How does abstraction help us write programs

Answers

Answer 1
Answer:

Answer:

Abstraction refines concepts to their core values, stripping away ideas to the fundamentals of the abstract idea. It leaves the common details of an idea. Abstractions make it easier to understand code because it concentrates on core features/actions and not on the small details.

This is only to be used for studying purposes.

Hope it helps!


Related Questions

Access control lists (ACLs) are used to permit and deny traffic in an IP router.A. TrueB. False
Develop a crawler that collects the email addresses in the visited web pages. You can write a function emails() that takes a document (as a string) as input and returns the set of email addresses (i.e., strings) appearing in it. You should use a regular expression to find the email addresses in the document.
What are the different options in a page layout feature ? Select three options
Translate each statement into a logical expression. Then negate the expression by adding a negation operation to the beginning of the expression. Apply De Morgan's law until each negation operation applies directly to a predicate and then translate the logical expression back into English.Sample question: Some patient was given the placebo and the medication.∃x (P(x) ∧ D(x))Negation: ¬∃x (P(x) ∧ D(x))Applying De Morgan's law: ∀x (¬P(x) ∨ ¬D(x))English: Every patient was either not given the placebo or not given the medication (or both).(a) Every patient was given the medication.(b) Every patient was given the medication or the placebo or both.(c) There is a patient who took the medication and had migraines.(d) Every patient who took the placebo had migraines. (Hint: you will need to apply the conditional identity, p → q ≡ ¬p ∨ q.)
Hello,Can you please help me with the following questions:3. You enjoy technical matters, have a background in computer science and enjoy coding and playing video games in your free time. Which video game industry job would best match your profile?a. Game testerb. Producerc. Programmerd. Video game artist6. Which of the following is an essential skill for game testers?a. Thorough understanding of Java and C++b. Technical drawingc. Technical writingd. Project management9. Which of the following skills is the most important when applying for a game artist job?a. Degree in artsb. Strong art portfolioc. Previous game testing experienced, knowledge of scripting and codeing10. The Stencyl program is recommended for ______.a. creating 2D gamesb. creating 3D gamesc. Starting to learn to programd. creating gaming art11. You are passionate about video games, have spent part of your life in different countries and are fluent in their languages. You are considering looking for a job in video games. Which of the following jobs could you be qualified for, considering your skills and experience?a. Game programming with a focus on languagesb. Translationc. Game localizationd. Cultural gaming12. Because it is one of the main programming languages used in some of the most popular game engines in the industry, which programming language does the author of the textbook recommend learning first?a. Javab. C Sharpc. C++d. SQL13. Which of the following statements is NOT true about internships?a. internships offer great opportunity to create and build connections within the industry.b. Internships lead to a job offer upon successful completionc. Internships offer an opportunity to get first-hand experience of the industryd. Internships can be paid or unpaid15. What is the best approach to take if you have not heard back from a company after applying for a job?a. Wait, sometimes it takes time to process application and impatience can give a bad impressionb. Visit the company site personally to inquire about the status of your applicationc. Try to find out on which side the process may be stalling and take appropriate steps to get the process moving forward, when possibled. Reapply18. You are applying for a game programmer job at a reputable gaming company. Your application may stand the best chance of being noticed if you include which of the following in your application?a. List of all degrees and courses you have taken to acquire and hone your programming skillsb. Portfolio including samples of codes you have createdc. Portfolio including playable video game demo.d. Portfolio of your artwork.19. Which of the following is the most important item to include in your CV?a. All gaming projects you have worked on, paid or unpaid.b. Extracurricular activities related to gaming.c. Major accomplishmentsd. Short samples of code or technical writing samples.20. Which of the following job hunting practices is the least effective?a. Posting CV on job boards.b. Searching for jobs on job posting sitesc. Doing an internshipd. Applying for a specific job posting via company website

3. If B3=6 and D5=8, what would the following function return? IF(B3>D5, "Closed", D5-B3) *A. "Closed"
B. -2
C. "Open"
D. +2

Answers

Answer:

D. +2

Explanation:

The given function is an IF function where the first argument is a logical test, the second argument is the result if the logical test is true and the third argument is the result if the logical test is false. Depending on whether the result of the logical test is true or false, the respective value will be returned.

IF(logical_test, value_if_true, value_if_false)

In this case, the logical test first compares the value of B3 and D5. As B3 is not greater than D5, the result is false and the value for false will be returned. The value for false result of the logical test is equated by D5-B3 which is equal to 2. Thus the result of the IF function is +2.

Hello, Good Works mate!

Answer: B) -2
*The result will be negative.

Kind Regards

Develop a program that implements the POLYNOMIAL ADT using the LIST ADT. The POLYNOMIAL ADT is used to represent polynomials and the following operations defined on polynomials:1.Evaluate()(xp, z). Evaluates the polynomial )(xp at the point zx

Answers

Answer:

Polynomial Zero() ::= return the polynomial p(x)=0

Boolean isZero(poly) ::= return (poly == 0)

Coefficient Coeff(poly , expon) ::= If (expon tex2html_wrap_inline93 poly) return its corresponding coefficient else return 0

Exponent LeadExp(poly) ::= return the degree of poly

Polynomial Remove(poly , expon) ::= If (expon tex2html_wrap_inline93 poly) remove the corresponding term  and return the new poly  else return ERROR

Polynomial SingleMult(poly , coef , expon) ::= return poly tex2html_wrap_inline105 coef x tex2html_wrap_inline107

Polynomial Add(poly1 , poly2) ::= return poly1 + poly2

Polynomial Mult(poly1 , poly2) ::= return poly1 tex2html_wrap_inline105 poly2

end Polynomial

Write a statement that defines an array of four integers named miles. The array should be initialized with the values 1, 5, 9, and 22.

Answers

Answer:

int miles[4] = {1, 5, 9, 22};

Explanation:

Given:

Initialized values = 1, 5, 9, and 22

Find:

Defines an array of four integers

Computation:

int miles[4] = {1, 5, 9, 22};

What type of result does the MATCH function, when used on its own, return?

Answers

Answer:

It returns the lookup value located in a specific location.

Explanation:

What character makes an assignment statement an assignment statement?

Answers

Answer:

'='

Explanation:

The equal ('=') is the character that is used to assign the value in the programming.

In the programming, there is a lot of character which has different meaning and uses for a different purpose.

like '==' it is used for checking equality between the Boolean.

'+' is a character that is used for adding.

'-'  is a character that is used for subtraction.

similarly, '=' used for assigning.

for example:

a = a + b;

In the programming, the program evaluates the (a + b) first and then the result assigns to the variable.

Preserving confidentiality, integrity, and availability is a restatement of the concern over interruption, interception, modification, and fabrication. i. Briefly explain the 4 attacks: interruption, interception, modification, and fabrication.
ii. How do the first three security concepts relate to these four attacks

Answers

Answer and Explanation:

I and II answered

Interruption: interruption occurs when network is tampered with or communication between systems in a network is obstructed for illegitimate purposes.

Interception: interception occurs when data sent between systems is intercepted such that the message sent to another system is seen by an unauthorized user before it reaches destination. Interception violates confidentiality of a message.

Modification: modification occurs when data sent from a system to another system on the network is altered by an authorized user before it reaches it's destination. Modification attacks violate integrity, confidentiality and authenticity of a message.

Fabrication: fabrication occurs when an unauthorized user poses as a valid user and sends a fake message to a system in the network. Fabrication violates confidentiality, integrity and authenticity.