1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlabodo [156]
1 year ago
12

Which of the following declares an abstract method in an abstract Java class?

Computers and Technology
1 answer:
slava [35]1 year ago
8 0

The option that declares an abstract method in an abstract Java class is  option(B.) public abstract void method().

<h3>In Java, are abstract methods compatible with abstract classes?</h3>

Class and method abstraction is when Objects cannot be created using the abstract class, which is a restricted class. In addition to not having a body, an abstract method is only applicable to abstract classes. Subclasses provide the body.

Hence, consists of only the method definition and not any implementation. An Abstract Method is a method that doesn't have a body. A class that is abstract must declare it. Due to the need for the abstract class to implement each abstract method, the abstract method can never be considered final.

Learn more about abstract method from

brainly.com/question/15684705
#SPJ1

You might be interested in
What is number system?<br>​
MrMuchimi

Answer:

A numeral system is a writing system for expressing numbers; that is, a mathematical notation for representing numbers of a given set, using digits or other symbols in a consistent manner. The same sequence of symbols may represent different numbers in different numeral systems.

Explanation:

8 0
2 years ago
Why did scientists who study weather need more advanced technology? Check all that apply.
kobusy [5.1K]

Answer:

All options are correct.

Explanation:

All options apply to the question because they all need technology for development and improvement. Scientists needed to develop more technologies in order to attend all their necessities, such as anticipating weather changes, forecasting weather previously, predicting weather behaviour in different places and in one specific place, accounting for reasons and natural resources related to weather changes, and much more. Therefore, technology provides faster and more consistent data for all these informations needed, since all technology tools to study weather were developed according to their specific needs.

4 0
3 years ago
Read 2 more answers
A recursive method may call other methods, including calling itself. Creating a recursive method can be accomplished in two step
liq [111]

Answer:

Explanation:

The following code is written in Java. It creates the raiseToPower method that takes in two int parameters. It then uses recursion to calculate the value of the first parameter raised to the power of the second parameter. Three test cases have been provided in the main method of the program and the output can be seen in the attached image below.

class Brainly {

   public static void main(String[] args) {

       System.out.println("Base 5, Exponent 3: " + raiseToPower(5,3));

       System.out.println("Base 2, Exponent 7: " + raiseToPower(2,7));

       System.out.println("Base 5, Exponent 9: " + raiseToPower(5,9));

   }

   public static int raiseToPower(int base, int exponent) {

       if (exponent == 0) {

           return 1;

       } else if (exponent == 1) {

           return base;

       } else {

           return (base * raiseToPower(base, exponent-1));

       }

   }

 

}

4 0
2 years ago
What are the characteristics of the Outlook Rules Wizard? Check all that apply.
Marina CMI [18]

Answer:It is useful for staying organized.

Users can edit the rule description.

Users can move messages to folders.

It is divided into three template choices.

Explanation:

7 0
2 years ago
____ hack systems to conduct terrorist activities through network or Internet pathways
Advocard [28]

Answer:

Cyberterrorists

Explanation:

Cyberterrorists -

These are the people who illegally , without any authentication , are able access some other person's personal system or internet server , are referred to as cyber terrorists.  

Internet service is used in this process , which can lead to loss of life , harm , threat or some illegal practice.  

Hence, from the statement of the question,  

The correct term is cyberterrorists.

6 0
3 years ago
Other questions:
  • If you are planning to carry a large balance on your credit card, which of the following credit card features should you look fo
    7·2 answers
  • A friend has a CD of one of your favorite artists and has offered to let you copy it.
    13·1 answer
  • Your task in this assignment is to exploit the race condition vulnerability in the above set-uid program. more specifically, you
    14·1 answer
  • Citing the recent increase in earnings by several computer companies, economists feel that a cycle has begun in which personal c
    13·1 answer
  • The Coins class was created to hold all your loose change, kind of like a piggy bank! For this exercise, you are going to simula
    15·1 answer
  • Adobe reader is a type of​
    14·2 answers
  • ساعدوني على الإجابة على هذه الأسئلة
    11·1 answer
  • Every finger has a key it should be resting on when you are not typing<br> 1. False<br> 2. True
    12·2 answers
  • 2. How much did John Jones have in his account on the first day of the
    5·1 answer
  • Write a sub-program to display the acceleration of car. The program should ask initial velocity, final velocity, and time taken
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!