. Constructors are executed when?

Answers

Answer 1
Answer:

Answer:

 The constructor are executed when the constructor object are comes in the existence as per the general rule in the computer programming language. The constructor is the special type of the class function that basically perform the initialization of the each object in the computer science.

Then, the constructor initialized actual value of the member of an object are allocated to the given object in the system.  


Related Questions

Outline 3 computer system problem that could harm people and propose the way avoid the problem​
The computer output for integer programs in the textbook does not include reduced costs, dual values, or sensitivity ranges because these variables are not meaningful for integer programs. TrueFalse
The program that you create for this exercise will begin by reading the cost of a meal ordered at a restaurant from the user. Then your program will compute the tax and tip for the meal. Use your local tax rate when computing the amount of tax owing. Compute the tip as 18 percent of the meal amount (without the tax). The output from your program should include the tax amount, the tip amount, and the grand total for the meal including both the tax and the tip. Format the output so that all of the values are displayed using two decimal places.
Which business application uses electronic tags and labels to identify objects wirelessly over short distances? A. Radio-frequency identificationB. Global positioning systemsC. Geographic information systemsD. Location-based services
Write an Enlistee class that keeps data attributes for the following pieces of information: • Enlistee name • Enlistee number Next, write a class named Private that is a subclass of the Enlistee class. The Private class should keep data attributes for the following information: • Platoon number (an integer, such as 1, 2, or 3) • Years of service (also an integer)

Your manager comes up to you and says that you need to install a vpn server so that users can work while they are doing sales calls with customers. your manager wants you to make it as secure as possible with the vpn technologies that appear in this lesson. how would you configure the server?

Answers

I haven't seen your lesson, but I would:

- Not use PPTP, but rather OpenVPN or equivalent
- Consider using client certificates
- Consider using a token generator (a piece of hardware that generates access codes).

Describe what happens at every step of our network model, when a node on one network establishes a TCP connection with a node on another network. You can assume that the two networks are both connected to the same router.Your submission must include a detailed explanation of the following:

Physical layer

Data link layer

Network layer

Transport layer

MAC address

IP address

TCP port

Checksum check

Routing table

TTL

Answers

TCP (Transmission control protocol) makes sure  that  all data packets transferred by (IP)internet protocol  arrives safely.
This is what happens  when a node of one network establishes aTCP connection with a node on another network:
1.Physical layer.
It  is the lowest layer which defines how the cables,network cards,wireless transmitters and other hardware connect computers to the networks and the networks to the rest of  the internet.example of  physical layer is Ethernet,WIFI e.t.c.
It provides the means to transfer the actual bits from one computer to another.In an Ethernet network a computer is connected by plugging a network cable in its Ethernet  card and then plugging the other end of that cable into a router or switch.
It specifies how bits of data are sent over that cable.
2. Data link layer
The data link layer provides a network connection between hosts on a particular local network.
The internet protocol basically assumes all computers are part of one very large "web" of nodes that can all pass packets to other nodes.there is always route from one node to another,even if sometimes a very large number of intermediate nodes get involved. The data link layer makes this assumption true.
For example the client runs on a personal computer in someones home network which is set up using Ethernet protocol .The data link layer now is that Ethernet protocal. The IP packets that this computer transmits are added as payload to Ethernet packets that are transmitted over the local network to ADSL(Asymmetric digital subscriber line) modem that connects the local network to the provider.
3.Network layer
The network layer is responsible for transmitting and routing data packets over the network.The internet uses the internet protocal (IP) as its network layer.Each node on the network has an addres which is called the ip address of which data is sent as IP packets.
when the client sends its TCP connection request, the network layer puts the request in a number of packets and transmits each of them to the server.each packet can take different route and some packets may get lost along the way.If they all make it the transport layer at the server is able to reconstruct the request and it will prepare response confirming that the TCP connection has been set up.
This response is sent back again in a number of IP packets that will hopefully make it to the client.
4. Transport layer
This layer is realized by two protocals. The first is transmission control protocal(TCP) and the second one is the user datagram protocol(UDP) they both break up a message that an application wants to send into packets to the intended recipient.
At the recipients side,both take the payload from the recieved packets and pass those to the application layer.
Again taking an example of email, the email client and server communicate over a reliable TCP connection.The server listens on a certain port untill a connection request arrives from the client .The server acknowledges the request and aTCP connection is established.Using this connection the client and server can exchange data.
5.MAC address
MAC addres(media access control layer) This  layer is responsible for moving data packets to and from one network interface card (NIC) to another accross shared channel.
6. IP address
IP ( internet protocol) it is the the principal protocol in the internet protocol suite for relaying data-grams across network boundaries. its routing function enables inter-networking and essentially establishes the internet.
The  IP is responsible for the following:
i) IP addressing 
ii)host-to-host communications.
iii)fragmentation
7. TCP port
This is an endpoint to a logical connection and a the way a client program specifies a specific server program on a computer in a network.The port number identifies what type of port it is.
8.Checksum check
Checksum is a small sized datum derived from a digital data for the purpose of detecting errors which may have been introduced during its transmission or storage.
Checksum is a simple type of reduduncy check that is used to detect errors in data.
checksum is created by culculating the binary values in a packet or other block of data using some algorithm and storing the results with the data.
9.Routing table
Routing table is a data table stored in a router or a networked computer that lists the routes to particular network destinations and some cases metrics(distances) associated with those routes.
10. TTL
TTL Time-to-live is an internet protocal that tells a network router whether or not the packet has been in the network too long and should be discarded in IPV6.the TTL in each packet has been renamed (hop) limit.
Hop is one portion of the path between source and destination .Data pass through bridges,routers and gateways as they travel between source and destination.each time packets are passed to the  next network device,a hop occurs.





 





Answer:

Your submission must include a detailed explanation of the following:

Physical layer

Physical layer refers, in computing, to the consideration of the hardware components involved in a given process. In terms of networks, the physical layer refers to the means of connection through which data will travel, such as serial interfaces, or coaxial cables.

Data link layer

The data link layer is the protocol layer in a program that handles the moving of data into and out of a physical link in a network. The data link layer is Layer 2 in the Open Systems Interconnection (OSI) architecture model for a set of telecommunication protocols. Data bits are encoded, decoded and organized in the data link layer, before they are transported as frames between two adjacent nodes on the same LAN or WAN. The data link layer also determines how devices recover from collisions that may occur when nodes attempt to send frames at the same time.

Network layer

The network layer of the OSI model is responsible for controlling overall network operation. Its main functions are the routing of packets between source and destination, even if they have to pass through several intermediate nodes along the route, congestion control and accounting for the number of packets or bytes used by the user for charging purposes.

Transport layer

The transport layer is the layer in the open system interconnection (OSI) model responsible for end-to-end communication over a network. It provides logical communication between application processes running on different hosts within a layered architecture of protocols and other network components.   The transport layer is also responsible for the management of error correction, providing quality and reliability to the end user. This layer enables the host to send and receive error corrected data, packets or messages over a network and is the network component that allows multiplexing.

MAC address

When we talk about physical address we are referring to the MAC (Media Access Control) address which is 48 bits (12 hexadecimal characters).

IP address

An Internet Protocol Address (IP Address) is a numeric label assigned to each device (computer, printer, smartphone, etc.) connected to a computer network using the Internet Protocol. for communication.

TCP port

if you are using a File Transfer Protocol (FTP) program, the Internet connection is made through TCP port 21, which is a standard port for this protocol. If you are downloading files from BitTorrent, one of the ports ranging from 6881 to 6889 will be used for such activity.

Checksum check

This is done by calculating the checksum of the data before sending or storing it, and recalculating it upon receipt or retrieval from storage. If the value obtained is the same, the information has not changed and therefore is not corrupted.

More simplified forms of these sums are vulnerable because they do not detect some forms of failure. The simple sum of character values, for example, is vulnerable to their changing order by the commutativity of the sum. There are more elaborate ways of calculating these sums that solve these problems, such as the Cyclic Redundancy Check or CRC widely used for fault detection by dividing polynomials.

Routing table

In a computer network, a routing table, or routing information base, is a data table stored on a network router or host that lists the routes to specific network destinations and, in some cases, metrics associated with those routes.

TTL

Time to Live, which means the number of hops between machines that packets can take a computer network before being discarded (maximum of 255).

Any router is programmed to discount a unit of TTL to packets flowing through it. This is a way to avoid that packages remain on the net for infinite time, if the routing is not being done properly, as in the case of looping.

This value is also useful in screening circuits traversed by packets, as does the tracerouting tool.

Hope this helps :) -Mark Brainiest Please :)

Write a program that declares variables named init1, init2, and init3, to hold your three initials. Display the three initials with a period following each one, as in J.M.F.

Answers

Answer:

Written in Python

init1 = input("initials 1: ")

init2 = input("initials 2: ")

init3 = input("initials 3 ")

print(init1+"."+init2+"."+init3)

Explanation:

This line prompts user for init1 and gets the input

init1 = input("initials 1: ")

This line prompts user for init2 and gets the input

init2 = input("initials 2: ")

This line prompts user for init3 and gets the input

init3 = input("initials 3 ")

This line prints out the required output

print(init1+"."+init2+"."+init3)

Write a statement that defines an array of four integers named miles. The array should be initialized with the values 1, 5, 9, and 22.

Answers

Answer:

int miles[4] = {1, 5, 9, 22};

Explanation:

Given:

Initialized values = 1, 5, 9, and 22

Find:

Defines an array of four integers

Computation:

int miles[4] = {1, 5, 9, 22};

What should a web page designer consider when choosing between fixed positioning and absolute positioning?O Fixed positioning is the HTML default element flow, while absolute positioning is relative to the browser window.
O Fixed positioning is an offset placement from the normal element layout, while absolute positioning is the HTML
default element flow
Fixed positioning is relative to the browser window, while absolute positioning is located at a specific place on a
web page.
Fixed positioning is located at a specific place on a web page window, while absolute positioning is an offset
placement from the normal element layout.

Answers

Answer:

Fixed positioning is relative to the browser window, while absolute positioning is located at a specific place on a web page.

Answer:

c

Explanation: trust me bro

Write an if statement that assigns 100 to x when y is equal to 0. 32. Write an if/else statement that assigns 0 to x when y is equal to 10. Otherwise it should assign 1 to x. 33. Using the following chart, write an if/else if statement that assigns .10, .15, or .20 to commission, depending on the value in sales. Sales Commission Rate Up to $10,000 10% $10,000 to $15,000 15% Over $15,000 20%

Answers

Answer:

1.  

if(y==0.3){ x = 100;}

2.

if(y == 10){

x = 0; }

else {

x = 1; }

3.

if(sales< 10000){

commission = 0.10;

}

else if(sales>= 10000 && sales <= 15000 ){

commission = 0.15;

}

else{

commission = 0.20;

}

Explanation:

The statements written in brackets represent the conditions while the statements in {...} represent the operation that would be executed depending on the outcome of the if statement.

For 1: if(y==0.3){ x = 100;}

If y is 0.3, 100 would be assigned to x

For 2:

if(y == 10){ x = 0; }

If y is 10, 0 would be assigned to x

else { x = 1; }

If otherwise, 1 would be assigned to x

For 3:

if(sales< 10000){commission = 0.10;}

Is sales is less than 10000, commission would be 0.10

else if(sales>= 10000 && sales <= 15000 ){commission = 0.15;}

If sales is within range of 10000-15000, commission would be 0.15

else{commission = 0.20;}

If otherwise, commission would be 0.20