Which of the following programming languages are object oriented

Answers

Answer 1
Answer:

Answer:

Python (D) on Edg

Explanation:

Answer 2
Answer:

Answer:

JAVA & Python

Explanation:


Related Questions

The e-mail address of the main recipient of an e-mail belongs in which field?A. Attachment B. CC C. Subject line D. TO
The index used by the OS to manage computer files is called _____.API FAT GUI RAM
Your grandmother tells you a dollar doesn't go as far as it used to. She says the "purchasing power" of a dollar is much less than it used to be. Explain what she means. Try to use and explain terms like inflation and deflation in your answer. ​
you are about to install a new desktop application that you downloaded from a website. What should you do before you start the installation?
Please help me guys! :))))) To activate the Spelling and Grammar check features, you can either navigate to the Review tab, or use the shortcut key _____. F9 Ctrl+F F7 Ctrl+H

Jose has developed a nutrition app for people to log their food intake. His app’s servers occasionally go down, and when he totals the amount of downtime, it is one day out of every 100 days. Should he be concerned?A.
Yes, because any amount of downtime is unacceptable.

B.
Yes, because his downtime is more than 0.01 percent.

C.
No, because it is normal for an app to be down 1 percent of the time.

D.
No, because the downtimes are usually at night, so users won’t be affected.

Answers

The correct answer is B.

Coal is formed in which of the following depositional environments?A. A glacier
B. A swamp
C. A beach
D. A river channel

Answers

The accumulation of physical, chemical, and biological characteristics and processes involved in the deposition of sediments that result in a distinctive group of sedimentary rocks is known as a depositional environment. Thus option B is correct.

What coal formed in swamp depositional environments?

A chemical sedimentary rock mostly composed of carbon is coal. It is created from the leftovers of plants that once flourished in wetlands with plenty of muck, water, trees, and shrubs.

Because of this, the local flora produces organic matter rapidly—in fact, more rapidly than it can decompose. In certain locations, organic material builds up in layers that are eventually buried.

Therefore, coal is formed in a swamp depositional environment.Coal first forms in swampy wetlands where the groundwater level is close to or just above the topsoil.

Learn more about Coal here:

brainly.com/question/28318766

#SPJ5

Before a new electrical installation can be connected to the source of electricity, it must be examined and approved by A. a local inspection agency. B. an electrical code committee. C. the Underwriters Laboratories. D. the National Fire Protection Association.

Answers

The answer is A. a local inspection agency. i just took the test

It has to be inspected by a government official

You are planning to add CSS to a web page that was written with HTML and has lists on the page. What new formatting option will you gain by including CSS?

Answers

Answer: Easily alter the color of all list to a different one.

Explanation: Cascading Style Sheet (CSS) is mainly used to style documents written in Markup language such as Hypertext Markup Language (HTML). Cascading Style Sheet is a robust due to the ease afforded to web designers in the alteration and modification of styles applied to documents written in Markup Language. It gives users or designers more control over the style of documents, it is easier and ultimately saves a lot of time.

In the scenario above, adding CSS allows the user to change or alter the style of the list, such as color much more easily.

What is the output of the following program?#include using namespace std;void doSomething(∫);int main(){int x = 2;cout << x << endl;doSomething(x);cout << x << endl;return 0;}void doSomething(int &num){num = 0;cout << num << endl;}

Answers

Answer:

The outputs of the code is

2

0

2

Explanation:

First, I'll arrange the code line by line. While arranging the code, I'll make some corrections

#include <iostream>

using namespace std;

void doSomething();

int main(){

int x = 2;

cout << x <<endl;

doSomething(x);

cout << x << endl;

return 0;

}

void doSomething(int &num)

{

num = 0;

cout << num << endl;

}

At line 6, the value of x which is 2 is printed and the line is terminated to prevent printing of value on the same line. So, the next print statement will start on the next line.

At line 7, the function doSomething () is called.

This statement will execute the instructions in the doSomething () function and print value 0. This line is also terminated.

At line 8, the value of x is printed which is also 2

which application guard settings need to be configured so that any non-corporate approved resources can be accessed using application guard?

Answers

To configure Application Guard settings for accessing non-corporate approved resources, you'll need to adjust certain settings in Windows Defender Application Guard (WDAG). WDAG is a security feature.

in Windows 10 that uses virtualization to create a secure, isolated environment for running potentially risky tasks or browsing non-corporate approved websites. To set up WDAG to allow access to non-corporate approved resources, follow these steps:
1. Windows Defender Application Guard: First, make sure WDAG is enabled on your device. You can do this through Group Policy, Intune, or System Center Configuration Manager.
2. Configure network isolation settings: Specify which domains are considered corporate resources by creating a list of allowed domains. This ensures that non-corporate approved resources are opened in an isolated container.
3. Adjust Application Guard policies: Customize policies to meet your organization's requirements, such as allowing clipboard access, printing, and file downloads from the isolated container. This can be done through Group Policy or MDM (Mobile Device Management) tools like Intune.
4. Configure Application Guard for Microsoft Edge: Configure Edge settings to launch WDAG automatically when browsing non-corporate approved websites. This can be done through Edge's Group Policy settings or MDM tools.
By configuring these settings, you'll create a secure environment that allows access to non-corporate approved resources while minimizing the risk of potential threats.

Delegation of credentials for RDP connections via GPO is possible. Windows by default enables the user to save her RDP connection's password. To accomplish this, the user must open the Remote Desktop Connection (mstsc.exe) client window, input the RDP machine name and user name, and check the Allow storing credentials box.

Learn more about Windows Defender Application Guard here

brainly.com/question/30633165

#SPJ11