1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RUDIKE [14]
2 years ago
14

declaring a member as in the base class provides access to that member in the derived classes but not to anyone else.

Computers and Technology
1 answer:
lozanna [386]2 years ago
5 0

The act of declaring a member public as in the base class provides access to that member in the derived classes but not to anyone else.

<h3>What are derived classes?</h3>

A derived class is said to be a kind of a class made or derived from another existing class.

Note that the existing class from which the said thing or derived class is made is via the act of inheritance that is known as a base class or superclass

Learn more about derived classes from

brainly.com/question/27791611

#SPJ4

See full question below

25. Declaring a member as ____ in the base class provides access to that member in the derived classes but not to anyone else.

private

constant

public

protected

You might be interested in
Como se diz saia em inglês​
Montano1993 [528]

Answer:

I believe the translation would be "get out", but I'm not sure.

Explanation:

4 0
3 years ago
Read 2 more answers
Recursive definitions for subsets of binary strings. About Give a recursive definition for each subset of the binary strings. A
Masteriza [31]

Answer:

this program was written in JAVA

Explanation:

import java.util.Scanner;

public class RecursivePalindromeJava

{

public static boolean checkPalindrome(String str)

{

if(str.length() == 0 || str.length() == 1)

return true;

if(str.charAt(0) == str.charAt(str.length() - 1))

return checkPalindrome(str.substring(1, str.length() - 1));

return false;

}

public static void main(String[]args)

{

Scanner sc = new Scanner(System.in);

System.out.println("Please enter a string : ");

String strInput = sc.nextLine();

if(checkPalindrome(strInput))

{

System.out.println(strInput + " is palindrome");

}

else

{

System.out.println(strInput + " not a palindrome");

}

sc.close();

)

)

8 0
3 years ago
Which set of technologies that support knowledge management is characterized by mashups, blogs, social networks, and wikis? a. X
Neporo4naja [7]

Answer: c) Web 2.0

Explanation:

Web 2.0 is the technology that consist applications and websites for the people to interact and sharing information, activities, event and other materials through social media components like blog, social networking sites,wikis, podcast etc.

  • Other options are incorrect because artificial intelligence, ERP(Enterprise resource planning) and XML(Extensible Markup Language) are not the tools that is used by users for interaction and communicating with the help of social media components.
  • Thus, the correct option is option(c).
3 0
3 years ago
The process of learning by making mistakes and by trial and error is called _____.
vodomira [7]
I believe it’s problem solving.
6 0
3 years ago
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
Brilliant_brown [7]

Answer:

True.

Explanation:

An investigator would like to do an internet-based college student survey to gather data regarding their behavior as well as drug use. Even so, specific identifications are still not gathered and IP addresses might be available in the set of data. Damage threat must be assessed both by the magnitude (or severity) and the likelihood (or likelihood) of the hurt.

7 0
4 years ago
Other questions:
  • Analytical processing uses multi-levelaggregates, instead of record level access.? True? False
    12·1 answer
  • Which one of the following statements referring to mobile Internet
    5·2 answers
  • What is the meaning of the title Two Kinds Of Stupid whose fault is it that Eduardo got in trouble
    8·1 answer
  • What year did Elvis die? Right answer 1977.
    14·1 answer
  • WAP to print given series by using sub procedure 2,3,5,8,13,...........,20th term.​
    6·1 answer
  • What are the best ways to conduct research for a presentation? Check all that apply.
    7·2 answers
  • Hardware failure, power outages, and DOS attacks will affect:
    8·1 answer
  • Your ISP connects to the core routers of the Internet via a O backbone O satellite O cable mode Ospine​
    9·1 answer
  • 2.13.4 Colorful Caterpillarhel ????
    15·1 answer
  • Why key logger are essential for computer system
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!