1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PilotLPTM [1.2K]
3 years ago
10

What can you say about the following Java class definition?

Computers and Technology
1 answer:
IrinaK [193]3 years ago
3 0

Answer:

The class is called MyApp which inherits from JFrame and implements the ActionListener interface.

Explanation:

The class is called MyApp which extends the swing class JFrame and implements the ActionListener interface for event handling. As a results it needs to implement a method called actionPerformed for handling the relevant events that may be raised from the user interface. Since it extends JFrame, it has access to all the public and protected methods defined in JFrame(for example setTitle to set the title of the frame).

You might be interested in
Flowchart to reverse digits of an integer
makkiz [27]
The flowchart to reverse digits of an integer may be explained like this: <span>If its a decimal number you could use modulus function to return the first lowest digit in the integer like 45%10 would give you a 5. By doing that you will have the number reversed. Lets see an example of that
 Flow: (Lets take for example 123)
 num = 123
loop
print num%10 (prints 3)
num = num/10 (num now is 12 - integer division removes remainder)
 end loop
 result : 321</span>
4 0
3 years ago
In unix, the ________ permission allows the user to make changes.
mote1985 [20]
The write permission, specifically: -r--r--r-- changed to -rw-r--r--
6 0
4 years ago
What kind of information could reasonably be expected to cause serious damage
Eddi Din [679]

Answer:

it could be getting in a car crash

Explanation:

6 0
3 years ago
The ____ flow of information needed from the CSIRT to organizational and IT/InfoSec management is a critical communication requi
Basile [38]

Answer:c)upward

Explanation: Computer security incident response team (CSIRT) is the organization that is responsible for helping others regarding the security of computers incidents that take place.They coordinate with other people of organization for being responsive and controlling the damage.

IT/Infosec(Information security) is the security that manages it through various tools. It protects the network ,application software etc.

The flow of  CSIRT with  IT/Infosec works in the upward direction that is maintaining the contact/communication by collecting the information and then taking action on it. Thus the correct option is option(c) and other option don't provide the correct direction for working.

5 0
3 years ago
Lucy wants to develop a web page to display her profile. She wants to just start with a basic page that lists her accomplishment
gladu [14]

Answer:

1. Unordered list.

Explanation:

Web development is the creation of web pages. A web page can be a portfolio or personal website, an e-store etc. The web page comprises of a header, body and a footer component.

The header is the introduction of the web page, it holds the brand name, logo and other introductory elements.

The body is the main content of the web page. It uses other elements like the list to hold a group of data. There two types of list, they are ordered and unordered list. The ordered list are numbered while the unordered list are dotted not numbered.

Lucy would use the unordered list to outline are accomplishments and certification in details.

7 0
3 years ago
Other questions:
  • Create a class called Animal that accepts two numbers as inputs and assigns them respectively to two instance variables: arms an
    11·1 answer
  • The buses that connect peripheral (typically input and output) devices to the motherboard are often called expansion buses. ____
    5·1 answer
  • What is the circular motion that the earth makes in its orbit around the sun
    14·1 answer
  • What are some activities that work especially well in Outline view? Check all that apply.
    5·2 answers
  • Huffman trees use the _________ of each character to work out their encoding. A) Frequency B) Order in ASCll
    12·1 answer
  • What is a path and how do you know that it is filled and selected
    15·1 answer
  • What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network res
    9·1 answer
  • It's the same drop-down answers for both.
    15·1 answer
  • What is the objective of Accenture‘s e-stewards program
    5·1 answer
  • What is the output of this program? Assume the user enters 3, 6, and 11.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!