1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wel
4 years ago
14

When one method calls another, which of the following statements are true? The class methods and instance methods of one class m

ay call the public class methods of another class using dot notation and referencing the name of the other class. The class methods and instance methods of one class may call the private instance methods of another class by using dot notation to invoke the method on an instance of the other class. The instance methods of a class may call, without using dot notation, any class method of the same class.
Computers and Technology
1 answer:
Ivenika [448]4 years ago
6 0

Answer:

All the 3 statements are true.

Explanation:

1. The class methods and instance methods of one class may call the public class methods of another class using dot notation and referencing the name of the other class.

2. The class methods and instance methods of one class may call the private instance methods of another class by using dot notation to invoke the method on an instance of the other class.

3. The instance methods of a class may call, without using dot notation, any class method of the same class.

All the above mentioned statements are true.

You might be interested in
According to Google data, among consumers who conduct a local search on their smartphone, how many then visit a store within a d
sertanlavr [38]

Answer:

According to the google data, 50% consumers visited a store when they conduct a local search on their smartphones within a day.

And consumers more than 60% range uses location data in the advertisements. They uses store location and phone number through the advisement on smartphones and laptop.  

More than 34% of consumers search on the laptops and computer are visited to a store within a day.

8 0
3 years ago
A computer is a multipurpose device that accepts input processes data and produces output all according to a series of stored
yulyashka [42]
According to a series of stored procedures 
8 0
3 years ago
it has been said that television has little real educational value. what is your opinion on this issue?
damaskus [11]
It does, it has a lot of resources that we can take advantage of. It depends on how you use it
3 0
3 years ago
One lap around a standard high-school running track is exactly 0.25 miles. Write a program that takes a number of miles as input
salantis [7]

Answer:

import java.util.Scanner;

public class Miles {

public static void main(String[] args) {

   //initialization

       double Number_Miles;

       //print the message

       System.out.print("Enter the number of miles: ");

       Scanner scn1 = new Scanner(System.in);

       

       Number_Miles = scn1.nextDouble();  //read the input from user

       //calculate the laps

       double yourValue = Number_Miles/0.25;

       //display the output on the screen

       System.out.printf("%.2f", yourValue);

     

}

}  

Explanation:

First import the library Scanner than create the class and define the main function. In the main function, declare the variables.

print the message on the screen and then store the value enter by the user into the variable.

Scanner is a class that is used for reading the output. So, we make the object of the class Scanner and then object call the function nextDouble() which reads the input and store in the variable.

After that, calculate the number of laps by dividing the number of miles with the given one lap running track value (0.25 miles).

Number\,of\,laps = \frac{Number\,of\,miles}{0.25}

the output is stored in the variable.

After that, print the value on the screen with 2 digits after the decimal point.

we can use "%.2f" in the printing function in java.

like System.out.printf("%.2f", output);

5 0
3 years ago
Read 2 more answers
The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to
Step2247 [10]

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

8 0
3 years ago
Other questions:
  • Suppose you have a certain amount of money in a savings account that earns compound monthly interest, and you want to calculate
    10·2 answers
  • Why we can't install a 64 bit software on a 32 bit computer??
    5·1 answer
  • Select the correct answer.
    15·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    9·1 answer
  • After reviewing the various types of network connections available, a client chooses a network connection that is considered to
    13·1 answer
  • What argument for "the seen" suggested that breaking windows is a good thing?
    11·1 answer
  • What techniques are required to accept
    12·1 answer
  • How to do the for loop in python
    12·1 answer
  • I need someone to help me paraphrase and make it in there own words? I struggle with this. This is the sentence
    10·1 answer
  • A manager suspects that one of his team members has been fraudulently accessing confidential and sensitive information and breac
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!