1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ronch [10]
2 years ago
11

All objects have access to the methods of the ____________ class.

Computers and Technology
1 answer:
ArbitrLikvidat [17]2 years ago
5 0

Answer:

Super Class.

Explanation:

The objects in the sub class or the child class have access to the super class or base class.

for example:-

class vehicle{

public int color;

public int numtyres;

public void type()

{

if(numtyres==2)

{

system.out.println("Two wheeler");

}

else if(numtyres==3)

{

system.out.println("Three wheeler");

}

else

system.out.println("four wheeler");

}

}

class motorvehicle extends vehicle{

public int gears;

public int eng_cap_cc;

}

In the above written classes class motorvehicle has access to the method type of the class vehicle and vehicle is the superclass of motorvehicle.

You might be interested in
Universal Containers is creating a custom Visualforce page to allow users to edit contact records. The developer has used an ape
Gre4nikov [31]

Answer:

field will be automatically taken off the page for the user

Explanation:

When designing a custom VisualForce page the piece of code mentioned "apex: outputField" is used to determine what and how information is displayed to a certain user. This being said if the user does not have field-level security access and tries to enter the VisualForce page then the field will be automatically taken off the page for the user, and they will not be able to view it.

If you have any more questions feel free to ask away at Brainly.

7 0
3 years ago
What important advice to include about spyware, viruses and other types of malware
S_A_V [24]

Answer:

You should probably include the fact that most of these things will disguise themselves as fake downloads and that will most of the time claim to allow you to download something that costs money for free.

Explanation:

thats all i could come up with

5 0
2 years ago
Read 2 more answers
History of computer from difference engine <br>​
harkovskaia [24]

Answer:

Charles Babbage (1791-1871), computer pioneer, designed two classes of engine, Difference Engines, and Analytical Engines. Difference engines are so called because of the mathematical principle on which they are based, namely, the method of finite differences.

Explanation:

4 0
2 years ago
Read 2 more answers
A constructor can be overloaded with more than one function which has the same name but with what two different things
andreyandreev [35.5K]
<h2>Answer:</h2>

i. Number of parameters

ii. Type of parameters

<h2>Explanation:</h2>

When there are two or more constructors, definitely with the same name, in a given class, then the constructors are said to be overloaded. An overloaded constructor appears declared many times in a class but each time with different number of parameters and/or type of parameters.

For example, given a class Test, the following combination of constructors can exist;

i. public Test(int x){

   

 }

ii. public Test(String m){

     

  }

iii. public Test(int a, String b){

 

}

<em>The following should be noted;</em>

In the case of combination (i) and (ii), the constructors have the same number of parameters but different type of parameter. In other words, they both have 1 parameter but while the first one has a parameter type of <em>int</em>, the second has a parameter type of <em>String</em>.

In the case of combination (ii) and (iii), the constructors have different number of parameters and of course different type of parameters. In other words, the second constructor has 1 parameter of type <em>String</em> while the third constructor has 2 parameters of types <em>int</em> and <em>String</em>.

5 0
3 years ago
IT professionals should help to protect users’ personal information, such as bank account information or Social Security numbers
sesenic [268]

To prevent theft of account information, identity theft, money, important passwords, and personal information.


Hope it helps ❤️

8 0
3 years ago
Read 2 more answers
Other questions:
  • Into which of these files would you paste copied information to create an integrated document? A. Mailing list B. Source C. Data
    13·2 answers
  • The page orientation in which the page width is greater than the page height is called
    8·1 answer
  • What is the term for the part of a browser responsible for reading and processing programming languages?
    10·1 answer
  • Read the following scenario:
    7·2 answers
  • What in the world is this for and how do you use it
    8·2 answers
  • What is inputted into a computer system?
    7·1 answer
  • How many passes will it take to find the five in this list?
    14·2 answers
  • Because all the IEEE WLAN features are isolated in the PHY and ____________ layers, practically any LAN application will run on
    11·1 answer
  • 2.4 Code Practice: Question 2
    5·1 answer
  • During a user’s onboarding process, many designers focus on a gradual release of information. This process is called what?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!