answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ahat [919]
2 years ago
14

A. When executing System.out.println(a1), the toString() method in the Object class is invoked.

Computers and Technology
1 answer:
Zina [86]2 years ago
6 0

This question is incomplete, it lacks a piece of code to analyze.

I think you wanted an answer to the following question:

Analyze the following code:

public class Test {

   public static void main(String[] args) {

       Object a1 = new A();

       Object a2 = new Object();

       System.out.println(a1);

       System.out.println(a2);

   }

}

class A {

   int x;

   @Override

   public String toString() {

       return "A's x is " + x;

   }

}

A. When executing System.out.println(a1), the toString() method in the Object class is invoked.

B. When executing System.out.println(a2), the toString() method in the Object class is invoked

C. When executing System.out.println(a1), the toString() method in the A class is invoked.

D. The program cannot be compiled, because System.out.println(a1) is wrong and it should be replaced by System.out.println(a1.toString())

E. Both B and C.

Answer:

E. Both B and C.

Explanation:

<em>toString()</em> method is used to get the representation of this object as a string. When trying to display a string representation of an object usually the full name of the class will be displayed.

In the example above, line

<em>System.out.println(a2);</em>

would display something like

<em>[email protected]</em>

Obtained value can hardly serve as a good string description of an object. Therefore, <em>toString()</em> method is often overridden using <em>@Override</em> annotation (more info about <em>@Override</em> at https://beginnersbook.com/2014/07/override-annotation-in-java/)

Line  

<em>System.out.println(a1);</em>

would display <em>"A's x is 0" </em>because it uses <em>toString()</em> method overridden in class <em>A</em>.

You might be interested in
Gaven's instructor told him to include a personal statement in his work portfolio. Why did his instructor recommend including a
algol [13]
The recommendation of the instructor for Gaven to include a personal statement in his work portfolio will allow him to identify his career goals. If he is unable to show this to his work portfolio then he may simply state it in the personal statement. Thus, the answer to this item is letter A. 
3 0
2 years ago
Which two statements are true regarding online professional identity?
DerKrebs [107]

Answer:

Posts on FB can affect a person's professional identity.

Employers will expect to view your job history if you have a profile on Linkedin.

Explanation:

6 0
2 years ago
Without using any additional variables, and without changing the values of ndays or the elements of the parkingTickets array, wr
dusya [7]

Answer:

Explanation:

mostTickets=0;

for (k=0; k< ndays; k++){

if (parkingTickets[k]>mostTickets) mostTickets=parkingTickets[k];

}

7 0
2 years ago
While rendering the homepage of a website, it takes a lot of time due to the thread being blocked in processing JS/CSS. What are
jekas [21]

Answer:

a) Pick ONE OR MORE options Using code-splitting for JS files.

b) Compressing the JS files on the server-side

Explanation:

Javascript is a multi-purpose programming language, it is used in web development as a scripting language for programming the interactiveness of the web application.

Loading and running the script from the server can take a lot of time, so, the file is compressed and split for faster loading.

6 0
2 years ago
The Company management has asked that you compare the OSSTMM and the PTES to determine which methodology to select for internal
Sonbull [250]

Answer:

The basic comaprism of OSSTMN and PTES includes the following: OSSTMN is more theoretical, security assessment methodology, and Metrics based why PTES is technology oriented, penetration testing methodology ,  extended analysis of all stages

Explanation:

Solution

Penetration testing has several methodologies which include :OSSTMM and PTES  

The comparison between OSSTMM and PTES is stated as follows:

OSSTMM:                                                

Security assessment methodology

More Theoretical  

Metrics based

PTES :

Technology oriented

Penetration testing methodology

Extended analysis of all stages

Now,

There are 7 stages which is used to define PTES for penetration testing.(Penetration Testing Execution Standard)

  • Pre-engagement Interactions
  • Intelligence Gathering
  • Threat Modeling
  • Vulnerability Analysis
  • Exploitation
  • Post Exploitation
  • Reporting

Now,

The OSSTMM is used to obtain security metrics and performing penetration testing .The OSSTMM provides transparency to those who have inadequate security policies and configurations.

The OSSTMM includes the entire risk assessment process starting from requirement analysis to report creation.

Six areas are covered by OSSTMM which are:

  • Information security
  • Process security
  • Internet technology security
  • Communications security
  • Wireless security
  • Physical security
7 0
2 years ago
Other questions:
  • Which table style option is useful to display aggregated data when it is checked? total row filter button last column header row
    8·1 answer
  • The main problem with radio transmission is which of the following? Select one: a. Radio waves cannot travel through walls. b. W
    9·2 answers
  • Prove that f(n) = 20n3 + 10nlogn + 5 is O(n3)
    12·1 answer
  • Describe a situation involving making a copy of a computer program or an entertainment file of some sort for which you think it
    7·1 answer
  • Array A is not a heap. Clearly explain why does above tree not a heap? b) Using build heap procedure discussed in the class, con
    15·1 answer
  • You are working on a documentation file userNotes.txt with some members of your software development team. Just before the file
    12·1 answer
  • Assume that the variables v, w, x, y, and z are stored in memory locations 200, 201, 202, 203, and 204, respectively.
    6·1 answer
  • It is also called teleconferencing or web conferencing,which is an online meeting wherein two or more people can see,hear,and ta
    14·1 answer
  • Explain the emerging trends in microcomputer technology in relation to size​
    11·1 answer
  • I have a variable and set it equal to 5. 1 then send it as an argument to a function that adds 5 to the variable passed in. Outs
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!