1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Montano1993 [528]
4 years ago
14

What modifier should you use on a class so that a class in the same package can access it but a class (including a subclass) in

a different package cannot access it?A. publicB. privateC. protectedD. Use the default modifier.
Computers and Technology
1 answer:
7nadin3 [17]4 years ago
4 0

Answer:

Option (B) is the correct answer of this question.

Explanation:

In the Private access modifier we can access the property and field within the package or class we cannot accessing the member outside the class .

  • We use private keyword for declaring the private access modifier.
  • In the public access modifier we accessing the property outside the class so it's a incorrect option .
  • In the protected access modifier we access the property of class package and subpackage both so it's a incorrect option.
  • The default modifier is incorrect it not follow the given scenario so it's incorrect.
You might be interested in
You can align controls in the report design window using the align button on the report design tools ____ tab.
Iteru [2.4K]
<span>You can align controls in the report design window using the align button on the report design tools arrange tab.</span> This tab is used to apply different types of formatting to reports in Access. The user<span> can change one type of control layout to another,  can remove controls from layouts so that she/he can position the controls wherever you want on the report.</span>
4 0
3 years ago
Unnecessary duplication of data in a database is referred to as:.
harina [27]

Answer:

Data Redundancy

Explanation:

It is a data organization issue that allows the unnecessary duplication of data within your Microsoft Access database.

Hope this helps ^v^

3 0
3 years ago
The mechanism for preventing traffic that is perceived to be dangerous to the network is known as a a0.
nikklg [1K]
I would go with firewall
6 0
3 years ago
Given table R(A,B,C) and S(C,D,E), which of the following SQL statements would find the record(s) with null values on the column
sashaice [31]

Answer:

a. select * from R, S where R.C = S.C (+); (R left outer join S)

Explanation:

In SQL, left outer join of two tables R and S joined on a common column C means that all rows of R are included in the result including those rows for which value of R.C is null. On the contrary, right outer join of two tables R and S joined on a common column C means that all rows of S are included in the result including those rows for which value of S.C is null. As per the question our requirement is the former. So option a is correct.

4 0
4 years ago
M/J Business Keyboarding Guided Notes Module 2
attashe74 [19]
Why is there so much
8 0
3 years ago
Other questions:
  • what is the opportunity cost of buying a $.75 soda everyday at school for 3 years instead of drinking water ? assume you are in
    10·2 answers
  • The Cisco IOS automatically modifies the dead interval when the _____ interval is changed. (Points : 2) hello
    13·1 answer
  • Which operations security control prevents unauthorized intruders from internally or externally accessing the system and lowers
    10·1 answer
  • After installation of SSL certificate website asking for username and password.
    6·1 answer
  • Write a calculator program that keeps track of a subtotal like real calculators do. Start by asking the user for an initial numb
    12·1 answer
  • As text is typed in the _____ text box, a drop-down list displays options for completing the action, displaying information on t
    11·1 answer
  • How many bits long is a autonomous system number?
    13·1 answer
  • 1. How many bits would you need to address a 2M × 32 memory if:
    8·1 answer
  • The backbone networks of the Internet are typically owned by long-distance telephone companies called
    12·1 answer
  • Clickable text or images that take you to different sites on the World Wide Web are called __________.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!