1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dvinal [7]
4 years ago
7

A top level class may have only the following accessmodifier.

Computers and Technology
1 answer:
GREYUIT [131]4 years ago
3 0

Answer: Public

Explanation:

 A top level class can have a public, as top level cannot be private and protected because the modifier private is not allowed. As, top level is a class which is not a nested class. Interface of a access modifier is either public or no modifier. There are two types of access control modifier are top level - public and member level- private, protected.

You might be interested in
What option is used to combine several objects so that they can be treated as a single unit
elixir [45]
Im gonna hope this is a coding question.
It's parent (unit) and make children (objects)

If it's word/excel give me the multiple choice answers please.
6 0
3 years ago
Anyone here play sims 4 and know how to help me with his last exception file?
zysi [14]

Answer:

Explanation:

What game is this

3 0
3 years ago
Your company has decided to store data files in Cloud Storage. The data would be hosted in a regional bucket to start with. You
Natasha_Volkova [10]

1. Necessary backup from cloud storage to client workstation or desktop or pc.

2. Delete 30 day and one year data from cloud storage.

<u>Explanation:</u>

Purging the data is used in database where necessary backup and purging the data up to certain years. So that database is access will be faster.

At cloud storage it has very limited storage's and by increasing storage will cost more to company or organization, as best practices every 30 day the purge old data should done in cloud storage's and with necessary backup  to be taken as precautionary measurement.

Once data is completed more than one year, with necessary backup delete old year data from cloud storages. Some cases old dead account where been deactivated also can deleted depends of organizations policy.

7 0
3 years ago
You are given two arrays of integers a and b of the same length, and an integer k . We will be iterating through array a from le
rodikova [14]

Answer:

#include <iostream>

using namespace std;

int main(){

   int arr1[5], arr2[5], k = 7;

   arr1 = {1,3,5,3,6}

   arr2 = {1,3,2,4,4}

   int reverseA2[5];

   for (int x = 5; x > 0; x++){

       reverseA2[5-x] = arr2[x-1];

   }

   for (int i = 0; i < 5; i++){

       if ( arr1[i] + reverseA2[i] < k){

           cout<< arr1[i] << " , "<<reverseA2[i];

       }

   }

}

Explanation:

The C++ source code prints a pair of values from the arr1 and reverse arr2 arrays whose sum is less than the value of the integer variable value k.

4 0
3 years ago
Suppose you are an ISP that owns a / 22 IPv4 address block. Can you accommodate requests from six customers who need addresses f
lisabon 2012 [21]

Answer:

It is not possible.

Explanation:

In this example, we need to accommodate 473 computers for six clients that are 473 IP addresses.

For this request just we have /22 IPv4 address blocks, this mean

22 red bits 11111111111111111111110000000000 <--- 10 host bits

We must increase red bits to 25, we need these 3 bits to create 6 sub red, in this case, 2^3 = 8 sub red.

Why did we ask 3 bits? Because if we ask only 2, 2^2 = 4, and we need 6 sub red.

25 red bits 11111111111111111111111110000000 7 host bits

In this case, we need more than 260 computers, but just we have 7 bits, this means.

2^7 = 128 and just one customer needs 260, for that is impossible.

7 0
3 years ago
Other questions:
  • Write a loop statement to count and display the number of positive integers in the array. That is, your loop should display the
    14·1 answer
  • The application reliability team at your company this added a debug feature to their backend service to send all server events t
    6·1 answer
  • Making each password unrelated to the previous password provides an additional level of security through _____.
    7·1 answer
  • In CadStd, what does the Zoom All button do? A. Makes a drawing bigger so you can see small details B. Returns a drawing to a si
    5·1 answer
  • Which statement is true regarding achievers?
    8·1 answer
  • 3. Find the product of (a² +3a+5) x (a+7)​
    7·1 answer
  • Determine the distance between point (x1, y1) and point (x2, y2), and assign the result to points Distance. The calculation is:
    12·1 answer
  • Java: Programming Question: Reverse OrderWrite a program that reads ten integers into an array; define another array to save tho
    10·1 answer
  • Diacuss three examples of divide and conquor approach​
    9·1 answer
  • look for ten websites and classify them as static or dynamic what makes each websites static or dynamic?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!