1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
snow_lady [41]
4 years ago
10

A class car and its subclass bmw each have a method run(), which was written by the developer as part of the class definition. i

f carobj refers to an object of type bmw, what will carobj.run(); do? the run() method defined in bmw will be called. the compiler will complain that run() has been defined twice. the run() method defined in car will be called.
Computers and Technology
1 answer:
krok68 [10]4 years ago
5 0

The answer is : the run() method defined in BMW will be called.

run() BMW

You might be interested in
What happens if two functions are defined with the same name, even if they are in different arguments within the same .py files?
yan [13]

Answer:

Following are the code to this question:

def data(a):#defining method data that accepts parameter

   print (a)#print parameter value

def data(b):#defining method data that accepts parameter

   print (b)#print parameter value

x=input("enter value: ")#defining variable x that5 input value from user

print(data(x))#call method data

Output:

enter value: hello..

hello..

None

Explanation:

  • As the above code, it is clear defines that python doesn't support the method overloading because More than one method can't be specified in a python class with the same name and python method arguments have no type.
  • The single argument method may be named using an integer, a series, or a double value, that's why we can say that it is not allowed.
7 0
3 years ago
Computer designers have concentrated on technology using gallium arsenide instead of silicon because silicon:
cestrela7 [59]

Answer: cannot emit light and has speed limitations

Explanation:

Silicon is usually used in computer chips and solar cells but Gallium arsenide is regarded as a better alternative even though it's costly than silicon.

Gallium arsenide has technical advantages over silicon as its electrons

move through it faster than they move through silicon. Also, cannot emit light and has speed limitations.

Gallium arsenide is used in manufacturing devices like infrared light-emitting diodes, solar cells, optical windows, etc.

7 0
3 years ago
List & briefly explain 5 benefits of having a Business bank account.
oee [108]

Answer:  down there

Explanation:

Some other benefits come from establishing a business bank account. You can gain access to services that make life easier, such as merchant account and payroll services, free online banking and, importantly, easier access to small business loans.

3 0
3 years ago
Read 2 more answers
A serial schedule:
Lina20 [59]

Answer:

B)

Explanation:

Is alwayd sorted sequentially in aceding order by transaction ID

6 0
3 years ago
Which two actions allow the System Administrator to limit Chatter access during roll-out to a subset of Salesforce users?
Wewaii [24]

Answer:

a. Edit a Profile to "Enable Chatter" for the subset of users.

b. Create a Permission Set with the "Enable Chatter" permission for the subset of users

Explanation:

There are two ways to limit Chatter access during roll-out to a subset of Sales force users

  • through user profiles
  • through permission sets

"Enable Chatter" permission is added to the user profiles and permission sets during Chatter profile based roll-out.

a.

  • The system Administrator has to log in as Sales force administrator to perform this action.
  • Then select Profiles from Setup.
  • Click on Edit for the custom user profile.
  • Tick the Enable Chatter check box in the Administrative Permissions section.

b.

  • Search through the Permission Sets in Setup.
  • System section appears. Select System Permissions in that section.
  • Click on the Edit button .
  • Tick the Enable Chatter check box.
5 0
4 years ago
Other questions:
  • Which of the following statements about relays is correct? A. A relay is a type of rheostat. B. A normally closed relay closes a
    6·2 answers
  • Wired Equivalent Privacy (WEP) is an IEEE 802.11 wireless protocol which provides security algorithms for data confidentiality d
    14·1 answer
  • What is the process of getting as many people as possible to visit your website called? A. Maximizing keyword potential B. Direc
    9·2 answers
  • In the United States, everyone is guaranteed work true or false
    13·1 answer
  • What is the answer to in Microsoft Word you can access the blank from the command command from the mini toolbar what is the corr
    10·2 answers
  • What are the advantages to using a linked implementation as opposed to an array implementation?
    8·1 answer
  • Your task is to diagnose and correct the problem. In the computer, the top hard drive contains the operating system files. Troub
    14·1 answer
  • An anagram of a string is another string with the same characters in the same frequency, in any order. For example 'ab', 'bca, a
    5·1 answer
  • Joe a frequent visitor to a branch office attempts to connect his tablet to the office wireless network but is unable to connect
    14·1 answer
  • WNOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOW
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!