1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodka [1.7K]
3 years ago
9

Suppose a developer gets class XYZ files and documentation from a subcontractor. This class does not implement the Comparable in

terface. What must be true in order for the developer to sort an array of XYZ objects without modifying the xyz class?a. The developer must supply a comparator object belonging to a class that implements the Comparator interface.b. XYZ objects must be randomly distributed.c. The XYZ class must implement the Sortable interface.d. XYZ objects must be ordered.
Computers and Technology
1 answer:
NNADVOKAT [17]3 years ago
6 0

Answer:

A) The developer must supply a comparator object belonging to a class that implements the Comparator interface

Explanation:

The comparator interface handles the ordering (sorting) of user-defined classes, it does this by comparing two different objects from different classes. The comparator interface works by accepting a method which extracts a key for sorting of a type say N, and returns a comparator that compares to N, it therefore compares the object (current one) with the specified one

You might be interested in
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings eith
photoshop1234 [79]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol refers to a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway.

II. IP address.

III. Subnet mask.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
How far is florida from oklahoma?
leonid [27]
Florida is 1,344.8 miles from oklahoma
7 0
3 years ago
Read 2 more answers
Why is successful pattern recognition important for computer programmers?
NISA [10]
Pattern recognition is a branch of machine learning that focuses on the recognition of patterns and regularities in data, although it is in some cases considered to be nearly synonymous with machine learning.
7 0
3 years ago
Several steps are involved in creating a presentation. What is the last step in the process before preparing to present it?
kupik [55]
The answer to this is B.
8 0
3 years ago
Read 2 more answers
When was JavaScript founded?<br> Write in this format:<br> mm/yy
liq [111]

Answer:

It was founded in 09/95

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which information technology job has the lowest predicted 10-year growth? computer programmer software developer computer suppor
    13·1 answer
  • Rachel uses a word processor to write short stories. However, most of her time is spent toying with the keys, rather than in wri
    13·2 answers
  • 4. The same data source can be used multiple times in creating mail-merge documents.
    7·1 answer
  • Are the buying and selling of stocks centralized activities? Why or why not?
    10·2 answers
  • An application programming interface (API) is ________. Select one: A. the code to interface between an application and RAM B. t
    15·1 answer
  • What have been three technological changes to photography in the past 200 years?
    10·1 answer
  • A pedometer treats walking 2,000 steps as walking 1 mile. Write a program whose input is the number of steps, and whose output i
    14·1 answer
  • Uploading Your Work
    14·1 answer
  • Write any one method to delete a table in writer​
    11·1 answer
  • How many micro processors will a small computer have? A. none B. two C. one D. three
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!