1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinvika [58]
3 years ago
8

What is the serializable interface and what makes an object serializable?

Computers and Technology
1 answer:
Varvara68 [4.7K]3 years ago
5 0

Answer: Serializable interface is the interface that acts as the maker persisting without any specific method and members in Java. The maker has the objective of identification of class for serialization method. This helps in the conversion of the object value in the byte form.

Object is serialized by converting the state into byte version and thus can be returned to object copy . The java.io.Serializable interface is the requirement for the conversion of any object of particular class or superclass. This technique is followed for making the data flow on the network efficient and easy.

You might be interested in
Write multiple if statements. if caryear is 1969 or earlier, print "probably has few safety features." if 1970 or higher, print
aliina [53]
If( caryear >= 2000 ):
    print "probably has air bags.\n"
elif( caryear >= 1990 ):
    print "probably has anti-lock brakes.\n"
elif( caryear >= 1970 ):
    print "probably has seat belts.\n"
else:
    print "probably has few safety features.\n"

4 0
2 years ago
I need a computer science help.....and I rlly want it right now...this the question
muminat
Define, en tus propias palabras, lo que son los sistemas de información.
6 0
3 years ago
In what form do the hexadecimal numbers need to be converted for a computer’s digital circuit to process them?
MrMuchimi

Hexadecimal numbers are just a convenient representation of binary data. When entered as text, they consist of ASCII characters 0-9 and a-f. The numbers will then have to be converted to binary. This is accomplished by converting to uppercase, subtracting the ASCII offset (48 for 0-9 or 55 for A-F), so that the result is a number between 0 and 15 (inclusive). This can be stored in computer memory to represent 4 bits.

Hexadecimal numbers represent binary numbers in the following way:

hex | binary

0 = 0000

1 = 0001

2 = 0010

3 = 0011

4 = 0100

5 = 0101

6 = 0110

7 = 0111

8 = 1000

9 = 1001

a = 1010

b = 1011

c = 1100

d = 1101

e = 1110

f = 1111

As you can see, no other 4 bit combination exists.



5 0
3 years ago
Brad Smith works for GHI Firm. GHI firm is a registered Broker-Dealer in State A, B and C and a registered IA in State A. Brad i
Rashid [163]

Answer:

The correct answer is B. This is unacceptable because Brad is not registered in State B

Explanation:

Given:

Brad is a registered Investment Advisory Representative (IAR) in State A.

In the question, it's not stated that Brad is not registered in State B.

Setting up an office in State B is unacceptable because Brad is holding himself out as an IAR in State B and he is not registered as an IAR in State B.

Though GHI is a registered firm in State B, Brad also needs to be registered before setting up an office in other states.

8 0
3 years ago
Kendra needs to configure a visual alert for an appointment that she is creating for next week. What should she configure?
sergiy2304 [10]
Reminder
To alert her
4 0
3 years ago
Other questions:
  • What is the resistance of a 1,000-foot length of #6 AWG wire at a temperature of 25 degrees C? A. 0.1593 ohm B. 0.4028 ohm C. 0.
    7·1 answer
  • Which are malicious codes? <br><br> JavaScript <br> Key loggers <br> Scrum <br> Spyware <br> Worms
    12·1 answer
  • In 1-2 sentences describe how to use the thesaurus in the Word Processor
    11·2 answers
  • We will pass in a value N. Write a program that outputs the complete Fibonacci sequence for N iterations. Important: If N is 0,
    13·1 answer
  • If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo
    11·2 answers
  • If you can name this you get 15 points: ↑↑↓↓←→←→βα
    10·1 answer
  • Which of the following defines a computer program?
    14·1 answer
  • Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyram
    6·2 answers
  • 1. Fill in the blanks with appropriate word. 5°1-5 is a collection of raw unprocessed facts, figures, and symbols ​
    12·1 answer
  • 2 differences between system and applications software​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!