Answer:
a. Protected
b. Public
Explanation:
There are four acess modifier in Java.
Default: Acessible only within the same package.
Public: Can be acessed by any class.
Private: Acessible only within the class.
For example, you have a class employee and a private method. This method can only be accessed by an object that is an instance of an employee.
Protected: Used in classes that extend each other. For example, a class of employees would extend employee.
So:
a. A class Employee records the name, address, salary, and phone number.
The best acesses modifier is protected. A class may extended employee but have the same arguments(name, adress, salary, phone number), so it should also have acess to the method.
b. An adding method inside of a class BasicMath.
This method can be used in a variety of packages and projects and classes... and there is no important information regarding security. So the best method is public.
Answer:
import java.util.Scanner;
public class Main
{
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.println("Enter the number of bottles and cans:");
int numberOfbottles = in.nextInt();
int numberOfcans = in.nextInt();
System.out.printf("Bottles: %8d\n", numberOfbottles);
System.out.printf("Cans: %8d\n", numberOfcans);
}
}
Explanation:
Ask user to input the number of bottles and cans using Scanner class
Print the results so that the numbers to the right line up (Since we know that the numbers have at most 8 digits, we can use %8d in printf. Also, be aware that how printf statements are written so that the numbers line up)
Answer:
The five rules are described as follows:
Rule A permits the inbound Simple Mail Transfer Protocol (SMTP) connection.
Rule B permits the inbound Simple Mail Transfer Protocol (SMTP) connection.
Rule C permits the outbound Simple Mail Transfer Protocol (SMTP) connection.
Rule D permits the outbound Simple Mail Transfer Protocol (SMTP) connection.
Rule E does not perform any action. Thus it is when the action is denied.
Explanation:
Rule A allows information transfer of the incoming email from the external server to the internal remote server, thus this allows an inbound connection.
Rule B allows information transfer of the incoming email from the remote server to the external remote server, thus this allows an inbound connection.
Rule C allows information transfer of outgoing email from the external server to the internal remote server, thus this allows an outbound connection.
Rule D allows information transfer of the outgoing email from the remote server to the external remote server, thus this allows an outbound connection.
Rule E does not allow any action in either direction thus it is when action is denied.
Answer:
C++.
Explanation:
<em>Code snippet.</em>
#include <map>
#include <iterator>
cin<<N;
cout<<endl;
/////////////////////////////////////////////////
map<string, string> contacts;
string name, number;
for (int i = 0; i < N; i++) {
cin<<name;
cin<<number;
cout<<endl;
contacts.insert(pair<string, string> (name, number));
}
/////////////////////////////////////////////////////////////////////
map<string, string>::iterator it = contacts.begin();
while (it != contacts.end()) {
name= it->first;
number = it->second;
cout<<word<<" : "<< count<<endl;
it++;
}
/////////////////////////////////////////////////////////////////////////////////////////////////////////
I have used a C++ data structure or collection called Maps for the solution to the question.
Maps is part of STL in C++. It stores key value pairs as an element. And is perfect for the task at hand.