1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveta [45]
3 years ago
8

Suppose that the class Mystery is derived from the class Secret. Consider the following statements.

Computers and Technology
1 answer:
Agata [3.3K]3 years ago
8 0

Answer:

The answer to the following question is the option "(ii)".

Explanation:

In the java code firstly we create the derived class (Secret) object and reference variable that is mySecret and secRef. Then we create a base class (Mystery) object and reference variable that is myMystery and mysRef. In the derived class reference variable that holds the base class object. So the legal statement in java is "mysRef = (Mystery) secRef". In this code, the reference variable of the base class holds the value of the base class object and derived class reference variable.

You might be interested in
1. Which of the following is not true about high-level programming language s? (a) Easy to read and write (b) Popular among prog
vazorg [7]

Answer:

1: c

2: c

Explanation:

The higher-level the language, the more it resembles human language.

In Python, the print() statement outputs text.

6 0
3 years ago
The groups_per_user function receives a dictionary, which contains group names with the list of users. Users can belong to multi
Akimi4 [234]

The groups_per_user function receives a dictionary, which contains group names with the list of users.

Explanation:

The blanks to return a dictionary with the users as keys and a list of their groups as values is shown below :

def groups_per_user(group_dictionary):

   user_groups = {}

   # Go through group_dictionary

   for group,users in group_dictionary.items():

       # Now go through the users in the group

       for user in users:

       # Now add the group to the the list of

         # groups for this user, creating the entry

         # in the dictionary if necessary

         user_groups[user] = user_groups.get(user,[]) + [group]

   return(user_groups)

print(groups_per_user({"local": ["admin", "userA"],

       "public":  ["admin", "userB"],

       "administrator": ["admin"] }))

3 0
3 years ago
Elizabeth works for a local restaurant at the end of her shift she read she’s required to write in the time that she arrived in
gavmur [86]
B - because you should always be honest when it comes to working your hours and getting paid the right amount.
5 0
3 years ago
I need help with this plz question 2 and 3 asap
Lena [83]

I an not sure what you want me to do so I am going to help you on both of these problems:

Question 2 answer: I think the answer is University/industry interaction

Question #3 answer: I think the answer for this is clearly written in the question (i think that the second answer choice is it)

I am not sure what this is but i am only in the 10th grade!!!! the only class that I took last year was Computer Fundumentals

Btw I am in K12 as well :)

4 0
4 years ago
eocs can be fixed locations, temporary facilities, or virtual structures with staff participating remotely.
levacccp [35]

EOCS can be fixed locations, temporary facilities, or virtual structures with staff participating remotely is a true statement.

<h3>What is the Emergency Operations Centers (EOC)?</h3>

Emergency Operations Centers is known to be part of the four NIMS Command and Coordination structures as the EOCs are known to be used  in an off site locations where staff are gotten from a lot of agencies that come together to address some imminent kind of threats and hazards.

Therefore saying that EOCS can be fixed locations, temporary facilities, or virtual structures with staff participating remotely is a true statement.

Learn more about EOCS from

brainly.com/question/10794095

#SPJ1

5 0
2 years ago
Other questions:
  • Select three examples of cryptographs. Security tokens Shared-key Malware Firewalls Message authentication code Public-key
    7·2 answers
  • What are the two different frequencies WiFi operates on?
    9·2 answers
  • In the year of our Lord 66, the Emperor Nero, being at that time in the twenty-ninth year of his life and the thirteenth of his
    10·1 answer
  • Shakespeare’s complete works have approximately 3.5 million characters. Which is bigger in file size: Shakespeare’s complete wor
    5·2 answers
  • can An intelligent workplace uses technology to allow workers to be productive whether they are in the office or working from ho
    12·1 answer
  • Jim is writing a program to calculate the wages of workers in a teddy bear factory.
    7·1 answer
  • I need to know thr full number of pie
    8·1 answer
  • Demographics refers to
    7·1 answer
  • The term integration mean?
    7·2 answers
  • A location in memory which stores a value, the value can change as the program is running is
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!