Which superclass members are inherited by all subclasses of that superclass?
a. private instance variables and methods.
b. protected instance variables and methods.
c. private constructors.
d. protected constructor
b. protected instance variables and methods.
Computer Science & Information Technology
You might also like to view...
A shape may have a(n) ________ that is used to change its shape
Fill in the blank(s) with correct word
Computer Science & Information Technology
The ____ level of the capability maturity process conveys a set of commonly understood best practices, which effectively address the current security needs of the organization.
A. informal practice B. deliberate control C. security management D. formal practice
Computer Science & Information Technology