Which superclass members are inherited by all subclasses of that superclass?

a. private instance variables and methods.
b. protected instance variables and methods.
c. private constructors.
d. protected constructor

b. protected instance variables and methods.

Computer Science & Information Technology

You might also like to view...

A shape may have a(n) ________ that is used to change its shape

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ____ level of the capability maturity process conveys a set of commonly understood best practices, which effectively address the current security needs of the organization.

A. informal practice B. deliberate control C. security management D. formal practice

Computer Science & Information Technology