1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dalvyx [7]
3 years ago
14

What is wrong with line 1?

Computers and Technology
1 answer:
Gelneren [198K]3 years ago
5 0

Answer:

The set is a object of the class 'H' and the setY method is a member of G class which is not called by the object of H class.

Explanation:

  • If a user calls the G function which is not a private by the help of H class objects then it can be called. It is because all the public and protected methods of A class can be accessed by the B class if B extends the A-class.
  • If any class is extended by the other class then the derived class holds the property of the base class and the public and protected method can be accessed by the help of a derived class object.
  • The derived class object can be created by the help of base class like written in the "line 1".
  • But the base class can not call the member of the derived class.
You might be interested in
How to buy free big money computers that earn free money everydays?
Novay_Z [31]
That would be great if it was possible
8 0
3 years ago
How are satellite radio, Internet radio, and podcasting different?
Lilit [14]
Satellite radio is a subscription-based service, while HD radio is provided at no cost by current radio providers. Internet radio and podcasting have allowed many new programs and stations to be broadcast at low cost.
5 0
3 years ago
All of the following are true about in-database processing technology EXCEPT Group of answer choices it pushes the algorithms to
vekshin1

All of the aforementioned are true about in-database processing technology except: D. it is the same as in-memory storage technology.

<h3>What is an in-database processing technology?</h3>

An in-database processing technology can be defined as a type of database technology that is designed and developed to allow the processing of data to be performed within the database, especially by building an analytic logic into the database itself.

This ultimately implies that, an in-database processing technology is completely different from in-memory storage technology because this used for the storage of data.

Read more on database here: brainly.com/question/13179611

#SPJ1

5 0
2 years ago
Considering current online newspaper editions and the characteristics of digital age media, how do you think newspaper design mi
NeX [460]
One way that a newspaper design may change in the future is that they will only be available in an interactive online edition. The correct answer is B. <span />
6 0
3 years ago
Please read !!!
prisoha [69]
Don’t stress. You’re no failure if you believe in yourself. Have some faith. Don’t give up and live your life to the fullest. Take care and stay safe!! :)
3 0
3 years ago
Other questions:
  • You can use Facebook's live feed tool to broadcast content as you post it
    8·2 answers
  • Krystal recorded her times for all her cross-country meets this season. To sort her data showing the lowest times first, what wi
    14·2 answers
  • What do developers do to support software products
    14·1 answer
  • A speaker takes a variety of information from the results of a web search, and puts it together in an outline to make up his spe
    8·1 answer
  • Write a C function which mimics the behavior of the assembly language function below. Note that this time, the assembly language
    10·1 answer
  • Public-key cryptography can be used for encryption (ElGamal for instance) and key exchange. Furthermore, it has some properties
    9·2 answers
  • The MAC address is a _____ bit number.
    10·2 answers
  • Describe the functions of a system software​
    6·2 answers
  • Draw a flow chart to access the marks of three students. calculate the total avarage and display the result​
    11·1 answer
  • Why is a salt added to a password that is being stored in a database?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!