1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dalvyx [7]
3 years ago
14

What is wrong with line 1?

Computers and Technology
1 answer:
Gelneren [198K]3 years ago
5 0

Answer:

The set is a object of the class 'H' and the setY method is a member of G class which is not called by the object of H class.

Explanation:

  • If a user calls the G function which is not a private by the help of H class objects then it can be called. It is because all the public and protected methods of A class can be accessed by the B class if B extends the A-class.
  • If any class is extended by the other class then the derived class holds the property of the base class and the public and protected method can be accessed by the help of a derived class object.
  • The derived class object can be created by the help of base class like written in the "line 1".
  • But the base class can not call the member of the derived class.
You might be interested in
What are some examples of objects by which you can browse in the select browse option
mezya [45]
Safe search ,tunnel search
7 0
3 years ago
Cryptanalysis is made more difficult by having shorter keywords.a) trueb) false
ruslelena [56]

Answer:

B. False.

Explanation:

Cryptanalysis can be defined as the study, art or process of evaluating and analyzing information systems such as ciphertext, cryptographic systems and ciphers. The main purpose of Cryptanalysis is for a better understanding of how the cryptographic system works, in order to find techniques for deciphering, defeating or weakening them without an access to any privileged or secret data (information) required to do so.

Hence, cryptanalysis is made more difficult by having longer keywords as opposed to having shorter keywords which typically would make it easier for an attacker to decipher.

In a nutshell, it is false and incorrect to say that cryptanalysis is made more difficult by having shorter keywords.

5 0
3 years ago
Question 2 Multiple Choice Worth 5 points)
Finger [1]

Answer:

Answer:much faster than Humans can

4 0
3 years ago
Which is the least technically experienced technical support group?
Nezavi [6.7K]

Answer:

Tier 1 support

Explanation:

Of the given options, tier 1 support technical group is the least experienced group. This group of technicians is also referred to as level 1 technical group.

The tier 1 or level support are made up of junior technician, and they have few technical understandings.

Their roles include email response and basic troubleshooting, attending to phone calls, among others.

When a problem cannot be solved by tier 1 support  technicians, they pass the problem to tier 2 support technicians,  

5 0
3 years ago
Which of the following types of tool should be used only on round work, such as rigid or IMC conduit?
Dafna11 [192]
Its C. A pipe wrench 
6 0
3 years ago
Read 2 more answers
Other questions:
  • on 5.7.3, we provide an outline of a solution to the dining-philosophers problem using monitors. This problem will require imple
    6·1 answer
  • Give three facts about the history of the train shongololo
    9·1 answer
  • Give an example of a class and an example of an object. Describe what a class is, what an object is, and how they are related. U
    6·1 answer
  • What stage in the process of media production involves discussing the budget and timelines as well as identifying stakeholders?
    15·1 answer
  • What are the basic features of Usenet group
    15·1 answer
  • Question 1
    10·1 answer
  • Write a program to change background colour of your visual basic form with any 3 different events.​
    15·2 answers
  • The Quick Access tool bar allows you to customize the actions or commands you frequently use.
    13·1 answer
  • Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform fo
    6·1 answer
  • How does abstraction make programming languages easier to use
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!