answersLogoWhite

0

What else can I help you with?

Continue Learning about Engineering

What is meant by private visibilty of a method?

It means that the method is visible from only within the current method. Also, any class that wants to use or invoke the private method has to create an object of the class in which the method is created in order to access/invoke it. The private access modifier is the most restrictive of the four java access modifiers. The total opposite of private is public which gives access to everyone.


It is perfectly legal to any instance variable inside of a static method?

No. You will get compilation errors. The complier will complain that you are trying to access non static variables from inside a static method. A static method can access only static variables.


Can a private method be overridden?

No. A method that is declared as private in a class is not inherited by any other class and hence if another class that extends this class declares a method with the same name and signature, it does not mean that this method is overridden. It is an entirely separate entity.


What is the drawback of the CSMA access method?

Collisions can decrease network performance.


Which of these is an access modifier for a method - void protected int or main?

* void - This is a return type - or, more correctly, specifies that a method has no return type.* protected - This is an access modifier. It says that the only classes that can call this method are subclasses and classes in the same package.* int - This is a value type (or return type).* main - This is the name of the method.

Related Questions

What is the access method use by Wireless LAN?

WAPs use CSMA/CA - Carrier Sense Multiple Access with Collision Avoidance.


What access method specifies that each node must first listen to the network medium to determine if the medium is currently free of packets?

The access method is CSMA/CD - carrier sense multiple access with collision detect.


Which access method is used by Ethernet?

CSMA/CD: Carrier Sense Multiple Access / Collision Detection.


What type of access method are used when network devices listen to the cable before transmitting?

CSMA/CD (Carrier Sense Multiple Access / Collision Detect)


Which US president hired a replacement draftee to avoid serving in the military during the war between the states?

Grover Cleveland avoided the draft by this entirely legal method.


Differences between collision detection and collision avoidance?

CSMA/CD (carrier sense multiple access/collision detection) CD (collision detection) defines what happens when two devices sense a clear channel, then attempt to transmit at the same time. A collision occurs, and both devices stop transmission, wait for a random amount of time, then retransmit. This is the technique used to access the 802.3 Ethernet network channel. This method handles collisions as they occur, but if the bus is constantly busy, collisions can occur so often that performance drops drastically. It is estimated that network traffic must be less than 40 percent of the bus capacity for the network to operate efficiently. If distances are long, time lags occur that may result in inappropriate carrier sensing, and hence collisions. CSMA/CA (carrier sense multiple access/collision avoidance) In CA (collision avoidance), collisions are avoided because each node signals its intent to transmit before actually doing so. This method is not popular because it requires excessive overhead that reduces performance.


What is the method for finding velocity after collision in a physics experiment?

The method for finding velocity after a collision in a physics experiment involves using the principles of conservation of momentum and energy. By analyzing the initial and final momentum of the objects involved in the collision, along with any changes in kinetic energy, the velocities of the objects after the collision can be calculated.


Something in an experiment that could have been avoided with care?

Careless method


What is advantages and disadvantages of distillation method?

The distillation method's advantages are that it will make a pure result. The disadvantages are that the method is time consuming and is not cheap. The distilled method as a result is avoided unless needed.


What are the two characteristics of the controlled media access method?

It is known as a deterministic access method.


What type of media access control does Ethernet use?

Ethernet uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) as its media access control method. In this system, devices listen to the network before transmitting data to ensure that the channel is clear. If two devices transmit simultaneously, a collision occurs, and both devices stop transmitting, wait a random period, and then attempt to resend their data. This approach helps to minimize data collisions and manage access to the shared communication medium.


What is deterministic access method?

When using the controlled access method, network devices take turns, in sequence, to access the medium.