1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tatiana [17]
3 years ago
14

When is it not necessary to invoke the method myMethod using dot notation? When myMethod is private. When myMethod is invoked by

a method in the same class as myMethod. When myMethod is public. When myMethod is both private and static. When myMethod is invoked by a method in a different class than myMethod.
Computers and Technology
2 answers:
Paraphin [41]3 years ago
5 0

Answer:

When myMethod is invoked by a method in the same class as myMethod.

Explanation:

When you are in a class, it is like a different enviroment and within that class you can call a method without using the dot notation because you are still within the class.

Outside the class and despite the type of method, public, private or static, the dot notation will be required.

kari74 [83]3 years ago
3 0

Answer:

When myMethod is invoked by a method in a different class than myMethod.

Explanation:

Other classes can invoke the function written in different classes using the dot notation.

You might be interested in
____ are commonly used for communication between OS components, for queuing requests to an OS service, and for exchanging messag
vekshin1

Answer:

C. Pipes

Explanation:

Pipes are medium of communication between two or more interrelated processes. It is used for communication between operating system components. It is also used in exchanging messages between components of large programs. It implements interprocess communications through an interface. It passes information from one program process to another.

3 0
3 years ago
Read 2 more answers
| HELP PLS! C++ Sorting arrays can be performed using either Selection Sort or Insertion Sort or
Sholpan [36]

Answer:

wwhwwwwnlcw lcwl. wl w l. w la a. a. ac aa cw w w w. w. w. w w. ww w. w w w. w w w ww w w. w w ww. w cs s js jw jw kw kw ks jpsbp svkhs ksl oheo

8 0
3 years ago
How can templates be made available to other users?
Daniel [21]

Answer:

b

Explanation:

4 0
3 years ago
You have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the
Katyanochek1 [597]

Answer:

SHA-1 is used in this case.

Explanation:

7 0
3 years ago
Examine about the Internal & External Fragmentation methods give an example for each. essay​
Tju [1.3M]

Internal Fragmentation occurs when a process needs more space than the size of allotted memory block or use less space. External Fragmentation occurs when a process is removed from the main memory. Internal Fragmentation occurs when Paging is employed. External Fragmentation occurs when Segmentation is employed.

3 0
3 years ago
Other questions:
  • What type of topology gives you a direct connection between two routers so that there is one communication path?
    14·1 answer
  • When a range of IP addresses is set aside for client devices, and one of these IPs is issued to these devices when they request
    14·1 answer
  • Write an expression that executes the loop body as long as the user enters a non-negative number. Note: If the submitted code ha
    14·1 answer
  • Counter-controlled repetition is also known as:
    8·1 answer
  • Which of the following statements are true about quick sort
    12·1 answer
  • Why are answers not appearing? I've seen many complain about this recently.
    8·1 answer
  • What is the most common password on the internet?
    11·2 answers
  • Is there a way to earn free robux
    7·2 answers
  • What number system do people in America use?
    10·2 answers
  • Cómo se transmite la voz en el sistema telefónico?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!