1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notsponge [240]
2 years ago
13

The keyword __________ is required to declare a class.

Computers and Technology
1 answer:
Papessa [141]2 years ago
4 0
Answer is b-private
You might be interested in
What is the output of the following program?
Contact [7]

The question is poorly formatted:

<em>#include <stdio.h> </em>

<em>int main() { </em>

<em>int arr [5] = {1, 2, 3, 4, 5}; </em>

<em>arr [1] = 0; </em>

<em>arr [3] = 0; </em>

<em>for (int i = 0;i < 5; i+=1) </em>

<em>printf("%d", arr[i]); </em>

<em>return 0; </em>

<em>}</em>

Answer:

The output is 10305

Explanation:

I'll start my explanation from the third line

This line declares and initializes integer array arr of 5 integer values

<em>int arr [5] = {1, 2, 3, 4, 5}; </em>

<em />

This line sets the value of arr[1] to 0

<em>arr [1] = 0; </em>

<em>At this point, the content of the array becomes arr [5] = {1, 0, 3, 4, 5};</em>

This line sets the value of arr[3] to 0

<em>arr [3] = 0; </em>

<em>At this point, the content of the array becomes arr [5] = {1, 0, 3, 0, 5};</em>

<em />

The next two lines is an iteration;

The first line of the iteration iterates the value of i order from 0 to 4

<em>for (int i = 0;i < 5; i+=1) </em>

<em />

This line prints all elements of array arr from arr[0] to arr[4]

<em>printf("%d", arr[i]); </em>

<em />

<em>So, the output will be 10305</em>

3 0
3 years ago
What is the name given to the software testing technique, which basically consists of finding implementation bugs using malforme
cupoosta [38]

Answer:

Fuzz testing

Explanation:

Fuzz testing technique was developed by Professor Barton Miller and his students in the year 1989 at the University of Wisconsin Madison. This Fuzz testing technique is used in finding implementation bugs using malformed/semi-malformed data injection in an automated fashion.

6 0
4 years ago
Read 2 more answers
Ron is creating building blocks in Word. How can he make the building blocks that he created available?
ivann1987 [24]

Answer:

you can store those building blocks in the Normal template

Explanation:

Building Blocks are different pieces of content such as tables, lists, headers, and text boxes that can be added and used for your word document. In order to make these available, you can store those building blocks in the Normal template. This will allow you to instantly and repeatedly access them for various different projects that you may be working on.

8 0
3 years ago
Read 2 more answers
it has been said that television has little real educational value. what is your opinion on this issue?
damaskus [11]
It does, it has a lot of resources that we can take advantage of. It depends on how you use it
3 0
3 years ago
Routing and remote access services allow users to connect to private networks using or:.
Luda [366]

Answer:

Users can connect to a remote access server through a dial-up connection or a virtual private network (VPN) connection.

Explanation:

A dial-up connection requires both the server and the client computer to have a correctly configured modem. The client and the server connect over analog public telephone networks. To enhance the security of a dial-up connection, use data encryption, Windows logon and domain security, remote access policies and callback security.

8 0
2 years ago
Other questions:
  • The company involved in an attack by Oleg Zezev from Kazahkstan, in which Zezev accessed computer data and copied personal infor
    12·1 answer
  • When a packet with the code is transmitted, it is received and processed by every machine on the network. this mode of operation
    12·1 answer
  • Which of the following is an example of a word processing program?
    11·2 answers
  • Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k ti
    8·1 answer
  • In mathematics, the notation n! represents the factorial of the nonnegative integer n. The factorial of n is the product of all
    7·1 answer
  • How does the author of let bindi have the limelight persuade readers to consider the importance of wildlife conservation
    9·2 answers
  • Question 11
    9·1 answer
  • Describe an example of a very poorly implemented database that you've encountered (or read about) that illustrates the potential
    12·1 answer
  • I have crummy WiFi and a bad pc. If I get a gaming computer, will it improve my FPS or ping?
    14·2 answers
  • Question 1 of 10 Which type of information systems personnel are involved in organizing information so that users can access it
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!