Which of the following is true about protected access?

a. Protected members may be accessed by methods in the same package or in a subclass, even when the subclass is in a different package.
b. Protected members may be accessed by methods in the same package or in a subclass, but only if the subclass is in the same package.
c. Protected members cannot be accessed by methods in any other classes.
d. Protected members are actually named constants.



a. Protected members may be accessed by methods in the same package or in a subclass, even when the subclass is in a different package.

Computer Science & Information Technology

You might also like to view...

When you are working with a team to accomplish a goal you are said to be ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Apart from object behaviors, a characteristic feature that objects share with variables is they always have a unique identity.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In contrast to implicitly passing addresses with ____, addresses can be explicitly passed using pointers.

a. extern variables b. instances c. static variables d. references

Computer Science & Information Technology

Critical Thinking Question Case Study 8-1? ? Lexi was cleaning out her attic and came across several boxes of old photos.  She does not want to lose them so she loads them onto her computer.  She knows you did that with some of your wedding photos recently.  She decides to call you. Lexi has loaded the photos onto her computer, but now she wants to organize them.  You tell her to create a(n) ______.  a.  album b. folder c. collection d. CD?

What will be an ideal response?

Computer Science & Information Technology