1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kompoz [17]
3 years ago
12

A subclass can directly access____.

Computers and Technology
1 answer:
Otrada [13]3 years ago
7 0

Answer:

A subclass can directly access public members of a superclass.- first choice

You might be interested in
A company has a website that has seen a large increase in visitors and they are concerned that if the trend continues, the web s
tensa zangetsu [6.8K]

Answer:

Install a second server and load balancer

Explanation:

Considering the scenario described above and to solve this problem without having to replace the current server, what I will do is to carry out "installation of a second server to provide additional capacity for the server and install load balancer which helps in managing and allotting incoming requests or application traffic to any ready server prepared of fulfilling them.

5 0
3 years ago
Write a (java) program with a class called Sum1, using a while loop to add 10 numbers entered from the key-board.
Ainat [17]

This is a java program with a class called Sum1.

Explanation:

While loop is used to add 10 number.

import java.util.Scanner;

public class Sum 1

{

   public static void main(String args[])

   {

       int number, count, sum = 0;

       Scanner s = new Scanner(System.in);

       System.out.print("Enter the number:");

       number = s.nextInt();

       while(number > 0)

       {

           count = number % 10;

           sum = sum + n;

           number = number / 10;

       }

       System.out.println("Sum of Digits:"+sum);

   }

}

5 0
3 years ago
What is extraction, transformation, and loading? Group of answer choices It is a process of entering data, tracking data, and lo
Tcecarenko [31]

Answer:

It is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.

Explanation:

Extraction, transformation, and loading can be defined as a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

7 0
3 years ago
In Python, programmers use square brackets and an index range to slice multiple characters from a string.
il63 [147K]
(True) jgjgjgbfbfbfbdvdvdvdv
4 0
3 years ago
Read 2 more answers
Why are some constraints automatically applied by the software
balandron [24]

Answer:

Some constraint are automatically applied by the software while others must be entered manually because we have some shapes that just come with automatic constraint.

In instance can be given with square, this have all ot iits four sides equal with two set of parallel sides.

Explanation:

see Answer.

3 0
4 years ago
Other questions:
  • .All of the following are true with the respect to implicitinvocation except:
    8·1 answer
  • Differences between barcode reader and character recognition devices​
    9·2 answers
  • For almost all networks today, including the internet, the communication protocol used is called ____.
    15·1 answer
  • Can you answer the fill in the blanks
    15·2 answers
  • Help<br><br> My internet won't work on my other pc i tried a lot to get it back
    9·2 answers
  • This shows you where text will appear as you type.
    14·1 answer
  • What is the best way of farming exotics in destiny?
    12·2 answers
  • Write long answer to the following question. a. Define microcomputer. Explain the types of microcomputers in detail.​
    5·2 answers
  • Select all steps in the list below that should be completed when using the problem-solving process discussed in this chapter.
    14·1 answer
  • The border to the right of a column is called the ____.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!