Fill in the code below in the underline:

```
public class Test {
public static void main(String[] args) {
Test test = new Test();
test.setAction(______________________________);
}

public void setAction(T1 t) {
t.m();
}
}

interface T1 {
public void m();
}```
a. () -> System.out.print("Action 1! ")
b. (e) -> System.out.print("Action 1! ")
c. System.out.print("Action 1! ")
d. (e) -> {System.out.print("Action 1! ")}

a

Computer Science & Information Technology

You might also like to view...

Windows audio files are known as ____.

A. audio B. hyperlinks C. waveform D. bookmarks

Computer Science & Information Technology

The basic plan for your investigation includes gathering the evidence, establishing the ____, and performing the forensic analysis.

a. risk assessment b. nature of the case c. chain of custody d. location of the evidence

Computer Science & Information Technology