Which access specifiers can be used for an interface


Asked by admin @ in Computer Science viewed by 320 People


Which of these access specifiers can be used for an interface?

Answered by admin @



I hope help you
Access specifier of interface is either public or no specifier. When no access specifier is used then default access specifier is used due to which interface is available only to other members of the package in which it is declared, when declared public it can be used by any code.
please mark brain list ♥♥:-)

Similar Questions

Xll definition is used along with xml to specify

Asked by admin @ in Computer Science viewed by 313 persons

Xll definition is used along with xml to specify

Computer interface that is used by dos is called

Asked by admin @ in Computer Science viewed by 374 persons

Computer interface that is used by DOS is called. a) Menu driven interface b) Command driven interfacec) Design interface d) System interface​

Which sign is used to specify a cell range

Asked by admin @ in Computer Science viewed by 266 persons

Which sign is used to specify cell range in function?;:,>​

Dtd definition is used along with xml to specify

Asked by admin @ in Computer Science viewed by 315 persons

18. DTD definition is used alongwith XML to specify CBSE 2014 (a) the presentation of XML document (b) the links with other documents (c) the structure of XML document (d) …

The fields in an interface are implicitly specified as

Asked by admin @ in Computer Science viewed by 222 persons

Fields in an interface are implicitly specified as

Phase margin of a system is used to specify

Asked by admin @ in Science viewed by 336 persons

Phase margin of a system is used to specify

What is used to specify the structure of the database

Asked by admin @ in Computer Science viewed by 268 persons

What is used to specify structure of database?

Bhe of 8086 microprocessor signal is used to interface the

Asked by admin @ in Computer Science viewed by 476 persons

Bhe of 8086 processor signal is used to interface the

Which multiple access technique is used by ieee 802.11

Asked by admin @ in Computer Science viewed by 349 persons

Which multiple access technique is used by ieee 802.11 standard for wireless lan?Select one:a. Cdmab. Csma/cac. Alohad. None of the mentioned?

Aws identity and access management are available through ____________ interfaces

Asked by admin @ in Computer Science viewed by 323 persons

Through which of the following interfaces is AWS Identity and Access Management available?

Which application is used for accessing the information on internet

Asked by admin @ in Computer Science viewed by 261 persons

Which software application is used for accessing sites or information on a network ( as the world wide web)?

Aws identity and access management are available through which interfaces

Asked by admin @ in Computer Science viewed by 246 persons

Through which of the following interfaces is AWS Identity and Access Management available?

Overcoming fixed mindset: a step-by-step guide to cultivating a growth mindset

Asked by wiki @ in Health viewed by 1082 persons

Which of the following would best complete this list?

Asked by wiki @ in Social Studies viewed by 617 persons

What had the king decided to do before he saw the spider

Asked by vanshika149 @ in English viewed by 961 persons

Most viewed questions in Computer Science


A programmer mistakenly writes gor instead of for

Asked by admin @ in Computer Science viewed by 18993 persons


Domestic data entry operator ncert book class 9 solutions

Asked by admin @ in Computer Science viewed by 15737 persons


Information technology code 402 class 9 solutions chapter 1

Asked by admin @ in Computer Science viewed by 10933 persons



Ncert solutions for class 8 computer chapter 1 computer system

Asked by admin @ in Computer Science viewed by 10376 persons


A scrum team works on a 4 weeks sprint

Asked by admin @ in Computer Science viewed by 8698 persons


Which of the following occupies more memory in c

Asked by admin @ in Computer Science viewed by 8108 persons



A database of motor vehicles has the base entity

Asked by admin @ in Computer Science viewed by 7820 persons


The network architecture can be termed as a mcq

Asked by admin @ in Computer Science viewed by 6453 persons


Cat5 and cat6 cabling refer to which reference model layer

Asked by admin @ in Computer Science viewed by 5756 persons



Class 7 computer chapter 3 questions and answers

Asked by admin @ in Computer Science viewed by 5662 persons


Choose the correct options about usability and user experience

Asked by admin @ in Computer Science viewed by 5446 persons


Which advocates daily team meetings for coordination and integration

Asked by admin @ in Computer Science viewed by 4955 persons



Which three security features match the database security level

Asked by admin @ in Computer Science viewed by 4946 persons


Which of the dbms package is not available

Asked by admin @ in Computer Science viewed by 4663 persons


________ aid a business grow and attain its objectives

Asked by admin @ in Computer Science viewed by 4464 persons