answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zzz [600]
2 years ago
14

Suppose that a class named ClassA contains a private nonstatic integer named b, a public nonstatic integer named c, and a public

static integer named d. Which of the following are legal statements in a class named ClassB that has instantiated an object as ClassA obA =new ClassA();?
a. obA.b 12;
b. obA.c 5;
c. obA.d 23;
d. ClassA.b=23;
e. ClassA.c= 33;
f. ClassA.d= 99;
Computers and Technology
1 answer:
Rus_ich [418]2 years ago
6 0

Answer:

b. obA.c 5;

d. ClassA.b=23;

f. ClassA.d = 99;

Explanation:

Java is a programming language for object oriented programs. It is high level programming language developed by Sun Microsystems. Java is used to create applications that can run on single computer. Static variable act as global variable in Java and can be shared among all objects. The non static variable is specific to instance object in which it is created.

You might be interested in
Which of these is an on-site metric for social media marketing?
love history [14]
The answer to you question is C
3 0
2 years ago
Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log o
Leona [35]

Answer:

b. Enable Secret

Explanation:  Enable secret command is used to enable a secret password for a particular privilege level. It encrypts the desired password for entering the privileged executive mode of a router or switch. This encryption restrains the password from being saved in clear text format in configuration file contrary to enable password which is stored in plain text. Enable secret defines additional layer of security over the  enable password. It is based on MD5 hash algorithm. If both enable secret and enable password commands are configured, then enable secret outranks and overrides the enable password. Internetwork Operating System will only acknowledge the password as configured in the enable secret command. When you set a password using enable secret command, a password set using the enable password  command only works if enable secret is disabled or you are using older version of Cisco IOS software.

5 0
2 years ago
Splunk uses ________ to categorize the type of data being indexed..
timama [110]
<span>Splunk is the system process that handles indexing, searching, forwarding and the web interface for Splunk Enterprise.</span>
Splunk uses sourcetypes to categorize the type of data being indexed.
Splunk supports the Common Information Model (CIM). 
7 0
2 years ago
Read 2 more answers
ArgumentException is an existing class that derives from Exception; you use it when one or more of a method’s arguments do not f
dybincka [34]

Answer:

The C# code is given below

Explanation:

using System;

public class SwimmingWaterTemperatur

{

public static void Main()

{

while(true){

Console.Write("\nPlease enter the water temperature : ");

int x = Int32.Parse (Console.ReadLine());

try{

if(CheckComfort(x)){

Console.Write(x+" degrees is comfortable for swimming.");

}else{

Console.Write(x+" degrees is not comfortable for swimming.");

}

}catch(Exception ex){

Console.WriteLine(ex);

}

}

}

public static Boolean CheckComfort(int temp){

if(temp>=70 && temp<=85){

return true;

}else if(temp>=32 && temp<=212){

return false;

}else{

throw new ArgumentException("Value does not fall within the exptected range.");

}

}

}

7 0
2 years ago
You have an on-premises network that contains several servers. You plan to migrate all the servers to Azure. You need to recomme
Ainat [17]

Answer:

A). Fault tolerance

Explanation:

The Microsoft Azure is described as the cloud computing service that is known for its flexibility, cost-effectiveness, and quick and easy compliance to fulfill the company's requirements.

As per the question, in order to ensure that 'some servers are available in case of a single Azure data center going offline for an increased time period', the recommendation must include the 'fault tolerance' ability of Azure services. Azure infrastructure has the ability to immediately react in case of a failure to restore the servers and its services. In case of hardware failure, crashing of hard-disks, or short-term availability problems with servers, Azure predicts and manages such failures effectively. Thus, <u>option A</u> is the correct answer.

7 0
2 years ago
Other questions:
  • Represent decimal number 8620 in (a) BCD, (b) excess-3 code, (c)2421 code, and (d) as a binary number
    7·1 answer
  • Problem statement: Using loop, write a program that will ask the user to enter a character for left or right. Then, the user wil
    13·1 answer
  • One reason for using social media is to develop social and professional contacts. True or false?
    9·2 answers
  • In cell e5, create a formula using the vlookup function to determine the dog type for teen anna morante based on the program cod
    13·2 answers
  • Choose all items that represent characteristics of a work samples.
    8·2 answers
  • Select the correct answer. Rachel needs to make a presentation on ethics and etiquettes in college. She has about 30 minutes to
    13·1 answer
  • Which of the following describes ETL? a) A process that transforms information using a common set of enterprise definitions b) A
    14·1 answer
  • You decide to buy some stocks for a certain price and then sell them at anotherprice. Write a program that determines whether or
    11·1 answer
  • Martha has been appointed as the Data Security Manager of her organization. The company wants her to develop a customized app to
    13·1 answer
  • Ali has created a small program in Python, but he wants to store his data in a multi-dimensional array. He would like to use adv
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!