1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina86 [1]
3 years ago
11

A base class named Garden contains a private field width and a property public int Width that contains get and set accessors. A

child class named VegetableGarden 359360does not contain aWidth property. When you write a class in which you declare an object as follows, what statement can you use to access the VegetableGarden's width?VegetableGarden myGarden = new VegetableGarden();
a. myGarden.Width

b. myGarden.base.Width

c. VegetableGarden.Width

d. You cannot use Width with a VegetableGarden object.
Computers and Technology
1 answer:
goblinko [34]3 years ago
4 0

Answer:

a. myGarden.Width

Explanation:

Given: A base class named Garden contains a private field width and a property public int Width that contains get and set accessors. A child class named VegetableGarden does not contain a Width property. So the structure is as follows:

class Garden{

      private int width;

      public int Width;

}

class VegetableGarden extends Garden{

}

In the client class, we create an instance of VegetableGarden as follows:

VegetableGarden myGarden = new VegetableGarden();

From this instance the Width field can be accessed using the following mechanism:

myGarden.Width

You might be interested in
Most hand sewing begins and ends with
Burka [1]
I would say it has to be b but its what the correct answer is its up to you!

I hoped this helped you out!

Have a nice day!

4 0
3 years ago
A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
Lynna [10]

Answer:

vulnerability, risk

Explanation:

A vulnerability would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a risk is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.

6 0
3 years ago
Of what is famous Ted Nelson?​
dsp73

Answer:

Nelson proposed a system where copying and linking any text excerpt, image or form was possible.

Explanation:

Ted Nelson is one of the theoretical pioneers of the world wide web who is best known for inventing the concept of hypertext and hypermedia in the 1960s. As one of the early theorists on how a networked world would work.

How I know:

I goggle it.

8 0
2 years ago
In addition to MLA, what are some other widely used style guides? Check all that apply.
STALIN [3.7K]

Answer:

In addition to MLA, <u>American psychological association, Associated Press and Chicago manual of style</u> are widely using referencing techniques,

Explanation:

<u>American Psychological Association(APA)</u>

APA is the largest organization of scholars, they have their own referencing style guidelines that is used by these scholars.

<u>Associated Press</u>

It is also an american based agency that have their own referencing style for citation of research work named as Associated press.

<u>Chicago Manual of Style</u>

It is also an american referencing style used for reference.

8 0
3 years ago
What is meant by algorithm?​
ExtremeBDS [4]

Answer:

a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

Explanation:

7 0
3 years ago
Other questions:
  • It is a good idea to use more than one typeface in a document when _____.
    8·2 answers
  • WHAT SHOULD YOU DO IF AN ONCOMING CAR AT NIGHT APPROACHES WITH ITS HIGH-BEAMS ON?
    6·1 answer
  • You are provisioning a server with eight-core 3 GHz CMP that can execute a workload with an overall CPI of 2.0 (assuming that L2
    5·1 answer
  • Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month and an in
    6·1 answer
  • Discuss what they need to consider if they wish to use their devices when they are away from home?
    6·1 answer
  • How many generations of computer languages have there been since the middle of the 20th century?
    10·1 answer
  • When using a function to preform a calculation how would you select the range of numbers to use
    13·1 answer
  • This is the thing that I don't understand why did they banned private chat like there are long-distance relationships, and frien
    13·2 answers
  • Which of the selections below represents a recursive query?
    12·1 answer
  • Pls help I will give points
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!