1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dmitriy555 [2]
1 year ago
5

When methods have ____, other programs and methods may use the methods to get access to the private data.

Computers and Technology
1 answer:
Nostrana [21]1 year ago
5 0

When methods have public access, other programs and methods may use the methods to get access to the private data.

<h3>What do you mean by public access?</h3>

The Definition of the term public access is known to be a kind of a television channel where anybody can be able to broadcast a program

An example is the city council meeting can be able to broadcast on public access.

Hence, When methods have public access, other programs and methods may use the methods to get access to the private data.

See full question below

When methods have ____, other programs and methods may use the methods to get access to the private data.

a. private access

b. public access

c. complete access

d. all access

Learn more about public access from

brainly.com/question/2736088

#SPJ1

You might be interested in
This program needs to be written in Java. Along with NO For/while loops, and no methods.
Umnica [9.8K]
The only way without a while loop and no method I can think of is use switch with every possible variation of the four digit binary which is 15.

Here is the starter code:

import java.util.Scanner;
public class MyClass {
public static void main(String args[]) {
Scanner sc = new Scanner(System.in);
int digit = sc.nextInt();
switch(digit) {
case 0000:
System.out.println("0");
break;
case 0001:
System.out.println("1");
break;
case 0010:
System.out.println("2");
break;
case 0011:
System.out.println("3");
break;
case 0100:
System.out.println("4");
break;

… (fill in other cases)


}
}
}

Use this link: https://www.electronics-tutorials.ws/binary/bin_3.html

There might be a better way, but without loops or methods this is all I got.
6 0
2 years ago
You are a network administrator at your company. A user attempts to start a computer and receives the following error message: "
katen-ka-za [31]

Answer:

bootrec/rebuildbcd

Explanation:

Several reason could have caused this, ranging from failed updates or installations to boot sector virsues etc

To fix this, you will need to restart the computer (Alt+Ctrl+Del) into recovery mode, Write the bootrec/rebuildbcd command and press enter or bootrec/fixboot.

If the task is successful, you will get a message "The operation completed successfully."

Then you are free restart your computer

5 0
3 years ago
The __is a financial aid program based on financial need that provides
Vaselesa [24]
Federal Work Stupid Program
8 0
3 years ago
What is alphuneric text not intended for calculation entered into a spreadsheet called?
Over [174]
It is called text or general.
7 0
3 years ago
Becca is working on a program that will store data. The program will need quick access to data and data persistence is not
STALIN [3.7K]

Answer:

in memory

Explanation:

A database refers to a collection of data that is organized and stored in a computer system.

Flash memory is a non-volatile memory chip that helps to transfer data from a personal computer (PC) to a digital device.

A flat file comprises a single table of data.

Becca is working on a program that will store data such that the program will need quick access to data and data persistence is not  important.

Therefore,

data should be stored in memory.

5 0
2 years ago
Other questions:
  • If involved in a boating accident causing serious bodily injury or death while boating under the influence, the operator has com
    15·1 answer
  • What is an instruction set architecture​
    7·2 answers
  • 10.7 LAB: Fat-burning heart rate Write a program that calculates an adult's fat-burning heart rate, which is 70% of 220 minus th
    8·1 answer
  • Consider sending a 2400-byte datagram into a link that has an mtu of 700 bytes. suppose the original datagram is stamped with th
    10·1 answer
  • What tasks do most operating systems perform?
    7·2 answers
  • When working in Photoshop with the move tool, you can select multiple layers and use this option to arrange them into a straight
    7·2 answers
  • Question 4 Multiple Choice Worth 5 points)
    6·1 answer
  • Do you have any sprites for Friday Night Funkin?
    14·1 answer
  • How does xm satellite deter nonsubscribers from listening to its transmissions? Does this make the radio programing a private go
    10·1 answer
  • Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ____.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!