1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katarina [22]
4 years ago
9

You coded the following class: public class N extends String, Integer { }When you compile, you get the following message:N.java:

1: ‘{‘ expected public class N extends String, Integer^ 1 errorExplain what the problem is and how to fix it.
Computers and Technology
1 answer:
lidiya [134]4 years ago
7 0

Answer:

Hi DancingGrace! The issue with the code is that it is trying to extend multiple classes which is not a feature in Java programming.

Explanation:

The extends keyword allows a class to use the attributes and properties of the base class it is extending and add more features and properties into it's own class. This is useful in programming where different models share similar properties but are slightly different. An example would be designing a class for Car and Bike. Both have some similar properties like wheels, engine, etc, however they are different forms of transport. A useful implementation would be to define a class called Vehicle with similar attributes, and have the Car and Bike extend it.  

You might be interested in
The physical parts of the computer that you can see and touch are called______.
Tatiana [17]
Physical parts of computer: Computer Hardware
5 0
3 years ago
Any executable files???
Kipish [7]

Doesn't look like there are any..

7 0
3 years ago
the part of the computer that provides access to the internet is the A.modem B. keyboard C. monitor or D.system unit
marta [7]
A. the modem provides the wifi or internet to the computer
6 0
3 years ago
Read 2 more answers
Security measures are sometimes described as a combination of physical, technical, and administrative (PTA) safeguards. Which of
attashe74 [19]

Answer:

Measures including device data encryption, anti-malware software, and communications encryption.

6 0
4 years ago
Anyone who play online game drop your name​
aleksley [76]

Answer:

kevinj720

Explanation:

4 0
3 years ago
Other questions:
  • What command would you run from a windows command line to test a computer's network stack?
    7·1 answer
  • Why is it so important that you know how much traffic dfs replication requires?
    13·2 answers
  • You have repaired a broken LCD panel in a laptop computer. However, when you disabled the laptop, you bent the hinge on the lid
    15·1 answer
  • It is important to name your files in a variety of formats. true or false
    15·2 answers
  • Which of the following statements are true of software engineers? Check all of the boxes that apply. They are responsible for wr
    11·2 answers
  • Why is information broken down into packets
    15·1 answer
  • Have you searched Buzz Ch.at on playstore​
    13·1 answer
  • Please, ignore
    6·2 answers
  • If you feel your friend had a negative digital identity, what would you do or tell them in order to help them have a positive di
    11·2 answers
  • Explain briefly how learning how to follow can make a person a good leader
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!