Show the output of running the class Test in the following code lines:
```
interface A {
}
class C {
}
class B extends D implements A {
}
public class Test {
public static void main(String[] args) {
B b = new B();
if (b instanceof A)
System.out.println("b is an instance of A");
if (b instanceof C)
System.out.println("b is an instance of C");
}
}
class D extends C {
}```
a. Nothing.
b. b is an instance of A.
c. b is an instance of C.
d. b is an instance of A followed by b is an instance of C.
d
You might also like to view...
What type of storage device is the most reliable?
A) SSD B) PATA C) SATA D) eSATA E) SCSI F) SAS
A threat analysis usually includes a description of the ____, or potential avenues of attack, that could allow the system to be exploited.
A. exploits B. marks C. command points D. vulnerabilities