1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KatRina [158]
3 years ago
12

Which class members should be declared as public?

Computers and Technology
1 answer:
yawa3891 [41]3 years ago
6 0

Answer:

B. Methods and occasionally final attributes

Explanation:

In Computer programming, class members can be defined as the members of a class that typically represents or indicates the behavior and data contained in a class.

Basically, the members of a class are declared in a class, as well as all classes in its inheritance hierarchy except for destructors and constructors.

In a class, member variables are mainly known as its attributes while its member function are seldomly referred to as its methods or behaviors.

One of the main benefits and importance of using classes is that classes helps to protect and safely guard their member variables and methods by controlling access from other objects.

Therefore, the class members which should be declared as public are methods and occasionally final attributes because a public access modifier can be accessed from anywhere such as within the current or external assembly, as there are no restrictions on its access.

You might be interested in
Write a short essay on the importance of information and communication technology (ICT) in the AFN industry. Add suitable exampl
AURORKA [14]

Answer:

computer

Explanation:

is an ICT device that help and makes things or work easy

6 0
3 years ago
Myles is studying a system to lessen the number of complaints about the Help Desk. He has formally studied the service counter a
olga55 [171]

Answer: Informal bench-marking

Explanation:

Informal bench-marking is defined as unconscious comparison of one's own behavior, skills, values etc with other and learning from them to improve. This leaning can be found in work-place, home, school etc.

  • According to the question, Myles is using informal bench-marking through studying other stores complaint handling style and reduction technique so that he can learn from it.
  • Other options are incorrect because designing analysis,outcome analysis, issue analysis and processing of complaining ta re not the comparison that unconsciously done by person .
  • Thus, the correct option is informal bench- marking.
4 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
PLEASE HELP I FAILED TWICE AND HAVE ONLY ONE MORE TRY BEFORE MY GRADE ARE SET I AM CRYINGGGGG PLEASEEE IM BEGGINGGGGG
anyanavicka [17]

1. C

2. B

3. C

4. A

5. A

6. B

7. C

8. D

9. C

10. B

11. D

12. D

13. D

14. A

15. A

16. B

17. A

18. B

19. D

20. B


Some of the ones towards the start may not be right but I gave it a go :)





8 0
3 years ago
Technician A says that a lead acid battery uses straight Hydrochloric acid for electrolyte. Technician B says that a lead acid b
konstantin123 [22]

Technician B is correct

It is safe to say that Lead acid uses sulfuric acid. When fully charged, the electrolyte consist of 40% concentrated sulfuric acid and the remainder consist of mostly water. However, as it discharges, both the positive and the negative plates turn into lead sulfate with the electrolyte loosing much of its dissolved sulfuric acid and water.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Brainliest to whoever can guess what year this corvette logo is from. Make your guesses
    11·1 answer
  • What is required to control access to the file system using file and folder permissions on a windows based computer?
    8·1 answer
  • The __________ tag is used to create a forced line break without starting a new paragraph.
    13·1 answer
  • Which value can be entered to cause the following code segment to display the message: "That number is acceptable." int number;
    11·1 answer
  • What is the FaFASA4caster used for
    10·1 answer
  • Please explain this code line by line and how the values of each variable changes as you go down the code.
    8·1 answer
  • Under the Home tab, controls for aligning text and objects can be found in the
    5·2 answers
  • How do you make a minecraft server. just the basics please. I only need ine for me and my friends.
    7·2 answers
  • Match the following pls help
    5·1 answer
  • 4. When working at the CLI in Linux, you specify the exact location of a file, which is the ____________________ to it, by begin
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!