The getValue() method is overridden in two ways. Which one is correct?1.

public class Test {

public static void main(String[] args) {

A a = new A();

System.out.println(a.getValue());

}

class B {

public String getValue() {

return "Any object";

}

class A extends B {

public Object getValue() {

return "A string";

}

2.

public class Test {

public static void main(String[] args) {

A a = new A();

System.out.println(a.getValue());

}

class B {

public Object getValue() {

return "Any object";

}

class A extends B {

public String getValue() {

return "A string";

}

a.I
b.II
c.Both I and II
d.Neither

Answers

Answer 1
Answer:

Answer:

Hi there KatiesTomato! The answer is: b. II

Explanation:

Java allows us to override a method defined in the main or Parent class by re-defining it in the child class. In the question, the first option gives us code that will throw an error because the String method getValue() in class B is being overridden by a method in class A which returns an Object which is also a String. So the compiler will throw an error that type Object is not compatible with String. Option 2 will compile successfully and return a String because the Object is allowed to be converted to a String.


Related Questions

Find the basic period and basic frequency of the function g(t)=8cos(10πt)+sin(15πt)
___________ are used when an SQL statement has to be executed multiple times in a Python script.aPrepared statementsbCursorscConnectionsdQueries
The study of a current business and information system application and the definition of user requirements and priorities for a new or improved information system are part of which phase? (Points : 2) Problem analysis phaseScope definition phaseRequirements analysis phaseDecision analysis phaseNone of the above
What are some of the common security weaknesses inherent in Unix or Linux based systems and what techniques can be used to harden these systems against an attack?
All of the following are strengths of the Internet as a source of information except

Describe a strategy for avoiding nested conditionals. Give your own example of a nested conditional that can be modified to become a single conditional, and show the equivalent single conditional.

Answers

Answer:

One of the strategies to avoid nested conditional is to use logical expressions such as the use of AND & operator.

One strategy is to use an  interface class with a method. That method can be created to be used for a common functionality or purpose. This is also called strategy design pattern. You can move the chunk of conditional statement to that method. Then each class can implement that interface class and use that shared method according to their own required task by creating objects of sub classes and call that common method for any such object. This is called polymorphism.

Explanation:

Nested conditionals refers to the use of if or else if statement inside another if or else if statement or you can simply say a condition inside another condition. For example:

if( condition1) {  

//executes when condition1 evaluates to true

  if(condition2) {

//executes when condition1  and condition2 evaluate to true

  }  else if(condition3) {

 //when condition1 is true and condition3 is true

} else {

 //condition1  is true but neither condition2 nor conditions3 are true

}  }

The deeply nested conditionals make the program difficult to understand or read if the nested conditionals are not indented properly. Also the debugging gets difficult when the program has a lot of nested conditionals.

So in order to avoid nested conditionals some strategies are used such as using a switch statement.

Here i will give an example of the strategies i have mentioned in the answer.

Using Logical Expressions:

A strategy to avoid nested conditionals is to use logical expressions with logical operators such as AND operator. The above described example of nested conditionals can be written as:

if(condition1 && condition2){  //this executes only when both condition1 and condition2 are true

} else if(condition1 && condition3) {

this executes only when both condition1 and condition3 are true

} else if(condition1 ){

//condition1  is true but neither condtion2 nor condtion3 are true  }

This can further be modified to one conditional as:

if(!condition3){

// when  condition1 and condition2 are true

}

else

// condition3 is true

Now lets take a simple example of deciding to go to school or not based on some conditions.

if (temperature< 40)

{

   if (busArrived=="yes")

   {

       if (!sick)

       {

           if (homework=="done")

           {

               printf("Go to school.");

           }

       }                    

   }

}

This uses nested conditionals. This can be changed to a single conditional using AND logical operator.

if ((temperature <40) && (busArrived=="yes") &&

(!sick) && (homework=="done"))

{    cout<<"Eligible for promotion."; }

The second strategy is to use an interface. For example you can

abstract class Shape{

//declare a method common to all sub classes

  abstract public int area();

// same method that varies by formula of area for different shapes

}

class Triangle extends Shape{

  public int area() {

     // version of area code for Triangle

return (width * height / 2);

  }

}

class Rectangle extends Shape{

  public int area() {

     // version of area code for Rectangle

    return (width * height)

  }

}

// Now simply create Rectangle or Triangle objects and call area() for any such object and the relevant version will be executed.

Subtract (100000)2 from (111)2 using 1s and 2s complement method of subtraction​

Answers

Answer:

-11001

Explanation:

The following steps are performed in order to perform subtraction of the given binary numbers:

Step 1:

Find 2’s complement of the subtrahend. The subtrahend here is 100000

100000

First take 1's complement of 100000

1's complement is taken by inverting 100000

1's complement of 100000 = 011111

Now takes 2's complement by adding 1 to the result of 1's complement:

011111 + 1 = 100000

2's complement of 100000 = 100000

Step 2:

Add the 2's complement of the subtrahend to the minuend.

The number of bits in the minuend is less than that of subtrahend. Make the number of bits in the minuend equal to that of subtrahend by placing 0s in before minuend. So the minuend 111 becomes:

000111

Now add the 2's complement of 100000 to 000111

   0 0 0 1  1  1

+   1 0 0 0 0 0

    1 0 0 1  1  1

The result of the addition is :

 1 0 0 1  1  1

Step 3:

Since there is no carry over the next step is to take 2's complement of the sum and place negative sign with the result as the result is negative.

sum =   1 0 0 1  1  1

2's complement of sum:

First take 1's complement of 1 0 0 1  1  1

1's complement is taken by inverting 1 0 0 1  1  1

1's complement of 1 0 0 1  1  1 = 0 1 1 0 0 0

Now takes 2's complement by adding 1 to the result of 1's complement:

0 1 1 0 0 0 + 1 = 0 1 1 0 0 1

Now place the minus sign with the result of 2's complement:

- 0 1 1 0 0 1

Hence the subtraction of two binary numbers (100000)₂ and (111)₂  is

(-011001)₂

This can also be written as:

(-11001)₂

Assign True to the variable has_dups if the string s1 has any duplicate character (that is if any character appears more than once) and False otherwise.Here is the answer I wrote:


i = []
for i in range(len([s1])):
if s1.count(s1[i]) > 1:
has_dups = True
elif s1.count(s1[i]) = 1:
has_dups = False


Here is the message I got from the system:

Solutions with your approach don't usually use: elif



Please Help me to correct it.

Answers

i dont know the language of the code
probably you have sintacs mistakes in it

has_dups = false
for i in range(len([s1])):
has_dups = has_dups || s1.count(s1[i]) > 1

The advantages of automation include: (I) reduced output variability. (II) reduced variable costs. (III) machines don't strike or file grievances. (IV) machines are always less expensive than human labor.

Answers

Answer:

(III) machines don't strike or file grievances.

(IV) machines are always less expensive than human labor.

Explanation:

The advantage of automation among the option is:

(III) machines don't strike or file grievances - Machine has the advantage of not going on strike or filing grievances. It just obey instruction. Strike are human way of showing grievances. With automation, there is no issue of strike or filing for grievance.

(IV) machines are always less expensive than human labor - Machines as a means of automation are very cheap when compared to human labor. The only added cost for machine is the added cost after the cost of purchase. For human labor, the cost is not fixed or predictable.

Hello,Can you please help me with the following questions:
3. You enjoy technical matters, have a background in computer science and enjoy coding and playing video games in your free time. Which video game industry job would best match your profile?
a. Game tester
b. Producer
c. Programmer
d. Video game artist

6. Which of the following is an essential skill for game testers?
a. Thorough understanding of Java and C++
b. Technical drawing
c. Technical writing
d. Project management

9. Which of the following skills is the most important when applying for a game artist job?
a. Degree in arts
b. Strong art portfolio
c. Previous game testing experience
d, knowledge of scripting and codeing

10. The Stencyl program is recommended for ______.
a. creating 2D games
b. creating 3D games
c. Starting to learn to program
d. creating gaming art

11. You are passionate about video games, have spent part of your life in different countries and are fluent in their languages. You are considering looking for a job in video games. Which of the following jobs could you be qualified for, considering your skills and experience?
a. Game programming with a focus on languages
b. Translation
c. Game localization
d. Cultural gaming

12. Because it is one of the main programming languages used in some of the most popular game engines in the industry, which programming language does the author of the textbook recommend learning first?
a. Java
b. C Sharp
c. C++
d. SQL

13. Which of the following statements is NOT true about internships?
a. internships offer great opportunity to create and build connections within the industry.
b. Internships lead to a job offer upon successful completion
c. Internships offer an opportunity to get first-hand experience of the industry
d. Internships can be paid or unpaid

15. What is the best approach to take if you have not heard back from a company after applying for a job?
a. Wait, sometimes it takes time to process application and impatience can give a bad impression
b. Visit the company site personally to inquire about the status of your application
c. Try to find out on which side the process may be stalling and take appropriate steps to get the process moving forward, when possible
d. Reapply

18. You are applying for a game programmer job at a reputable gaming company. Your application may stand the best chance of being noticed if you include which of the following in your application?
a. List of all degrees and courses you have taken to acquire and hone your programming skills
b. Portfolio including samples of codes you have created
c. Portfolio including playable video game demo.
d. Portfolio of your artwork.

19. Which of the following is the most important item to include in your CV?
a. All gaming projects you have worked on, paid or unpaid.
b. Extracurricular activities related to gaming.
c. Major accomplishments
d. Short samples of code or technical writing samples.

20. Which of the following job hunting practices is the least effective?
a. Posting CV on job boards.
b. Searching for jobs on job posting sites
c. Doing an internship
d. Applying for a specific job posting via company website

Answers

Answer:

C, C, B, C, C, B, B or D, D, A or C, A, D

Explanation:

I am not taking whatever course you are taking, but I would like to know what you're taking. I have only answered the questions to the best of my abilities, so they might be wrong. Next time please award more points for a question so long.

You have been asked to write a two-page report that explains the extent to which the IT department can configure the cryptographic features of Word 2010. What is the process involved in configuring encryption?

Answers

Answer:Encryption is the process

of translating plain text data into something that appears to be random and meaningless. A symmetric key is used during both the encryption and decryption process. To decrypt a particular piece of ciphertex, the key that was used to encrypt the data must be used.

Types of encryption

1.Symmetric encryption :This is also known as public key encryption. In symmetric encryption, there is only one key, and all communication patties use the same key for encryption and decryption.

2.Asymmetric encryption :This is foundational technology for SSL(TLS)

How encryption is being configured

Encryption uses algorithms to scramble your information. It is then transmitted to the receiving party, who is able to decode the message with a key.

Explanation: