Show the output of running the class Test in the following code lines:

```
interface A {
}

class C {
}

class B extends D implements A {
}

public class Test {
public static void main(String[] args) {
B b = new B();
if (b instanceof A)
System.out.println("b is an instance of A");
if (b instanceof C)
System.out.println("b is an instance of C");
}
}

class D extends C {
}```
a. Nothing.
b. b is an instance of A.
c. b is an instance of C.
d. b is an instance of A followed by b is an instance of C.

d

Computer Science & Information Technology

You might also like to view...

What type of storage device is the most reliable?

A) SSD B) PATA C) SATA D) eSATA E) SCSI F) SAS

Computer Science & Information Technology

A threat analysis usually includes a description of the ____, or potential avenues of attack, that could allow the system to be exploited.

A. exploits B. marks C. command points D. vulnerabilities

Computer Science & Information Technology