1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yuradex [85]
4 years ago
7

Which of this access specifies can be used for a class so that its members can be accessed by a different class in the same pack

age?
a) Public
b) Protected
c) No Modifier
d) All of the mentioned
Computers and Technology
1 answer:
Lelu [443]4 years ago
6 0

Answer:

D) All the mentioned

Explanation:

public: This access modifier allows access from all classes in the program

protected: Means only classes within the same package or sub-classes (inheritance) can access members of the class

No Modifier: Omiting the modifier sets a class to the default. Which implies only classes in the same package can access members of the class.

The given question refers to class members in the same package so any these three access modifiers can be used.

You might be interested in
Illustrations that are converted from paper to electronic format are usually
KengaRu [80]

The answer is most definitely C: Scanned

In basic terms, a scan is as a result of a digitized printed document being converted from its paper form into digital data, and the work of a scanner is to scan and send the digitized pictures to your computer. A scanner reduces the time and labor to transform the information from printed materials to digital data.


3 0
3 years ago
Read 2 more answers
1. Problem solving is
Ne4ueva [31]

Answer:

A

Explanation:

1. Problem solving is

(4 Points)

O A. highly interactive

B. collaborative

C. Both And B

D. Designing an App

4 0
3 years ago
When choosing field names it is best to choose names that ____?
Lelechka [254]
HTML form fields? It is best practice to use descriptive names and use a consist naming convention. My person preference is to use CamelCase, but some ppl prefer to use hyp-hens or under_scores. For example, FirstName, LastName, CellPhone, etc.
7 0
4 years ago
Read 2 more answers
Which of these should be one of the last options on your list for financial aid
andrezito [222]
Probably foundation grants as those r too important. student loans r though
7 0
4 years ago
Read 2 more answers
Choose the words that complete the sentences.
amid [387]

Answer, Options?

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • A ____ is harmful computer code that spreads without your interaction, slipping from one network to another and replicating itse
    15·1 answer
  • What is the main idea of this article? Please someone help me. I will give brainliest answer
    7·1 answer
  • What is a quick way to determine if a site might contain reliable information? looking at the title of the webpage reading the f
    5·2 answers
  • A circuit contains four resistors connected in series. R1 is 100 , R2 is 200 , R3 is 240 , and R4 is 600 . What is the total cir
    13·1 answer
  • A) Explain the concept of memory management unit as related to Operating systems.
    8·1 answer
  • What is a device driver
    10·1 answer
  • 2Discuss the difference between overriding and overloading. (This is a very common interview question in programming)
    10·1 answer
  • Adam is an Engineering student but has decided that he does not want to work in that field, but in the Manufacturing career clus
    11·2 answers
  • Who is Mr.Anonymous?
    5·2 answers
  • Just help :(((((((((((((((((((((((((((((((((((
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!