1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PolarNik [594]
3 years ago
7

Methods that require you to use an object to call them are called ____ methods.1. accessor

Computers and Technology
1 answer:
nata0808 [166]3 years ago
6 0

Answer:

The answer is "Option 2".

Explanation:

Methods of instance are needed to construct an object of their class and needed to call. In java, the static method can be called without generating a class object. and other options are not correct that can be explained as follows:

  • In option 1, Accessor is a function that is used to set the value of private fields that's why it is not correct.
  • In option 3, Internal is a keyword that is used to provide accessibility to function.
  • In option 4, Static is a keyword that is used with a class, method, and variable. This keyword is used to share the same variable or method to the class. That's why it is not correct.

You might be interested in
If you have different movie or audio file types saved to your computer and your computer can only play the OGG format instead of
galina1969 [7]

Answer:

convert the MP4 format file to the OGG format file                  

Explanation:        

An OGG file is a compressed audio file of Ogg Vorbis that is used for holding audio data. It is a free and an open container file format which is maintained by Xiph.Org Foundation. OGG format file can multiplex independent streams of video, text, audio and meta data.

The OGG file has better sound quality and characteristics than a MP3 or MP4 files. The MP4 file format can be converted into OGG format file if the files are saved in different formats in the computer which can play only OGG format.

5 0
2 years ago
Read one positive integer n. Then create an n X n two-dimensional array and write the code that stores integers from 1 to n2 as
marysya [2.9K]

Answer:

The program in Java is as follows:

import java.util.*;

public class Main{

public static void main(String[] args) {

    int n;

    Scanner input = new Scanner(System.in);

 System.out.print("Size of array: ");

 n = input.nextInt();

 int count = 1;

 int[][] arr = new int[n][n];

 for(int i = 0; i<n;i++){

     for(int j = 0; j<n;j++){

         arr[i][j] = count;

         count++;      }  }

 for(int i = 0; i<n;i++){

     for(int j = 0; j<n; j++){

         System.out.printf(arr[i][j]+" ");      }

     System.out.println();  } }}

Explanation:

This declares the size of the array

    int n;

    Scanner input = new Scanner(System.in);

This prompts the user for size of array

 System.out.print("Size of array: ");

This gets input for size of array

 n = input.nextInt();

This initializes the array element to 1

 int count = 1;

This creates a 2d array

 int[][] arr = new int[n][n];

This iterates through the rows

 for(int i = 0; i<n;i++){

This iterates through the columns

     for(int j = 0; j<n;j++){

This populates the array

         arr[i][j] = count;

         count++;      }  }

The following nested loop prints the array elements

 for(int i = 0; i<n;i++){

     for(int j = 0; j<n; j++){

         System.out.printf(arr[i][j]+" ");      }

     System.out.println();  } }}

8 0
2 years ago
Alguien porfavor me dice como cambiar de idioma en brainly
Marat540 [252]

Answer:

no lo siento

Explanation:

4 0
2 years ago
Read 2 more answers
Despite the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is
Molodets [167]

Answer:

False

Explanation:

7 0
3 years ago
What are some of the things people try to do on social media when they can use
Andrej [43]

Answer: catfishing

Explanation:

They hide behind a screen and pretend to be and look like someone they're not by putting up fake pictures etc.

5 0
2 years ago
Other questions:
  • We never need to use a forward declaration when invoking a public subprogram. true or false?
    15·1 answer
  • Which protocol is used by the client for microsoft networks and file and printer sharing for microsoft networks to communicate w
    10·1 answer
  • Which of the following is NOT true about variables?
    13·1 answer
  • (BRAINLIEST QUESTION) What are some challenges that will need to be overcome in order for the Internet of Vehicles to become a r
    13·1 answer
  • which of these describe raw data?check all of the boxes that apply A) what a person buys B) where a person lives C) data that ha
    9·1 answer
  • Explain each of the three important concepts behind the Federal Networking Council's definition of the term Internet. Explain ho
    8·1 answer
  • Which of the following is the best name for a history report about world war 1
    7·1 answer
  • What is the Intranet?<br>​
    5·1 answer
  • What are these receivers called?
    10·1 answer
  • Rachelle is writing a program that needs to calculate the cube root of a number. She is not sure how to write the code for that
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!