1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solmaris [256]
3 years ago
5

)Which of following can be thrown using the throwstatement?

Computers and Technology
2 answers:
zysi [14]3 years ago
7 0

Answer:

The answer is B: throwable

Explanation:

Throwable is the super class of all exceptions

Amanda [17]3 years ago
6 0

Answer:

All of Given

Explanation:

The throw keywords can be used to throw any Throwable object. The syntax is :

throw <Throwable instance>

Note that Error and Exception are subclasses of Throwable while RuntimeException is a subclass of Exception. So the hierarchy is as follows:

Throwable

-- Error

-- Exception

   -- RuntimeException

And all of these are valid throwable entities. As a result "All of Given" is the most appropriate option for this question.

You might be interested in
Give me 5 examples of Cyber Security
Vera_Pavlovna [14]

Answer:

Firewalls, Antiviruses, Malware, Antispyware,

Explanation:

8 0
3 years ago
When preparing images to be used for different mediums print web and video in photoshop different file formats are required , se
Anika [276]
The answers are :
JPEG - Compresses well without losing quality, it should be used for the web
TIFF - Can be saved in an uncompressed file format with a high resolution, it is a common file format used for professional print services
BMP - Can be saved in a compressed or uncompressed file format, It is a common file format used for either web or print
<span>FLV or SWF - Used to publish a rendered video for use on the web</span>
5 0
3 years ago
Which wireless technology connects with most mobile devices?
LenaWriter [7]

Answer:

¡) Internet

¡¡) Alexa

¡¡¡) Electronic Devices

8 0
2 years ago
State ONE (1) disadvantage of using computers to store and process<br> information.
NNADVOKAT [17]

Answer:

it can be hacked

Explanation:

there is always a chance for computer data to be hacked

3 0
3 years ago
32.
qaws [65]

Answer:

a

Explanation:

hackers access your system unauthorized

5 0
3 years ago
Other questions:
  • You can drag a cell to a new location by pointing to the cell border until the pointer displays a _______ arrow, and then draggi
    9·2 answers
  • Differentiate among web apps, mobile apps, and mobile web apps.
    14·2 answers
  • Which is the correct sequence of steps for opening a new document?
    10·2 answers
  • 2(x-5)-3(3-x)=1/2(x-2)
    9·1 answer
  • Write an if-else statement for the following: If user_tickets is less than 5, assign 1 to num_tickets. Else, assign user_tickets
    15·1 answer
  • Creating a chart using a spreadsheet Chart Wizard involves four steps. Which is the last step?
    6·1 answer
  • Functionality testing is primarily used with ____________. firewall protection software development hardening servers server tes
    8·1 answer
  • Please respond not with answer but with comment.
    12·1 answer
  • Full from of tmc computer
    8·2 answers
  • A company is looking for an employee to assign passwords to all of its
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!