1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dalvyx [7]
2 years ago
14

What is wrong with line 1?

Computers and Technology
1 answer:
Gelneren [198K]2 years ago
5 0

Answer:

The set is a object of the class 'H' and the setY method is a member of G class which is not called by the object of H class.

Explanation:

  • If a user calls the G function which is not a private by the help of H class objects then it can be called. It is because all the public and protected methods of A class can be accessed by the B class if B extends the A-class.
  • If any class is extended by the other class then the derived class holds the property of the base class and the public and protected method can be accessed by the help of a derived class object.
  • The derived class object can be created by the help of base class like written in the "line 1".
  • But the base class can not call the member of the derived class.
You might be interested in
Carlos, an algebra teacher, is creating a series of PowerPoint presentations to use during class lectures. After writing, format
yarga [219]

Answer:

see explanation

Explanation:

Carlos can make a copy of the old presentation that preserves all the formatting, and replace old content with new information.

5 0
3 years ago
Under the Home tab, where can a user find options to change the bullet style of an outline?
fomenos
Created a new multilevel list style to add to the gallery
5 0
2 years ago
How do u create a blank line between two lines in a document
Free_Kalibri [48]

Answer: Press enter at the end of the line.

Explanation:

If you press enter at the end of the line or sentence, it will start a new space underneath your line or sentence.

8 0
2 years ago
Select all of the following statements regarding security policy that are true.
a_sh-v [17]

Answer:

C and D

Explanation:

Your company should have a written security policy, and all employees should have access to the policy, even if they're casual workers.

Also, Training on computer security should be provided for all staff members as a prerequisite to start work.

3 0
3 years ago
Which date formats are allowed in Excel for February 14, 2018? Check all that apply.
bonufazy [111]
The answers are 3,5, and 6
4 0
3 years ago
Other questions:
  • Which of the following blocks is least similar to the others?
    8·2 answers
  • If you need to multiply 400, 2, and 1 ½, what would you type on the numeric keypad?
    9·2 answers
  • All java classes must contain a main method which is the first method executed when the java class is called upon.
    10·1 answer
  • __________ is a very simple form of lossless data compression in which runs of data (that is, sequences in which the same data v
    6·1 answer
  • Which of the following languages does not provide built-in-pattern matching operations (the language, although, has pattern matc
    14·1 answer
  • I need help, whoever gets it correct will get brainliest
    7·1 answer
  • Which of the following is a valid HTML reference to a CSS file?
    13·1 answer
  • Find the max and min of a set of values using recursion Find the max and min of a set of values using recursion. First input the
    5·1 answer
  • HELP 20 points THIS IS ON EDGE IF YOU DON'T KNOW THE ANSWER DON'T RESPOND
    12·2 answers
  • What is malware? What are some signs that malware may be impacting the performance of your computer? How can you avoid malware?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!