1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
charle [14.2K]
3 years ago
12

Ben wants to create a Book class that has an instance variable serialNumber. Where should he declare the instance variable

Computers and Technology
1 answer:
MrMuchimi3 years ago
4 0

Answer:

within the Book class but needs to also be outside of any methods.

Explanation:

If Ben is creating an entire Book class then the instance variable needs to be within the Book class but needs to also be outside of any methods. If Ben places the variable inside a method it can only be used by that method and therefore becomes an instance variable of that method and not the class. By creating it inside the class and outside the methods it can be used every single time a Book object is created. Therefore, creating an instance variable of serialNumber every time.

You might be interested in
LAB: Plant information (ArrayList) Given a base Plant class and a derived Flower class, complete main() to create an ArrayList c
sashaice [31]

Answer:

LAB: Plant information (ArrayList) Given a base Plant class and a derived Flower class, complete main() to create an ArrayList called myGarden. The ArrayList should be able to store objects that belong to the Plant class or the Flower class. Create a method called printArrayList), that uses the printinfo methods defined in the respective classes and prints each element in

4 0
3 years ago
A home user reports to a network technician that the Internet is slow. The network administrator discovers that multiple unknown
BabaBlast [244]

Answer:

Option (A) A successful WPS attack has occurred

Explanation:

  • WPS stands for Wi-Fi Protected Setup.
  • Its a network security protocol in the Wi-Fi which has a vulnerability.
  • The connection to the Wi-Fi can be established through the router in four ways. They are
  • (a) PIN method
  • (b) Push button method
  • (c) Near field communication method
  • (d) USB Method.
  • Out of all the modes to be connected to the network, the PIN method has a flaw in it.
  • In this PIN method, an attacker can brute force the PIN (guessing the PIN by some techniques) and gain unauthorized access to the network.
  • In the given case in the question, the network administrator finds that multiple unauthorized devices has gained access to the network.
  • Option (A) is correct.
  • Option (B) ARP Poisoning, (C) botnet and (D) Evil Twin attack are different and so are the wrong options.  
3 0
3 years ago
Read 2 more answers
Fifty part-time students were asked how many courses they were taking this term. The (incomplete) results are shown below. Need
Ne4ueva [31]

Answer:

The answer for B is 10% and for C is 40%.

Explanation:

To get the percentage for B you take the the frequecy of students taking 2 courses (5) and multiply it by 100 then you divide it by whole number of students.

For C you do the after adding the number of students taking 1 or 2 courses (20).

5 0
3 years ago
What is the term for the era created by the digital revolution?<br>​
puteri [66]

Answer:

The Digital Revolution also marks the beginning of the Information Era. The Digital Revolution is sometimes also called the Third Industrial Revolution.

Explanation:

Hope this Helps.

5 0
3 years ago
A derived class is a class that inherits data members and functions from a ____ class.
mezya [45]
The answer is superclass
6 0
3 years ago
Other questions:
  • You can choose which rules you want excel to use by enabling and disabling them in the ____ area in the excel options dialog box
    11·1 answer
  • I only want someones opinion on this not anything you would find in a book.
    7·1 answer
  • Which describes which CTSO each student should join?]
    7·1 answer
  • The 7-bit ASCII code for the character ‘&amp;’ is: 0100110 An odd parity check bit is now added to this code so 8 bits are trans
    12·1 answer
  • What does the -pwd switch do? how can you make dsadd bring up a prompt asking for the users password?
    10·1 answer
  • What is the meaning of url <br>​
    7·1 answer
  • Aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
    6·1 answer
  • In the year, , the American Department of Defense put a military research network, called ARPANET online.
    5·1 answer
  • The owner creator of a folder/file object has complete access to the object even when no user or group is assigned any access to
    8·1 answer
  • How to check the at&amp;t internet speed on my computer
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!