1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nastasia [14]
4 years ago
11

5. The access modifier of constructors should be _________________

Computers and Technology
1 answer:
tatiyna4 years ago
8 0

Answer:

The correct answer for the given question is "public"

Explanation:

The access modifier of constructor is public,private ,protected.

The access modifier of constructor should be public because to access the constructor outside the class .

Constructor can be called anywhere in program by using public access modifier .

The default access modifier in a class is public.

In the private access modifier constructor cannot be called anywhere in program.

We use public keyword to declared public constructor .

We use private keywors to declared private constructor.

Following are example to declared public  and private constructor

class test

{

public test() //  to declared public constructor

{

// statement

}

private test() // to declared private  constructor

{

// statement

}

}

You might be interested in
When your tire blows out in the middle of a drive, you should _____. A. let go of the steering wheel B. pump the brakes immediat
notsponge [240]
The answer is D. Because you are in the middle of the road so put your caution lights on and steer to the side of the road
3 0
4 years ago
Read 2 more answers
Marissa, a 21-year-old young woman, is working as an intern at a software company. She has recently graduated from college. She
Zigmanuir [339]

Answer:

She is experiencing the features of feeling in between.

Explanation:

Because she graduated from college currently and she thinks about moving seriously with her boyfriend or best friend and she also thinks about the convenience and safety which she gets in her parents' house. She confused because she is not completely in the adult stage and currently, she passed through from the stage of adolescence, so that's why she experiencing feeling in between.

3 0
4 years ago
Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest
Y_Kistochka [10]

Answer:

The Encryption solution that best prevents a competitor from receiving confidential information is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

Explanation:

Solution:

From my own perspective the encryption solution that i will use that prevents s a competitor from receiving confidential information and justify the recommendation is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

This is because in this case we have to share data confidentially (information need to be hidden from Unauthorized  security access. also these provides the Transport Layer security that we needed in above example above.

The purpose of these protocol is to provide server and client authentication, Data confidentiality,and Data integrity (protected from unauthorized change). Application Layer client/server program such as HTTP that uses the service of TCP can encapsulate their data in SSL Packets.

SSL (Secure Socket Layer): is defined as the normal technology for protecting an internet connection secure and defend any sensitive data that is being sent between two systems, and not allowing criminals from reading and changing any information sent, including potential personal details.

TLS (Transport Layer security): It is a procedure that allows  data integrity  and privacy over Internet communications.

3 0
3 years ago
What plugs into this?
vfiekz [6]
Into what ????????????

4 0
2 years ago
Read 2 more answers
How computer viruses spread from one computer to another​
morpeh [17]
Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.
8 0
3 years ago
Other questions:
  • Speech on inventors and inventions
    14·1 answer
  • Jeremy, a newly appointed assistant Director, is excited about his job. the director of the movie has assigned him the responsib
    6·1 answer
  • Which of the following statements about computer graphics formats is true?
    14·1 answer
  • What’s the keyboard command I will allow you to copy text
    11·2 answers
  • Ask me anything about grades kindergarten to fifth grade!
    12·1 answer
  • What things have small motors
    13·1 answer
  • A posting error is:
    8·1 answer
  • Classify the following skills: communication, creativity, and independence.
    15·1 answer
  • The Word feature that would allow you to insert fields from an Access database into multiple copies of a Word document is called
    12·1 answer
  • Fiber optic cable from a service provider can be delivered directly to the end user. which implementation delivers data to a cab
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!