1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olasank [31]
3 years ago
11

Consider the following class definitions. public class BClass { private int x; public void set(int a) { x = a; } public void pri

nt(){ } } public class DClass extends BClass { private int y; public void set(int a, int b) { //Postcondition: x = a; y = b; } public void print(){ } } Which of the following is the correct definition of the method set of the class DClass? (i) public void set(int a, int b) { super.set(a); y = b; } (ii) public void set(int a, int b) { x = a; y = b; }
Computers and Technology
1 answer:
Stella [2.4K]3 years ago
7 0

Answer:

The answer to the given question is the option "(i)".

Explanation:

In this question, the correct option is the "(i)" because In this method definition we use the super keyword. It refers to the parent's class. In this method, we use the superclass to call the above (parent) class method. and if we choose the option (ii), It will not call the parent class. That's why we use the option (i) which is correct.

You might be interested in
Which of the following is non-volatile storage?
gulaghasi [49]
Primary because it is non-volatile storage
6 0
3 years ago
if a hacker wants to exploit the TCP three-way handshake, what is the most effective way to go about it?
goldfiish [28.3K]

The most effective way to exploit TCP three-way handshake is TCP SYN flood.

  • SYN flood attack is simply a kind of computer attack that begins with 3-way TCP handshake.
  • TCP SYN flood is also called SYN flood and it is a type of distributed Denial of Service (DDoS) attack that uses every part of the normal TCP three-way handshake to eat up resources on the known server and render it non-functional
  • With TCP SYN flood, a hacker can eat up resources of target's computer and makes it unresponsive.

From the above, we can therefore say that the most effective way to exploit TCP three-way handshake is TCP SYN flood.

Learn more from:

brainly.com/question/14739766

7 0
2 years ago
You give an object a more meaningful name by setting the object’s _________________ property.
viva [34]

Answer:

The correct answer to this question is "Name".

Explanation:

In the programming language, the object is a part of the object-oriented programming language (oops).In all (oops) programming language we use class and object. where class is a collection of data member and member function, and object is a real-world entity. An Object is an instance of a Class. When a class is created, no memory is assigned but when we create the object of the class then memory is allocated.

In this question except option (d), all options are wrong.

7 0
3 years ago
Which binary number is the greatest?<br> 11011<br> 11001<br> 11100<br> 11010<br> 11000
Masteriza [31]

Answer:

the third one

Explanation:

the rest is below 28 apart from the third one which is 28 and is the most

3 0
3 years ago
Identify a syntax used to create a spinner control using an input element. a. b. c. d.
Lorico [155]

Answer:

Option A:

<input name="name" id="id" type="number" value="value" step="value" min="value" max="value" />

Explanation:

Spinner control is a graphical control element where user can adjust the value by pressing up or down arrow button. An example is given in the attached image.

In HTML, one of the key attributes we must use to create a spinner control is "step". The attribute "step" is required to specify the interval of the step value when user press the up or down arrow button.

If we set the attribute values as follows:

  • type = "number"
  • value = 2
  • min = 0
  • max = 10

The setting above will give a spinner control with a range of legal numbers between 0, 2, 4, 6, 8 and 10.

6 0
3 years ago
Other questions:
  • Is frequency measured in henry.
    14·1 answer
  • Technician A says that in any circuit, electrical current takes the path of least resistance. Technician B says that while this
    11·2 answers
  • How many mustangs are built every day
    13·2 answers
  • Technology has proliferated in Kenya and Somaliland, with text messages used to replace cash, creating mobile money use that, on
    11·1 answer
  • In addition to using comments and track changes, you can also use the comparison feature for reviewing documents. In this activi
    11·1 answer
  • Consider the problem of solving two 8-puzzles.
    10·1 answer
  • WILL GIVE BRAINLIEST! 20 POINTS! PLZ HELP!
    14·2 answers
  • Discuss the term internal control​
    12·1 answer
  • Your friend Cameron’s little sister is visually impaired. Cameron is worried that his sister will not be able to use technology
    12·1 answer
  • Identify and explain five areas where computers are used to process <br> data
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!