1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hichkok12 [17]
3 years ago
12

What is the output of the following code? public class Test { public static void main(String[] args) { new Person().printPerson(

); new Student().printPerson(); } } class Student extends Person { private String getInfo() { return "Student"; } } class Person { private String getInfo() { return "Person"; } public void printPerson() { System.out.println(getInfo()); } }
Computers and Technology
1 answer:
fredd [130]3 years ago
3 0

Answer:

The output of the given question is :

Person

Person

Explanation:

Following are the description of Statements

  • The new Person().printPerson(); calling the function of printPerson() of the class Person so it returns the Person in the console window.
  • The new Student().printPerson(); calling the function of printPerson() of the class student .The student inherits the class Person So control will moves to the class it executed the statement inside the Person class So it executed the function public void printPerson() of the Person class so it also returns the Person String and execution of program become stops
You might be interested in
Hey can you help we with this thanks
dimulka [17.4K]
Hey, it's easy, come on!
6 0
3 years ago
____ computers are used by large businesses, government agencies, and in science and education to provide centralized storage an
Charra [1.4K]

The answer to this question is the Mainframe Computer. Mainframe computers are used by large businesses, and government agencies because this computer can store large data and information. Mainframe basically known as a large cabinet because of its size and the frame stores the Central processing unit of the computer.  

3 0
4 years ago
You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attack
Strike441 [17]

Answer:

Intrusion Prevention System (IPS)

Explanation:

Firewall can be defined as a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Simply stated, a firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

A firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access.

Basically, it is a network security device or security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer

Thus, the tool you should use is an intrusion prevention system (IPS).

6 0
3 years ago
You view a portion of a document on the screen through a
Stells [14]

Answer:

Document window is through which we view the portion of a document.

Explanation:

We have many portions like tabs, ruler, ribbon, etc in word. There is one another feature called Document Window in word where it represents the actual view of a document in GUI (Graphical User Interface) operating system.

Here the actual contents of the page are created and the user can also insert various shapes based on the need.  Any feature in the tabs can be included in the document window. You can set the zoom size of the document according to the need.

6 0
3 years ago
In computer science, what does the word security mean?
zepelin [54]

Answer:

B

Explanation:

Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.[1]

4 0
3 years ago
Other questions:
  • The ListIterator interface
    13·1 answer
  • QUESTION 1 _____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through
    14·1 answer
  • g If a class named Student has a data member named gpa , and one of its member functions has a parameter also named gpa , how ca
    7·1 answer
  • I do not know what I am supposed to do someone help please.​
    7·1 answer
  • Francis has created a new program. However, Francis used some objects from another program to run methods in the current program
    14·2 answers
  • What output is produced by the following code? Integer first = new Integer(7); Integer second = first; if (first == second) Syst
    15·1 answer
  • For what reason can security risks never be fully eliminated?​
    7·1 answer
  • You need to implement a class that represents the state of a room or game section. The class will contain a room_id, a descripti
    15·1 answer
  • Which of these statements is true?
    9·1 answer
  • A _________ attack is an attack on a computer system or network that causes a loss of service to users.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!