1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svp [43]
3 years ago
10

What are the field/method access levels (specifiers) and class access levels ?

Computers and Technology
1 answer:
melomori [17]3 years ago
6 0

Answer:

There are 5 access specifiers totally in C#

Explanation:

In C# there are 5 different access specifiers.

1. Private

2. Protected

3. Internal

4. Protected Internal

5. Public

Fields or methods can have all the access modifiers, where as classes can have only 2 (internal, public) of the 5 access specifiers.

I have  explained the usage of each access modifier below.

Private :

Private members are available only with in the containing type.

Public :

Public members are available any where. There is no restriction.

Internal: Internal members are available anywhere in the containing assembly.

Protected:

Protected Members are available, with in the containing type and to the types that derive from the containing type.

Protected Internal :

These are available anywhere within containing assembly and  from within a derived class  in any another assembly.

You might be interested in
What computing platform was designed to help a beginner create interactive objects that receive input from sensors and use that
Arturiano [62]
The answer is <span>Arduino.  It is the </span>computing platform which was designed to help a beginner create interactive objects that receive input from sensors and use that input to control lights, motors, and other physical objects.  It<span> can be used to develop stand-alone interactive objects or can be connected to software on your computer.</span>
3 0
4 years ago
These operating systems were referred to as command-based. A.Android and MS-DOS B.iOS and Windows C.LINUX and UNIX D.MS-DOS and
jolli1 [7]

Answer:

D.MS-DOS and UNIX

Explanation:

The oldest versions of Windows Operating Systems used MS-DOS. MS-DOS was purely command-line based OS. MS-DOS did not have GUI and users were required to learn command lines to help them navigate through, open, and manipulate files. MS-DOS is no longer used. UNIX was also a command-line based operating system when it was initially built in the 1960s. It still is but it supports both GUI and CLI. Unix, in my opinion, is hands down the best and most powerful CLI based OS to have ever been built.

5 0
3 years ago
Read 2 more answers
Let's say you are a UX researcher working on the design of a major social media application, let's call it QuickTalk. QuickTalk
ELEN [110]

UX design has five stages and they are:

  • empathize,
  • define,
  • ideate,
  • prototype,  
  • test

<h3>What is UX design?</h3>

This refers to the design process that aims to make a program that gives its users a great experience.

Hence, we can see that your question is incomplete so I gave you a general overview to help you get a better understanding of the concept.

Read more about UX design here:

brainly.com/question/13186084

#SPJ1

6 0
2 years ago
List the three control problems associated with competingprocesses and briefly define each.
hjlf

Answer and explanation :

the three control problems associated with competing process are

  • MUTUAL EXCLUSION : We know that some resources are shareable and some are not shareable. which means only one process can access the resource at a time this type of resources are called critical resources this code can be access at only one process at a time. the other process if required to access should not be allowed
  • DEADLOCK: this hold the process without complete for example suppose there are two resources R1 and R2 and two process P1 and P2 and P1 use R1 and P2 use R2 but after some time when P1 needs R2 but R2 is not available as it is used by P2 so the all process will be on hold
  • STARVATION : when priorities are given to the process as high priorities and low priorities. And high priorities process always competing  then low priorities process have to wait for very long time this is called starvation
3 0
3 years ago
Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA Soccer on his Xbox, and her dad
Sati [7]

Answer:

P2P network is the correct answer to the following question.

Explanation:

Because the P2P network is the network that is used to share the resources of the computer system. It also allows the users to link two or more than two computer systems and also allows them to share all kinds of resources of the system. So, that's why Bethany and her family members used the P2P network type.

4 0
3 years ago
Other questions:
  • The last three I need help with. Do they use technology or engineering ?
    7·2 answers
  • Stella likes using social networking websites. Which Netiquette practice should Stella follow?
    9·2 answers
  • Which of these statements most accurately describes cookies?They have the capability to execute malicious software.Each cookie f
    12·1 answer
  • Which picture should i put as my profile picture.
    15·2 answers
  • Who tryna play fortnite?
    5·2 answers
  • Queues can be represented using linear arrays and have the variable REAR that point to the position from where insertions can be
    12·1 answer
  • How do I give Brainliest?? I'll give brainliest...
    13·2 answers
  • Why would you choose a mobile device over a laptop? 1-2 sentences.
    11·1 answer
  • This feature allows you to adjust your view to see the lower and upper part of a document
    15·2 answers
  • "kannst du mir bitte helfen" in German-English from Reverso Context: Hier, kannst du mir bitte helfen?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!