1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fiasKO [112]
4 years ago
15

Public class Car {

Computers and Technology
1 answer:
juin [17]4 years ago
5 0

Answer:

The Following are the outputs:

a. vroom

b. car 1

c. car 2

d. vroom

e. truck 1

f. car 2

Explanation:

The first statement System.out.println(mycar);  prints an instance of the Car object my car which calls the toString() method.

The second statement mycar.m1();  Calls the method m1() which prints car1

The third statement mycar.m2(); calls the method m2() which prints car2

Then another class is created Truck, and Truck inherits all the methods of Car since it extends Car. Truck has a method m1() which will override the inherited method m1() from the Car class.

The fourth statement System.out.println(mytruck); will print print vroom just as the first statement since it inherits that method toString()

The fifth statement calls m1() in the Truck class hence prints Truck 1

Finally the sixth statement will print car 2 because it also inherited that method and didnt overide it.

You might be interested in
1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
puteri [66]

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

6 0
3 years ago
Since the 1970s, local tv newscasts have developed a similar look. that's because
professor190 [17]
<span>(news doctors, consultants) said people should be young, attractive, smile and look happy.</span>
6 0
4 years ago
What is the full form of ICT?​
dalvyx [7]
Information and communications technology
3 0
3 years ago
Read 2 more answers
Select the online reading comprehension tool that best fits the description. This tool lets users change text from one language
Dmitrij [34]

Answer:

This tool lets users change text from one language to another.

translation tool

This tool helps users find definitions for difficult vocabulary.

online dictionary

This tool allows users to listen to passages of text that they select.

text-to-speech tool

This tool helps users memorize vocabulary by giving them representations of words using pictures.

flash cards

Explanation:

just did the assignment on edg 2020

7 0
3 years ago
Read 2 more answers
Which of the following is one of the first steps in implementing a comprehensive security program? Setting up a Guest account Cr
yKpoI14uk [10]

Answer:

Setting a strong password policy

Explanation:

In implementing a comprehensive security program, one of the first steps would be to set up a strong password policy.

It is important to understand what the company is trying to protect from third parties.

Setting up a password policy is going to increase the security of the system through the use of strong passwords.

5 0
3 years ago
Other questions:
  • What is a tag in an HTML document?
    5·1 answer
  • A formal log-on procedure is the operating system’s last line of defense against unauthorized access.
    10·1 answer
  • Which domain suffixes do businesses that sell products and services commonly use?
    9·2 answers
  • It is perhaps not surprising that Etsy was an early adopter of DevOps. It is a relatively small company, with a start-up culture
    7·1 answer
  • To celebrate me reaching expert in the same day i made the account im doing a point giveaway
    12·2 answers
  • Which model represents any process in general?
    6·1 answer
  • To cope with the uncertainty about how their pages will be viewed, many web page designers opt to use _________ units, which are
    13·1 answer
  • Chelsea is writing a paper about the value of running every day. She wrote this thesis statement:
    10·1 answer
  • Will creates an entry in his calendar and marks it as an all-day instance. Which item has he created?
    10·1 answer
  • Some operating systems add the command interpreter to the kernel .what will be the justification for this design principle?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!