The keyword __________ is required to declare a class.
a. public
b. private
c. class
d. all of the above

Answers

Answer 1
Answer is b-private
Answer 2

Answer:  b. private

Explanation:


Related Questions

The structure theorem states that it is possible to write any computer program using only ________ basic control structures

Answers

Answer:

three

Explanation:

Structured programming is based on three control structures: sequence, selection, and repetition. The structure theorem states that any program can be written using only three control structures.

In an advertisement, a speed specification, such as 2.66 ghz, indicates the speed of the microprocessor?

Answers

Answer:

yes / true

Explanation:

it is one of the factors in determining the speed of the microprocessor

In an advertisement, a speed specification, such as 2.66 Ghz, indicates the speed of the microprocessor, this statement is true.

What is Microprocessor?  

Microprocessors are a kind of small electronic devices that have the arithmetic, logic, and control circuitry required to carry out the tasks of a central processing unit in a digital computer.

Based on the instructions kept in the memory, a microprocessor accepts binary data as input, processes it, and then outputs the results. The microprocessor's ALU (arithmetical and logical unit), control unit, and register array are used to process the data.

Through a collection of registers that serve as temporary fast-access memory locations, the register array processes the data. The control unit regulates how data and instructions move through the system.

Hence, In an advertisement, a speed specification, such as 2.66 Ghz, indicates the speed of the microprocessor

To know more about Microprocessor follow the link.

https://brainly.com/question/14708869

#SPJ5

A(n) _______ is a printout of your presentation with anywhere from one to nine slides per page and with areas for taking notes.

Answers

Answer:

piece of paper with certain words and symbols

Explanation:

Placing a(n)____ to a folder on a start menu or on the desktop can make it easier to locate and open the folder.

Answers

Placing shortcut  to a folder on a start menu or on the desktop can make it easier to locate and open the folder.

What are shortcuts on the desktop?

The shortcuts on the desktop serves as the tolls that help in the location of files as well as other documents and function on the desktop which help in time management when working on the computer.

It should be noted that Placing shortcut  to a folder on a start menu or on the desktop can make it easier to locate and open the folder.

Learn more about desktop on:

https://brainly.com/question/24735155

#SPJ1

A user wants to adjust the number of horizontal and vertical pixels displayed on a monitor screen. What display setting will the user adjust?

Answers

A user need to adjust the number of horizontal and vertical pixels displayed on a monitor screen and it is known as Resolution.

What is computer Resolution?

Resolution is known to be a term that connote the image quality that is known to be made or produced by what we call the printer or what is shown on a monitor.

Note that With the use of the monitors, the resolution is known to be one that is often measured by the number of pixels that is said to be  horizontal by the pixels that is standing  vertically.

An example, of the  Resolution  is 1024 × 768 pixels. Therefore, A user need to adjust the number of horizontal and vertical pixels displayed on a monitor screen and it is known as Resolution.

Learn more about pixels from

https://brainly.com/question/9017156

#SPJ1

How ICT has helped education to grow through progression?

Answers

Answer:

Hey there!

Explanation:

This is ur answer...

ICTs can enhance the quality of education in several ways: by increasing learner motivation and engagement, by facilitating the acquisition of basic skills, and by enhancing teacher training. ICTs are also transformational tools which, when used appropriately, can promote the shift to a learner-centered environment.

Hope it helps!

Brainliest pls!

Have a good day!^^

Silicone rubber and urethane caulks generally give the ____________ overall performance for exterior building envelope applications.

Answers

Silicone rubber and urethane caulks generally give the best overall performance for exterior building envelope applications.

What is silicone rubber made from?

Silicone rubber is known to be a kind of an elastomer that is said to be made up of silicone that has silicon along with carbon, hydrogen, and oxygen.

Note that  Silicone is said to be a form of an inorganic substance, while polyurethane is said to be organic in nature.

The use of thus Silicone rubber and urethane is therefore very essential to building construction.

Hence, based on the above, Silicone rubber and urethane caulks generally give the best overall performance for exterior building envelope applications and this is a true statement.

Learn more about Silicone rubber from

https://brainly.com/question/18902047

#SPJ1

in makecode arcade, which part of the interface can be used to answer questions about how a block functions?

Answers

in make code arcade, The Advanced section is the part of the interface can be used to answer questions about how a block functions.

What is the function about?

In Blocks, Functions is known to be the element that one can find under the Advanced section.

Note that in finding functions in block, student can be be introduced to Simple functions.

Hence, in make code arcade, The Advanced section is the part of the interface can be used to answer questions about how a block functions.

Learn more about block functions from

https://brainly.com/question/17043948

#SPJ1

Answer:

The right side panel

Explanation:

On the right side panel you can see the various functions of specific block functions in MakeCode Arcade.

Typically a personal computer uses a(n) ________ to store the operating system and software applications. group of answer choices flash drive external hard disk optical drive internal hard disk

Answers

Typically a personal computer uses a(n) internal disk to store the operating system and software applications.

What is internal disk?

This is known to be a kind of  tape, disk, optical that tends to drive or that is seen inside the case of any given desktop or laptop computer.

Note that An internal drive is one that gets its power from the central  power supply and the other types of storage devices are:

RAM: Random Access Memory. ROM: Read-Only Memory. Magnetic Storage Devices.

Therefore, Typically a personal computer uses a(n) internal disk to store the operating system and software applications.

Learn more about personal computer from

https://brainly.com/question/4945544

#SPJ1

explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”

Answers

It means that there are people  who understand binary and those that do not understand it. That is, binary is said to be the way that computers are known to express numbers.

What is the joke about?

This is known to be a popular  joke that is often  used by people who are known to be great savvy in the field of mathematics.

The joke is known to be one that makes the point that a person is implying that the phrase is about those who only understands the decimal system, and thus relies on numbers in groups of 10.

The binary system is one that relies on numbers that are known to be  in groups of 2.

Therefore, If the speaker of the above phrase is one who is able to understand binary, that person  would  be able to say that that the phrase  is correctly written as  "there are 2 types of people that understand binary".

Learn more about binary from

https://brainly.com/question/21475482

#SPJ1

In the past, mobile applications were typically not as full-featured as their non-mobile counterparts because of the limitations of?

Answers

Mobile applications were typically not as full-featured as their non-mobile counterparts because of the limitations of memory and screen size.

What is mobile application?

A mobile app is known to be a kind of a software application that was made specifically for its use in terms of  small, wireless computing machines.

It includes, smartphones and tablets, instead of desktop or laptop computers.

Note that Mobile applications were typically not as full-featured as their non-mobile counterparts because of the limitations of memory and screen size as this was said to be a major setback for it.

Learn more about mobile applications from

https://brainly.com/question/917245

#SPJ1

See full question below

In the past, mobile applications were typically not as full-featured as their non-mobile counterparts because of the limitations of

Select one:

a. memory and screen size.

b. screen size and keyboard functionality.

c. processing speed and graphics capabilities.

d. storage capacity and processing speed.

What two documents describe the purpose of the optask link?

Answers

The two documents describe the purpose of the optask link are:

MTAMTN

What is responsible for promulgating the Optask link message?

The agency that is known to be assigned the role to promulgate the OPTASK LINK is known to be MTA which is said to be the physical configuration.

The MTA is known to be one that contains the physical configuration, functional organization, and also all of the operational methods used in the set up , establishment, changes, and operation of Multi-TDL Networks. The MTA is said to be the physical linkages and equipment of the MTN.

Hence, the two documents describe the purpose of the optask link are:

The MTAThe MTN

Learn more about MTA  from

https://brainly.com/question/24131225

#SPJ1

explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”

Answers

It means that there are people  who understand binary and those that do not understand it. That is, binary is said to be the way that computers are known to express numbers.

What is the joke about?

This is known to be a popular  joke that is often  used by people who are known to be great savvy in the field of mathematics.

The joke is known to be one that makes the point that a person is implying that the phrase is about those who only understands the decimal system, and thus relies on numbers in groups of 10.

The binary system is one that relies on numbers that are known to be  in groups of 2.

Therefore, If the speaker of the above phrase is one who is able to understand binary, that person  would  be able to say that that the phrase  is correctly written as  "there are 2 types of people that understand binary".

Learn more about binary from

https://brainly.com/question/21475482

#SPJ1

Microsoft recommends when that you create passwords with upper and lowercase letters, numbers, symbols, and use at least ________ characters.

Answers

Answer: 8 characters

Explanation:

Answer:

10 characters

Explanation:

Array bounds checking should be directly coded into a system rather than assumed.

a. True
b. False

Answers

Answer:

True

Explanation:

One cannot assume an array bounds, it has to be specific

which things computer case contains

Answers

Inside the case are the components that make up the computer itself, such as the RAM memories, the processor and the hard disk, all of which are directly or indirectly connected to the motherboard. In addition, the case allocates the power suplly, which is responsible for supplying power to the computer.

What is a computer case?

The case is the hardware component used to house most parts of a computer. It is inside it that components such as CPU, motherboard, SSD, video card and power supply are placed.

In addition, it is where the outputs for connections to other equipment are found, such as USB and HDMI outputs, plug for sound box and microphone and input for memory card.

The case has the important function of protecting the internal components of a computer from knocks, heat, light, moisture and dust. That's because most of the electronic components inside a computer are very sensitive and need this protection.

It is also used to connect to other hardware components, such as a monitor, keyboard, mouse and headset, through the various outputs provided on its exterior.

See more about computing at: brainly.com/question/15707178

#SPJ1

When a cryptogrpahic system is used to protect data confientiality what takes place?

Answers

Answer:

Unauthorized users are prevented from viewing or accessing the resource

Brian would like to limit the ability of users inside his organization to provision expensive cloud server instances without permission. What type of control would best help him achieve this goal

Answers

Resource policy is what Brian would use to limit the ability of users inside his organization to provision expensive cloud server instances without permission.

What is the resource policy?

The resource policy can be defined to be the system that is able to create the rule that is based on the specific resources and the actions that a particular feature would have. The resource is going to be accessible by a particular system. The resource can be defined as a server that may allow or refuse the performance of a particular function.

Hence we can conclude that the Resource policy is what Brian would use to limit the ability of users inside his organization to provision expensive cloud server instances without permission.

Read more on resource here: https://brainly.com/question/3752408

#SPJ1

You have recently joined in an academic programme to learn more about

programming. You have learnt a few programmes. Your teacher has now given you a

number of tasks to complete.


a) Explain the concept of an algorithm and describe common algorithmic

techniques and solutions.

b)Create a flowchart from the following algorithm.

Step 1: Input VALUE1, VALUE2

Step 2: if (VALUE1 > VALUE2) then

MAX VALUE1

else

MAX VALUE2

endif

Step 3: Print “The largest value is”, MAX

Answers

The concept of an algorithm simply refers to the procedure that is used in problem-solving.

The description of the common algorithmic techniques and solutions are:

Brute-force or exhaustive search.Divide and Conquer.Greedy Algorithms.Dynamic Programming.Branch and Bound Algorithm.Randomized Algorithm.Backtracking.

The sample flowchart:

START

Input

VALUE1,VALUE2

is

VALUE1>VALUE2

If yes

MAX  VALUE1

If no

MAX  VALUE2

Print

“The largest value is”, MAX

STOP

Read more about flowcharts here:

https://brainly.com/question/6532130

#SPJ1

When referencing a substring such as str1[m:n] if m >= n then the value will be?

Answers

Answer: '' (An empty string)

Explanation:

Normally, when we are getting a substring, we will start from the character at index m and go until, but exclude the character at index n.

If m is greater than n, then we cannot get any substring as we would have to go backwards when we need to go forwards. If m=n, then we still cannot get any characters as we have to exclude the character at index n, making us have to exclude the character at index m as well.

Hence, for both situations the value would be an empty string, or a string with length 0.

Similar to Wi-Fi, ____ is designed to provide Internet access to fixed locations (sometimes called hotzones), but the coverage is significantly larger.

Answers

Similar to Wi-Fi, WiMAX is designed to provide Internet access to fixed locations (sometimes called hotzones), but the coverage is significantly larger.

What is WiMAX used for?

WiMax is know to be a full worldwide interoperability that is said to be made just for microwave access and this is said to be a form of a communication technology that was set up for wireless delivering of  high-speed Internet service to a lot of geographical areas.

Wi-Fi is also known to be a kind of a wireless technology that is often used to link up computers, tablets, and other devices to that of the internet.

Note that Wi-Fi is said to be a radio signal transmitted from a wireless router  and as such, Similar to Wi-Fi, WiMAX is designed to provide Internet access to fixed locations (sometimes called hotzones), but the coverage is significantly larger.

Learn more about Wi-Fi from

https://brainly.com/question/13267315

#SPJ1

Ricky unplugs his amazon alexa smart speaker when he is not using it. he's trying to limit unnecessary _____.

Answers

Ricky unplugs his amazon alexa smart speaker when he is not using it. he's trying to limit unnecessary data collection.

What are data collections?

Data collection is the process of gathering and measuring information on variables of interest, in an established systematic fashion that enables one to answer stated research questions, test hypotheses, and evaluate outcomes.

Data may be grouped into four main types based on methods for collection: observational, experimental, simulation, and derived.

See more about data collection at brainly.com/question/20389933

#SPJ1

During which phase of system development would you acquire any necessary hardware and software?

Answers

During the design phase of system development, you would acquire all the necessary hardware and software.

What is SDLC?

SDLC is an abbreviation for system development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality systems.

In Computer technology, there are seven (7) phases involved in the development of a system and these include the following;

PlanningAnalysisDesignDevelopment (coding)TestingDeploymentMaintenance

Also, phased implementation simply refers to an implementation methodology in which smaller portions of functionality of a system are typically implemented one at a time (one after the other).

In conclusion, we can infer and logically deduce that you would acquire all the necessary hardware and software during the design phase of system development.

Read more on phases here: brainly.com/question/7112675

#SPJ1

Ethernet provides... Group of answer choices no error detection or correction error detection and correction via CRC check error detection via CRC check error detection and correction via parity checks

Answers

Ethernet provides:

check error detection via CRC check error detection and correction via parity checksWhat is an Ethernet?

This refers to the wire connection that is used to connect to network terminals to connect to the world wide web.

Hence, we can see that based on the answer choices, we can see that the ethernet has many uses and this involves checking error detection via CRC and checking error detection and correction via parity checks

Read more about ethernets here:

https://brainly.com/question/26956118

#SPJ1

What line of code assigns a char variable outputgames with the value hte gamespointer points to?

Answers

The line of code that assigns a char variable outputGames with the value the gamesPointer points to is known to be:

outputGames = *gamesPointer:

What is a line of a code?

The instructions a programmer is known to often writes when making  a program is known to be the code line.

Note that the Lines of code are seen as the "source code" of any kind of a program, and one line is one that can be used to make or generate a single machine instruction or a lot of it based on the programming language.

Hence,  A line of code in assembly language is seen to be turned into a single machine instruction.

Therefore, The line of code that assigns a char variable outputGames with the value the gamesPointer points to is known to be:

outputGames = *gamesPointer:

Learn more about codes  line of code from

https://brainly.com/question/25875879

#SPJ1

What major difference is likely to exist between on-premises identity services and those used in a cloud-hosted environment

Answers

The major difference between on-premises identity services and those used in a cloud-hosted environment is to deliver account and/or identity management.

What are cloud services?

In computers, a cloud service can be defined as a type of help in which the company may deliver a service on the internet such as, data storage.

Important companies that provide cloud services over the Internet  (e.g., Amazon Web Services) may handle essential information such as account and/or identity management.

In conclusion, the major difference between on-premises identity services and those used in a cloud-hosted environment is that cloud services can deliver account and/or identity management.

Learn more about cloud computing services here:

https://brainly.com/question/19057393

#SPJ1

The security field will be needed through an organization's life.

a. True
b. False

Answers

True that will always be needed in the security filed

A(n)__________is a confirmed event that compromises the confidentiality, integrity, or availability of information. a. operational deviation b. threat c. breach d. residual risk

Answers

In information security, a breach is a confirmed event that compromises confidentiality, integrity, or availability.

What is a breach?

A breach occurs when an obligation or promise is not fulfilled. An act of breaking laws, rules, contracts, or promises; a violation of the basic laws of humanity; a violation of a law; a breach of a promise. The factions hoped to avoid a break in relations; "they hoped to avoid a break".

Therefore, the option C, which is our answer.

To learn more about breach, here

https://brainly.com/question/13885689

#SPJ1

To open a folder on the desktop using a mouse, you should place the pointer of the mouse over the target object and do what action?.

Answers

To open a folder on the desktop using a mouse, you should place the pointer of the mouse over the target object and  double click , in rapid succession, using the left mouse button.

Which mouse pointer will open the file folder?

When a person is known to be using Windows 10 or an older version of any given Windows, a person can be able to open files and folders through the act of double-clicking on them.

Note that based on the above, if a person can alter this behavior to open files using a single click ( that is the mouse is used by double-clicking on a single click).

Therefore, based on the above, To open a folder on the desktop using a mouse, you should place the pointer of the mouse over the target object and  double click , in rapid succession, using the left mouse button.

Learn more about mouse from

https://brainly.com/question/10847782

#SPJ1

If a client performs a stabilization workout on Monday, a power workout on Wednesday, and an SAQ sports workout on Saturday, what kind of periodization is being used for their mesocycle

Answers

When a client performs a stabilization workout on Monday, The kind of periodization that is being used for their mesocycle is Undulating periodization.

What is undulating periodization?

Undulating periodization is known to be a kind of training that entails a lot of volume and intensity that often go up and down, and it is one that is often done weekly or daily, in course of the training period.

Note that a Weekly undulating periodization (WUP) alters the volume and intensity from  week to week and this is also seen as a program that has a dynamic scheme that gives room for weekly and daily fluctuations.

Hence, When a client performs a stabilization workout on Monday, The kind of periodization that is being used for their mesocycle is Undulating periodization.

Learn more about periodization from

https://brainly.com/question/714921

#SPJ1

Other Questions
How would breathing be affected if a bullet makes a hole in the thoracic cavity? What is the best definition for the word "hyperbole"? the literal definition of a word images that reoccur again and again throughout the poem figurative language that uses extreme exaggeration metaphors that extend over the course of several lines or sentences Education reflects a nations culture. Although their cultures differ in many ways, in both soviet russia and japan, a great effort was put into enforcing? QuestionAt the end of Passage 2, ("While... them"), the expert emphasizesO function over formO theory over practiceO ethics over ambitionO quality over quantity Check the true statements round off square root of 120 to the nearest whole number? 112Select the correct answer.Read the text from the 1920 Treaty of Versailles."The High Contracting Parties,In order to promote international co-operation and to achieve international peace and securityby the acceptance of obligations not to resort to war,by the prescription of open, just and honourable relations between nations,by the firm establishment of the understandings of international lawandby the maintenance of justice and a scrupulous respect for all treaty obligationsAgree to this Covenant of the League of Nations."How is this excerpt from the Treaty of Versailles similar to the contents of Roosevelts radio address?A. It addresses the desire of countries for peace among nations.B. It describes a way to promote international peace and security.C. It emphasizes the need for nations to adhere to international law.D. It highlights the necessity of nations respecting treaty obligations. What simulates human thinking and behavior, such as the ability to reason and learn?a. algorithm b. drill-down c. digital dashboard d. artificial intelligence Use the discrete probability distribution to find the probability that x exceeds 5. (note that it is not required to find the missing probability. ) What is the goal of managers who use matrix analysis to evaluate menu items based on each item's popularity and food cost percentage? What is the study of living things called?OA. Earth scienceO B. PhysicsO C. ChemistryO D. Biology A likely outcome from taxing the rich at a high percentage in order to ________ income, would be discouraged entrepreneurship and work With the exception of those working for corporate and nonprofit organizations, correctional personnel are:______ on a recent trip, the smiths drove at an average speed of 55 miles per hour. if the trip took 5 1/2 hours, how many miles did they drive? The narrator implies that other astronomers viewed Paul as someone who (A) sacrificed his personal life in order to further his own research. (B) served as an important role model for his own students. (C) was respected because of his considerable professional accomplishments. (D) challenged the established theories of more successful scientists Which psychosocial nursing diagnoses are common in the client with breast cancer? What does this does?Global Alliance for Banking on Values PLEASE HELP, TIMEDUniversity students in an Iowa town have a mean hourly wage of $11.75, with a standard deviation of $1.25. The distribution of hourly wages is not assumed to be symmetric.Between what two-hourly wages does Chebyshev's Theorem guarantee that we will find at least 75% of the people?Round your answers to the nearest hundredth. The expansion of political participation in the southern u. S. States has come about largely because of. A buyer has the right to buy a property at an agreed price within the next six months. This is a(n)?