Write a JAVA Program to create a class named “Box" which has 3 attribute: length, width, height and a metho named getVolume(). getVolume() method will calculate the volume of the Box and return the value. From "main' method create 2 Box objects with different length, width height, then call the getVolume() method and print the volumes. Use constructor while creating Box objects.
Q: Rewrite the following loops, using the enhanced for loop construct. Here, values is an array of floa...
A: Enhanced for loop is used to iterate through elements of array. It’s also called for-each loop. This...
Q: Calculate the results (both binary and hexadecimal values) with calculation step and show the status...
A:
Q: Write assembly code to Add the contents of register R4 and the contents of register R5 to register A...
A: Given: We have to write a assembly code to add the contents of register R4 and the contents of reg...
Q: ONLY in pseudocode, no real progamming langue!!! Question) Design a function named findMax that acc...
A: - We need to have a pseudocode for the function to return the greater of two numbers.
Q: Write down the MATLAB expressions that will correctly compute the following: a. cot(t) 2 b.sec (t) +...
A: Answer the above questions are as follows:
Q: What will be the designer's initial task?
A: Introduction: If you are a web designer or UI/UX designer, the following are frequent topics to cons...
Q: Give two advantages of using virtualization as a networking technique on a network.
A: Intro Give two advantages of using virtualization as a networking technique on a network.
Q: Provide two instances of common fingerprinting algorithms.
A: Introduction Fingerprinting Algorithms: An arbitrarily large data object (for example, a computer ...
Q: The fourth generation of networks (also known as 4G) carries both speech and data, in contrast to th...
A: Overview: The two generations separately characterize the 3G and 4G portable web broadband. When in ...
Q: What is one intriguing use of data or text mining that you can research and describe?
A: Text mining: Text mining, otherwise called text information mining, is the method of separating gr...
Q: Is it possible to implement a sorted linked list using a DLL? What is the advantage of using a DLL v...
A: Introduction Doubly Linked List vs Singly Linked List Yes, it is possible to sort a linked list us...
Q: When it comes to the Internet Protocol (commonly known as IP), it's all about making the most of wha...
A: The Internet Protocol or also known as IP is a collection of rules for routing and addressing data p...
Q: Is it the responsibility of the Database Administrator or the Server Administrator to perform backup...
A: Introduction: As we all know, creating backups is a necessary operation that must be done on a regul...
Q: 2. List Registration numbers of all patients in H02, ward W18 who have been diagnosed with "Flu" b...
A: List Registration numbers of all patients in H02, ward W18 who have been diagnosed with "Flu" but fo...
Q: Write a function that will redact every third word in a sentence. Make use of the hashtag (#) symbol...
A: The asked python program is provided in the next step and the concept of for loop, if-else, and repl...
Q: Write a function to calculate the hypotenuse using Pythagorean theorem: = Vla? + b?) To do this you ...
A: Dear learner , hope you are doing well , I will try my best to answer this question. Thank You!!
Q: What is the procedure for recovering data from a solid state disk in a forensically sound manner?
A: The procedure for recovering data from a solid state disk in a forensically sound manner is as foll...
Q: What are the many types of security vulnerabilities that your computer might be exposed to? What mea...
A: Introduction: Computer hardware is typically protected by the same means used to protect other valua...
Q: 1. Explain the purpose and scope of database security. 2. List the main types of threat that could a...
A: Introduction: As per our policy, "Since you have asked multiple questions, we will solve the first q...
Q: A prime number is a number that is only evenly divisible by itself and 1. For example, the number 5...
A: The pseudo code (not any specific programming language) is given in the next steps
Q: for x = 3 to x = 5 x+ Evaluate the function y in steps 0.5. Write the complete code.
A: ALGORITHM:- 1. Assign a loop for x=3 to x=5 and make a increment of 0.5 each time. 2. Calculate the ...
Q: Exercise No.1 Create an algorithm, flowchart and progra 1. Ask the user to input two integers 2. Mul...
A: Algorithm for addition, subtract, multiplication, divide - 1- Declare variable (Two variable for sto...
Q: 1. What's "Bayes Decision Rule"? Explain with presenting formula(s) for a hypothetical two-class exa...
A: Bayes Decision Rule
Q: 1. Given the data below, construct a Pandas program to generate and display a DataFrame with index l...
A: Program: import pandas as pdimport numpy as npdf = pd.DataFrame( {'ord_no':[70001,np.nan,7000...
Q: What exactly is technical documentation? Name four contrasts between Technical and User Documentatio...
A: Answer : Technical documentation: This type of documentation is used to explain the use, architectu...
Q: making use of Mafiaboy's web-based research techniques When and how did he comprmise his sites was t...
A: Introduction: Michael Calce (born 1984, alias MafiaBoy) is a security expert and former computer hac...
Q: What does the digital gap in the United States look like in comparison to the worldwide digital divi...
A: The digital gap refers to the gap between the people who can operate and access via modern technique...
Q: Simplify the following Boolean expressions to a minimum number of literals: (a + b+ c')(a'b' + c) (a...
A:
Q: What are the major technical and nontechnical impediments to software reuse? Do you frequently reuse...
A: Introduction What are the major technical and nontechnical impediments to software reuse? Do you fre...
Q: readEmpFromFile
A: Programming is given below.
Q: Perform a cost-benefit analysis of NAS (network attached storage) and SAN (storage area network) imp...
A: INTRODUCTION: There are two types of networks: NAS(network attached storage) SAN(storage area netw...
Q: Explain why digital signals are also prone to attenuation.
A: Introduction: Attenuation refers to any reduction or change in the signal caused by disruptions.
Q: In C++ language, create a program that gets quarterly sales from a user, and calculates the total of...
A: pseudocode :
Q: What is the command “make" and the file "Makefile" ? can you execute the c program without prefixing...
A: Solution: The 'make' command and 'makefile' : The make command requires the file for the execution, ...
Q: How widespread is malware (which includes spyware, adware, ransomware, infections, and so on)?
A: Introduction One of the greatest deals and challenges these days, IT has to encounter is cyber safet...
Q: Activation is a technique for loading distant objects into a server on demand (that is, when a clien...
A: Introduction: During the course of a single procedure execution, the information required is handled...
Q: Create a programme to compute the sum of the numbers from 5 to 15.
A: Introduction Create a program to compute the sum of the numbers from 5 to 15.
Q: A. Compare and contrast. Use Venn Diagram to identify what is the similarities and differences of th...
A: A data lake stores an association's crude and handled (unstructured and organized) data at both enor...
Q: Assume a computer contains two network interface cards, NIC1 and NIC2. NIC1 is a Wifi USB card, and ...
A: INtro The network interface card (NIC) enables computers to interact across a computer network via w...
Q: The question is, how do you handle security in an office that has shared resources, such as a printe...
A: Introduction: Resources that may be accessed by several distant computers linked via a local area ne...
Q: Create an algorithm, flowchart and program that will do the following: 1. Ask the user to input two ...
A:
Q: Consider the following array: int[] a = { 1, 2, 3, 4, 5, 4, 3, 2, 1, 0 }; What are the contents of ...
A: 1) We have an array a initialize with values { 1, 2, 3, 4, 5, 4, 3, 2, 1, 0 }; 2) Now have for loo...
Q: Discussion why this is possible to speed up the training of a bagging ensemble by distributing it ac...
A: Let's see the solution
Q: Your task is to write a function toLeetSpeak that converts a regular english sentence to Leetspeak. ...
A: Iterate over the input sentence Use another string and keep on updating respective value from dictio...
Q: 2. List the main types of threat that could affect a database system, and for each describe the cont...
A: The Answer is in step2
Q: What are some of the most prevalent sorts of error messages, and what do they indicate
A: "401 Unauthorized" First on our rundown of HTTP mistake codes is 401. A 401 message implies the serv...
Q: ii) Input a string single from the user and form a string triple in which all characters of the stri...
A: This program can be done by using strings concept in java.
Q: Let's say you want to create a WebGL software that draws two types of objects: sparkly billiard ball...
A: Introduction: This article will cover the fundamentals of using the canvas> element to render Web...
Q: Why, in your opinion, is data quality so crucial in data warehousing? Benefits and indicators of ...
A: Introduction: Data of high quality is data that is useful. To be of good quality, data must be consi...
Q: Select all of true statements about the interface of merge (the main helper of the mergesort algorit...
A: _merger is a helper function of mergesort algorithm so lets check given statements are true of false...
Step by step
Solved in 2 steps with 1 images
- Java Question Create a class named "Identity" class with attributes: name, age, city and gender. Choose your own data type (int, string etc.). Create 4 different methods; eat, study, sleep and play. Make each of them Print something like “I am sleeping”.In main driver class create object of a class with default constructor. Create two objects as shown in the image. Then call all methods of a class (eat, study, sleep and play).Add toString method displaying all attributes (name, age, city and gender). Add setters and getters for each attribute. Print each attributes from main program with getters.JAVA PROGRAMMING Create a class named "Circle" that has attributes radius, area and circumference and make the attributes private. Make a public method that sets the radius and method that prints all attributes. Ask the user input for radius. Note: Use the PI from the math functions. Inputs: 1. A line containing an integer. 10 Output: Radius: 20 Area: 1256.64 Circumference: 125.66Create a method "public void giveRaise(int percentage)" in the Employee class. This method should increase the salary member by the percentage specified in the parameter. In the main method: 1. Create an Employee object. Print out its toString() result. Call giveRaise with 10%. 2. Print out its toString() result.
- write a program using java Create a class for Subject containing the Name of the subject and score of the subject. There should be following methods: set: it will take two arguments name and score, and set the values of the attributes. If score is less than 0 or greater than 100.0 then a message should be displayed “Incorrect score” and score should be set to Zero. set: it will take one double value as argument and set the value of score only. If score is less than 0 or greater than 100.0 then a message should be displayed “Incorrect score” and score should be set to Zero. display: it will display the name and score of the subject. Like “Name : Math, Score: 99.9” getScore: it will return the value of score. greaterThan: it will take subject’s object as argument, compare the calling object’s score with argument object’s score and return true if the calling object has greater score. Create a class “Main” having main method to perform following tasks. Create two objects of Subject…Write a program using java Create a class for Subject containing the Name of the subject and score of the subject. There should be following methods: set: it will take two arguments name and score, and set the values of the attributes. If score is less than 0 or greater than 100.0 then a message should be displayed “Incorrect score” and score should be set to Zero. set: it will take one double value as argument and set the value of score only. If score is less than 0 or greater than 100.0 then a message should be displayed “Incorrect score” and score should be set to Zero. display: it will display the name and score of the subject. Like “Name : Math, Score: 99.9” getScore: it will return the value of score.Please written by computer source JAVA. This is my third time reposting this question. I need DATETEST class written to fit my ALREADY WRITTEN date.java. thank you!Write DateTest class which includes the main method. The program should create three objects of the Date class and one of them should use the default constructor and the other two use three-parameter constructor. Print all three dates using toString method. Change the month, day, and year of one of the dates using set methods, and then use get methods to display the new value of month, day, and year. Print all three dates again using printDate method. (please include comments)Here is my "date.java" I just need you to help with the test class package class Date { // month, day, and year as private instance variables. private int month; private int day; private int year; //default constructor public Date() { // set the date to 1/1/2000 this.month = 1; this.day = 1; this.year = 2000; } // three-parameter constructor will…
- 1. Let's say you have a zoo (A place with animals). You want to store different animals. You will like to store their name, type/species, age, friendly-level, attendance (how long they have stayed in the zoo) etc. a. Create the class b. Create a method to set the attributes, create a method to get the attributes c. Write a method that prints the name and the type/species of the animal - on one line.Java programming please Support computing sales tax in the CashRegister class. The tax rate should be supplied when constructing a CashRegister object. Add recordTaxablePurchase and getTotalTax methods. (Amounts added with recordPurchase are not taxable.) The giveChange method should correctly reflect the sales tax that is charged on taxable items. Please add the method to the CashRegisterTester. The input and output are also provided below. CashRegister class: import java.util.Scanner; public class CashRegister { private double purchase; private double payment; /** Constructs a cash register with no money in it. */ public CashRegister() { purchase = 0; payment = 0; } /** Records the sale of an item. @param amount the price of the item */ public void recordPurchase(double amount) { purchase = purchase + amount; } /** Processes a payment received from the customer. @param amount the amount of the payment */…in java Create a class for Student and implement all the below listed concepts in your class. Read lecture slides for reference. Class Name: Student 1. Data fields studentID name email majorDepartmentSelect proper datatypes for these variables. 2. Constructors – create at least 2 constructors No parameter With parametersSet id and name using the constructor with parameters. 3. Methods toString method : To print the details of the Student. Setter and getter methods 4. A static variable count : To keep the count of Student objects5. Visibility Modifiers: private for data fields and public for methods 6. Write some test cases in main method
- 1. Create a package of your name.[name prince]2. Inside the package creates three classes. The name of the classes will be Main, Info,Hobby.3. Info class will have two variables titled name(String) and id(integer).4. Place only one variable inside the Hobby class. The name of the variable will behobbyName(String).5. Inside the main method of the Main class creates a variable section(String). Take theinput of the section variable from the user.6. Create the object of both the Info & Hobby class.7. Print the section, name, id, and hobbyName of the user.[sec- a,name-prince,id-200,hobbyName-gardening]8. Apply camel coding.9. Must follow the rules of naming convention.10. Inside every class write your name, id, section, email, and date using multiline comments.In this lab, you will create a programmer-defined class and then use it in a Java program. The program should create two Rectangle objects and find their area and perimeter. Instructions Make sure the class file named Rectangle.java is open. In the Rectangle class, create two private attributes named length and width. Both length and width should be data type double. Write public set methods to set the values for length and width. Write public get methods to retrieve the values for length and width. Write a public calculateArea()method and a public calculatePerimeter() method to calculate and return the area of the rectangle and the perimeter of the rectangle. Open the file named MyRectangleClassProgram.java. In the MyRectangleClassProgramclass, create two Rectangle objects named rectangle1 and rectangle2. Set the length of rectangle1 to 10.0 and the width to 5.0. Set the length of rectangle2 to 7.0 and the width to 3.0. Print the value of rectangle1’s perimeter and area, and then…Given a variable Animal pet - which currently holds a reference to a Animal object, and two methods inside the Animal class with the headers: 1. public void setOwner(String ownerName, String address, boolean hasGarden) 2. public int getPetToHumanAge(String species, int petAge) 3. %should be static, but ok... Write two possible calls for each of these methods.