1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ronch [10]
3 years ago
11

All objects have access to the methods of the ____________ class.

Computers and Technology
1 answer:
ArbitrLikvidat [17]3 years ago
5 0

Answer:

Super Class.

Explanation:

The objects in the sub class or the child class have access to the super class or base class.

for example:-

class vehicle{

public int color;

public int numtyres;

public void type()

{

if(numtyres==2)

{

system.out.println("Two wheeler");

}

else if(numtyres==3)

{

system.out.println("Three wheeler");

}

else

system.out.println("four wheeler");

}

}

class motorvehicle extends vehicle{

public int gears;

public int eng_cap_cc;

}

In the above written classes class motorvehicle has access to the method type of the class vehicle and vehicle is the superclass of motorvehicle.

You might be interested in
What does an SQL injection do
Afina-wow [57]

Answer:

SQL injection is a form of hacking that uses user input fields.

Explanation:

SQL injection is when a piece of code or entire algorithm is input where a program prompts for user input. They can be used to change or access data. To prevent this, a programmer should scrub inputs. Scrubbing data removes slashes and arrows, which or commonly used in code.

3 0
3 years ago
Read 2 more answers
Mason is part of a project team that is creating a television advertisement. List one risk the team faces and a strategy for min
Andru [333]

One risk might be that they might use copyright music and and the music creator might take legal action.

5 0
4 years ago
In Full Screen Reading View, which area is reduced?
REY [17]

Go to options .

  • Suppose you are reading a document .
  • You want to read in full screen .
  • Hence the Go-to bar will be reduced .
6 0
3 years ago
Which of the following is not true of hardware VPNs?A) should be the first choice for fast-growing networks.B) can handle more t
vfiekz [6]

Answer:

C) have more security vulnerabilities than software

Explanation:

Hardware VPN is a computer term that described a separate tool that serves the functions of a virtual private network. It has its own component and an internal processing unit.

However, some of the characteristics of Hardware VPN is the following:

1. It is expensive compared to software VPN

2. It is generally faster

3. It requires more than a beginner to handle

4. With an in-built firewall, it is generally more secure compared to a software VPN.

Hence, in this case, the correct answer is option C.

3 0
3 years ago
I need help with the rest also
dalvyx [7]

Answer:

??? blackkkkkkkkkkkkkkkkk

6 0
3 years ago
Other questions:
  • What is one problem you should keep in mind when researching information on the Internet?
    6·2 answers
  • Taking an online class doesn't require any special skills.
    13·2 answers
  • Select the correct text in the passage,
    10·1 answer
  • What is the purpose of OPPA<br>​
    13·1 answer
  • When searching for an image on your computer, you should look for a file with which of the following extensions?
    8·1 answer
  • Which of the following are examples of software? (Select all that apply)
    9·2 answers
  • Which statement describes Augmented Reality (AR) technology?
    12·1 answer
  • An analogue sensor has a bandwidth which extends from very low frequencies up to a maximum of 14.5 kHz. Using the Sampling Theor
    9·2 answers
  • Sdq1fdszgdSHTGafeges'
    15·1 answer
  • Discuss the concept of the “state of a process”. Give examples to illustrateyour answers?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!