1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FinnZ [79.3K]
3 years ago
9

. public members are accessible from ________________ where the object is visible

Computers and Technology
1 answer:
xz_007 [3.2K]3 years ago
6 0

Answer:

every place.

Explanation:

Public members of the class are accessible every where the object is visible. That is the specialty of the public member they are open to all, unlike the private and protected members that can be accessed within the class in case of private members or can be accessed within the class and by the child classes.

You might be interested in
Drag the tiles to the correct boxes to complete the pairs.
Nady [450]

Explanation:

Drag the tiles to the correct boxes to complete the pairs.

Match each story-boarding technique with its appropriate description.

hierarchical

linear

webbed

wheel

The order of page navigation is inconsequential.

The flow of information is sequential.

The technique requires navigating back to the main page.

The technique orders content from generic to specific topics.

8 0
3 years ago
You want to search for contacts in your email program. You enter the person’s first name and last name in the search box. You wa
ryzh [129]

Answer:

NOR

Explanation:

6 0
3 years ago
Read 2 more answers
What size font is appropriate for most on-screen presentation slides?
Natali [406]
It's heading 2 or 3, because heading 1 is considerd as too big for slide presentations.
6 0
3 years ago
Assume that name has been declared suitably for storing names (like "Misha", "Emily" and "Sofia"). Assume also that stdin is a v
zaharov [31]

Answer:

// program in java.

import java.util.*;

// class definition

class Main

{// main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // object to read input

Scanner scr=new Scanner(System.in);

 // ask to enter name

System.out.print("Enter Your name: ");

 // read name from user

String NAME=scr.nextLine();

// print message

System.out.println("Greetings,"+NAME);

     

   }catch(Exception ex){

       return;}

}

}

Explanation:

Read name from user with the help of scanner object and assign it to variable "NAME".Then print a Greetings message as "Greetings,NAME" where NAME will be  replaced with user's input name.

Output:

Enter Your name: Rachel                                                                                                    

Greetings,Rachel

5 0
3 years ago
Which of these is true of blackhat and whitehat hackers?
earnstyle [38]

Answer:

Like all hackers, black hat hackers usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems.

Explanation:

that's all. c:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Survey Q. Non-scoring: What role is played in the team? (1 correct answer)
    14·1 answer
  • 1.using synonyms can help make ur writing more________
    11·1 answer
  • How to hard reset a iphone 7 without computer
    8·2 answers
  • An IT company revises its process parameters in response to complaints from vendors that products were not ready on time. This w
    15·1 answer
  • Which of the following best describes a situation where software should be upgraded instead of replaced?
    6·1 answer
  • Question #1
    9·2 answers
  • You can use _____ to track the state of each user in the application.
    8·1 answer
  • NFPA 780, Standard for the Installation of Lightning Protection Systems provides information on the installation of _____ for li
    6·1 answer
  • URGENT!! thank you!!!!!
    9·1 answer
  • The area of ai that investigates methods of facilitating communication between computers and people is?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!