A method or instance variable modified by protected:

a. can not be accessed by name inside its own class definitions.
b. can not be accessed by name inside any class derived from it.
c. can not be accessed by name in the definition of any class in the same package.
d. can not be accessed by name in any other class (that is, other than classes named in a-c.).


D

Computer Science & Information Technology

You might also like to view...

Bring the check

A. Customer B. Waitress C. Chef D. None of the above

Computer Science & Information Technology

Bluetooth is a wireless protocol for ________

A) short distance data transmissions B) data transmission of over 100 feet C) data transmission of bandwidths exceeding 1000 Kbps (1Mbps) D) Internet communication

Computer Science & Information Technology

Routers send ICMP Redirect messages to hosts to indicate that a preferable route exists.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Explain why you might want to use a two-dimensional array.

What will be an ideal response?

Computer Science & Information Technology