longer period of time? If 15% of 200 apples are bad, how many apples are bad? Which of the following is the shape of a cross-section of the figure shownbelow?A. RectangleB. SquareC. PrismD. Pentagon I will gove you 100 points Evaluate the following equations cmo los automviles a gasolina pueden hacer viajes largos en pocotiempo.n Select the correct answer from each drop-down menu. choose the word that correctly completes each sentence. 1. despite abby's 2. matt laughed request, her friends refused to go to the concert with her. after scaring his roommate in the middle of the night. reset next Divergent means:tending to move apart in different directionsexisting by consentspontaneously derived from or prompted by a natural tendencycharacteristic of those who treat others with arrogance Who led the Americans during WWII?Asap asap asap asap What effect does the paradox in this excerpt have on the reader? it causes the reader to think about the multiple meanings of the word bear in the play. it causes the reader to think about how doing nothing should be easy, but in fact can be quite hard. it causes the reader to realize that doing nothing is never hard work and that algernon is wrong. it causes the reader to realize that jack thinks doing something is always better than doing nothing. What value of x makes the equation 5 = x + 3 true?Vx ?3= PLEASE HELP!!!!!! IMA DESPRATE!!!!!!Identify the correct graph for the given quadratic function.f(x) = x2 1 which country controlled the land routs for trade with asia. There are 15 boys in school base ball team , they represent 5% of grace Christian school , In all how many are there in school Thematic Dimensions Writing Prompts - page in length each writing promt What real-life situations would work out better for you if you were a different gender? Why? I'm a girl so write about being a boy. If the internet were to crash forever, what would the benefits be for you? The drawbacks? Write a scene that features a) a classmate, b) $100 million, and c) magical shoes