1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodka [1.7K]
3 years ago
9

Suppose a developer gets class XYZ files and documentation from a subcontractor. This class does not implement the Comparable in

terface. What must be true in order for the developer to sort an array of XYZ objects without modifying the xyz class?a. The developer must supply a comparator object belonging to a class that implements the Comparator interface.b. XYZ objects must be randomly distributed.c. The XYZ class must implement the Sortable interface.d. XYZ objects must be ordered.
Computers and Technology
1 answer:
NNADVOKAT [17]3 years ago
6 0

Answer:

A) The developer must supply a comparator object belonging to a class that implements the Comparator interface

Explanation:

The comparator interface handles the ordering (sorting) of user-defined classes, it does this by comparing two different objects from different classes. The comparator interface works by accepting a method which extracts a key for sorting of a type say N, and returns a comparator that compares to N, it therefore compares the object (current one) with the specified one

You might be interested in
Why do we say that IP provides ""best-effort"" service?
Klio2033 [76]

Answer:

 The IP (Internet protocol) provide the "Best efforts service" as it mainly providing the packet delivering service in the networking system for communication.

The IP plays an important role in the communication as it helps the data or information breaks into small packets so that it can efficiently deliver the message to its destination.

The IP is known as best effort service as it delver the data or message to their particular destination with efficiently but it does not provide any type of special service for re-transmitting the lost packet in the network.  

 

4 0
3 years ago
Which original VPN protocol is supported by most platforms but offers low levels of security?
Masja [62]

Answer:

vpn

Explanation:

PPTP is the least secure. ...

L2TP/IPsec is a good VPN solution for non-critical use; however, this protocol, like PPTP, has been compromised as well. ...

Across many areas of the IT world, OpenVPN is easily the best all-around VPN solution.

7 0
2 years ago
One purpose of fairy tales is to help children master the problems associated with growing up. Please select the best answer fro
-Dominant- [34]

Answer:

The answer is TRUE

Explanation:

7 0
3 years ago
Read 2 more answers
The information of an management information system comes from?
Debora [2.8K]

A management information system is a computer system consisting of hardware and software that serves as the backbone of an organization's operations

5 0
2 years ago
Write c++ code that prints: usernum ... 2 1 blastoff! your code should contain a for loop. print a newline after each number and
nata0808 [166]
#include <iostream>
int main() { int usernum = 3;
for(int i = usernum; i >= 1; i--) { std::cout << i << "\n"; } std::cout << "blastoff!\n";
return 0;}
Works fine my dude:
./randombrainly 321blastoff!
3 0
4 years ago
Other questions:
  • Microsoft ____ is the new web browser.
    13·2 answers
  • What keyboard shortcut keys selects cell A1
    12·1 answer
  • How do i set up a RAID 1 array?​
    6·1 answer
  • Please I need help with this !!!! <br> Complete the table given below.
    8·1 answer
  • You use ddl to create, modify, and delete the ___________________________ of a database.
    6·1 answer
  • Suppose users share a 1 Mbps link. Also suppose each user
    10·1 answer
  • What is the most likely reason that a digital artist would use a program such as Autodesk Maya or Max to create 3-D images for a
    12·1 answer
  • Name the box where the name of the first cell of the selected range appears?
    7·1 answer
  • When a file is used by a program, there are three steps that must be taken:
    7·1 answer
  • In the context of in-house software development options, a firm that enhances a commercial package by adding custom features and
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!