1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
3 years ago
10

public class BaseballTeam { private String city, mascot; private int numberOfPlayers; @Override public boolean equals(Object obj

) { if ( !(obj instanceof BaseballTeam)) return false; BaseballTeam other = (BaseballTeam) obj; return (city.equals(other.city) && mascot.equals(other.mascot)); } @Override public int hashCode() { return numberOfPlayers; } }

Computers and Technology
1 answer:
Olenka [21]3 years ago
3 0

Complete Question:

The Complete Question is on the image uploaded below:

Answer:

The answer is

C. The class compiles but has an improper hashCode() method.

Explanation:

The complete explanation for the answer above is shown on the first and second uploaded image

You might be interested in
use the internet to research the SYSTEM account. Why is it nessesary to include this account with full control on a directory
Kobotan [32]

Answer:

It is essential for the existence of a helicopter administration over all other users on the system.

 

Explanation:

A system account is a computer user account that is generated by an operating system (OS) during installation of the OS and that is utilized by the user in accordance to the parameters with which it has been designed and the purpose which it was created.

A System account is usually referred to as a privileged account because it comes with full control on one or more directories. A directory is simply a location for file storage on a computer. Full access or control includes the ability to:

  1. read directories
  2. write to directories
  3. make changes to and delete files, folder and subfolders.
  4. alter authorization settings for all files and subdirectories.

Besides control on the directory level, System Accounts which are also called Super Accounts which in addition to the above have permission to

  • install  and remove software applications
  • update and or upgrade the computers operating system
  • access directories and files which normal users cannot and should not.

System Accounts are therefore important for security reasons. They are configured to act as a supervisory account which can create, authorise and terminate other accounts and processes.

Some of their merits include the ability to:

  1. Oversee, audit, and completely control all other privileges.
  2. forestall cyber attacks on the system from internal users or insiders.
  3. Establish and provide evidence for compliance with regulatory codes

Cheers

8 0
3 years ago
I will mark you as brainlist
weeeeeb [17]

Answer:

download it

Explanation:

because if u upload it will not save .

7 0
3 years ago
Read 2 more answers
Supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the cust
Jet001 [13]

Answer:

Operational CRM.

Explanation:

Operational CRM can be described as most of the programs that allow a company to taking care of the desires of the consumers. The structure links and maintains the selling, marketing, and customer support activities of a corporation, thus providing a structure that requires customer service.

So, the following answer is correct according to the statement.

7 0
4 years ago
PLEASE HELP. I NEED ASAP!!
Katena32 [7]
D. consider how long you plan to keep your money in the investment.
7 0
3 years ago
Read 2 more answers
Draw a flowchart or write pseudocode to represent a program's logic that allows the user to enter a value. The program multiplie
PIT_PIT [208]

Ill choose flowchart. Look picture for the answer

ask me if you have any doubts about my answer.

5 0
3 years ago
Other questions:
  • Paying attention to the trends that might impact your future career is called
    15·2 answers
  • Which of these practices should you follow while creating your résumé?
    14·1 answer
  • Windows uses a memory-management technique known as ________ to monitor which applications you use most frequently and then prel
    8·1 answer
  • Computers represent color by combining the sub-colors red, green, and blue (rgb). Each sub-color's value can range from 0 to 255
    13·1 answer
  • Match the fallacy with its name. Being a speaker of Spanish, I'm also great at speaking Italian.
    10·1 answer
  • You would like to emphasize certain key terms on a slide with a bold format. Which slide element should you modify to provide th
    15·2 answers
  • An attribute that can have more than one value for each entity instance is referred to as:
    10·1 answer
  • The best way to safeguard your document is to save it
    11·1 answer
  • After inserting a video into your slide how can you test it
    11·1 answer
  • Why star topology is more reliable than bus or ring topologies
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!