How to make classs constructer java.

Answers

Answer 1

Answer:

A constructor doesn't have a return type.

The name of the constructor must be the same as the name of the class.

Unlike methods, constructors are not considered to be members of a class.  

A constructor is called when a new instance of an object is created.

Explanation:


Related Questions

What will be assigned to the variable s_string after the following code executes? special = '1357 country ln.' s_string = special[ :4] '7' 5 '1357' '7 country ln.'

Answers

Answer:

1357

Explanation:

s_string = special[ :4]

"[:4]" means the first character up to the third character

Explain What Peer to Peer Networking is.

Answers

Answer:

peer to peer networking is like when joining together works

Why Is hexadecimal used for memory dumpsit:​

Answers

Answer:

Hexadecimal is used when developing new software or when trying to trace errors in programs. The contents of part of the computer memory can hold the key to help solve many problems. When the memory contents are output to a printer or monitor, this is know as a Memory Dump.

Answer:

Hexadecimal is used when making a new software/when attempting to discover bugs in programs. The contents of part of the computer memory can assist in solving many issues the program may have.

Select all the correct answers.
Which two tasks does a geologist perform?
prepares scaled drawings of construction sites for clients
operates large machinery to create clothing and rugs
investigates the formation process of rocks
measures earthquakes and tsunamis using seismographs
constructs skyscrapers with the assistance of various contractors
Reset Next

Answers

investigates the formation process of rocks
measures earthquakes and tsunamis

Which statement describe the advantages of using XML? more than one answer can be correct

A-it saves file space
B-it allows for data storage in a separate file
C-it is hardware dependent
D-it is software independent
E-it facilitates the transport of data

Answers

Answer:

The statements that describe the advantages of using XML are;

B-It allows for data storage in a separate file

D-It is software independent

E-It facilitates the transport of data

Explanation:

XML data can be stored in separate file such that the layout and display can designed in HTML whereby the data in the XML file can be changed without changing the HTML

XML is both software and hardware independent thereby it is possible to use the same XML to carry information to different computers and software

XML is used for data transport.

The purpose of a(n) __________ is to manage the flow of data between hardware components and allow the user to communicate with the computer.

Answers

Answer:

Operating System

Explanation:

what is a control flow statement? a programming statement that changes the order in which lines of code in a program are run a programming statement that sets up an if-then condition a line of code that counts down the number of times a loop should iterate a line of code that sets up a timer for how long a loop should iterate

Answers

A control flow statement is option A: programming statement that changes the order in which lines of code in a program are run.

What is control statement programming?

The sequence in which a script's statements are executed by the computer is known as the control flow. Unless the computer comes across the (very common) structures that affect the control flow, such as conditionals and loops, code is executed from the first line in the file to the last line.

Control flow diagrams do Permit the programmer to alter the program's flow through the CPU. Halt. The simplest control flow statement instructs the program to stop running right away.

Therefore, Control statements are those that alter the order in which statements are executed. For instance, statements like If, If-else, Switch-Case, and while-do. Control statements within a program are those the flow of statement execution.

Learn more about control flow statement  from

https://brainly.com/question/12908248
#SPJ1


PLEASE NO PLAGIARISM I CHECK FOR PLAGIARISM ON CHEGG.
1. Do you think that DNA-driven computers are truly a promise of
the future?
2. What might be some advantages and disadvantages of such
computers?

Answers

Question:
1. Do you think that DNA-driven computers are truly a promise of the future
2. What might be some advantages and disadvantages of such computer:
DNA-driven computers are a promise of the future that has the potential to revolutionize computing. These computers use DNA molecules to perform calculations, which has several advantages. But like any new technology, there are also potential disadvantages to be considered. Let's have a look at the main answer and explanation to these questions.

1. DNA-driven computers are truly a promise of the future. DNA-driven computers are currently in the early stages of development, and they show great promise for the future of computing. These computers are incredibly powerful, able to perform millions of calculations simultaneously. They can also store vast amounts of data in a very small space.

One of the most significant advantages of DNA-driven computers is their speed. Because they operate on a molecular level, they can perform calculations much faster than traditional computers. They are also incredibly energy-efficient, which makes them ideal for use in situations where power is limited.

DNA-driven computers also have the potential to solve some of the most complex problems in science and medicine. They can be used to model complex biological systems, simulate chemical reactions, and even design new drugs.

2. Advantages and disadvantages of DNA-driven computers.
:
Advantages:
- DNA-driven computers are very fast and energy-efficient
- They can store vast amounts of data in a very small space
- They have the potential to solve some of the most complex problems in science and medicine

Disadvantages:
- DNA-driven computers are currently very expensive to produce
- They require specialized equipment and expertise to operate
- They are still in the early stages of development, so their full potential is not yet known.

In conclusion, DNA-driven computers are a very promising technology that has the potential to revolutionize computing. While there are some potential disadvantages to be considered, the benefits of these computers are many. With further development, they may become a powerful tool for solving some of the most complex problems in science and medicine.

To know more about computers visit:

https://brainly.com/question/32297640

#SPJ11

Which of the following statements is true regarding the relationship of engineers and technology? O a. None of these statements is true O b. Engineers must adopt the technological pessimism view Oc. Engineers must adopt a critical attitude toward technology O d. Engineers must adopt the technological optimism view

Answers

Technology read-ahead, technology free-ahead Sequential access is the process of accessing a collection of items in a predetermined, ordered manner, such as data stored on magnetic tape, in a disk file, or in a memory array.

None of the aforementioned technologies can optimize sequential access. It is the opposite of random access, which makes it possible to access any part of a sequence at any time and from any location with the same ease and efficiency.

For instance, sequential access may be the only means of accessing the data when it is stored on a tape. It could likewise be the favored admittance procedure, for example, assuming everything necessary is the deliberate handling of a progression of information pieces.

To know more about sequential access:

brainly.com/question/12950694

#SPJ4

John is directing a television series. He has to shoot a scene that presents the lead character in a dominating and commanding position.

What
shooting technique should he use?

(NO LINKS!!!!)

A low angle
B. high angle
C. Dutch tilt
D. front angle

Answers

The answer is D hope this helped.

Answer:

it is A or B

Explanation:

I know it is either A or B because I took the test and tried Dutch tilt n front angle, got them both wrong on my 1st and second try.

a data analyst includes a code chunk in their .rmd file. what does this allow other users to do? select all that apply.

Answers

A data analyst includes a code chunk in their .rmd file, allow other users to do

Modify code directly from the .rmd fileExecute code directly from the .rmd fileCopy code directly from the .rmd file

What is code chunk?An R code chunk is an executable section of code. The computations will be redone if the document is produced again. Because there is less chance of a mismatch between a paper's commentary and the results being addressed, code chunk technology is advantageous. Since RMD files are saved as plain text, you can examine and update the metadata by opening them in a text editor like Apple TextEdit (Mac) or Microsoft Notepad (Windows). R markdown is a text-based formatting language that enables you to integrate both code and explanatory prose into one document. A header, text, and code chunks make up a R markdown document. R markdown files (. Rmd) can be converted into other document formats, such as html, pdf, or docx, to produce reports or web applications.

The complete question is,

A data analyst includes a code chunk in their .rmd file. What does this allow other users to do? Select all that apply.

Modify code directly from the .rmd file

Undo original project code directly from the .rdm file

Execute code directly from the .rmd file

Copy code directly from the .rmd file

To learn more about code chunk refer to:

https://brainly.com/question/29494262
#SPJ4

The Ruiz twins saw that they earned $324.55 this month and made the decision to put in more time next month. In this situation, the number $324.55 functions as _____. data information knowledge input

Answers

Answer:

knowledge

Explanation:

The correct option is - knowledge.

Reason -

Knowledge is facts, information, and skills acquired by a person through experience or education

Also knowledge is the theoretical or practical understanding of a subject.

You’ve been stuck in bumper-to-bumper traffic for nearly an hour on a hot summer day. The temperature warning light has just come on. How will you handle this situation? What safety precautions will you take?

Answers

Answer:

In a bumper-to-bumper traffic, when the engine starts overheating the situation can be handled by tapping the accelator which will revive the engine.

Explanation:

Overheating of engine can be due to many reasons. But one should know what to do when an engine overheats in a traffic. Bumper-to-bumper traffic is when the cars are so close in traffic that they touch each other. This usually happens when there's a traffic for a long time or on very busy lane. During summer times, it is important to keep checking the engine temperature to avoid any problem.

When one is stuck in bumper-to-bumper traffic with overheating engine, then there are some meausres that one can take. They are:

To put the car on park or neutral mode of driving and tap the accelator which will revive the engine. The heat can be disperse by rolling down the window and turn the heater up. It will disperse the heat.

At one time, ibm was one of the largest manufacturers of personal computers. What was a product that ibm was well known for that came before computer?.

Answers

Answer:

A counting machine

Explanation:

IBM was well known for making a counting machine before they made computers

Implement the merge sort algorithm using a linked list instead of arrays. You can use any kind of a linked structure, such as single, double, circular lists, stacks and/or queues. You can populate your list from an explicitly defined array in your program. HINT: You will not be using low, middle and high anymore. For finding the middle point, traverse through the linked list while keeping count of the number of nodes. Break up the list into two, null terminated lists, based on the node count. //Here is a portion of what mergeSort function would look like: //a points to the left partition, b points to the right partition. They would be passed by reference. IYou would then recursively process each partition. return NULL return head a mergeSortía); b-mergeSort(b) return (c) //These are the function headers void split (node head.node&a,node &b node* merge(node a, node b node* mergeSorti node head) Make sure to account for when head is null or when there is only one item in the list age 1 of 1171 words +80%

Answers

Use a linked list to implement the merge sort algorithm to order a list of values. Recursively sort each half of the list after splitting it in half, then combine the sorted halves.

How is the linked list and merge sort used?

uses the merge sort technique to order a linked list. to divide the centre node's list into two equal parts. At some point, we'll sort each component independently, then combine them to create a single sorted list.

#include

using the std namespace;

/ Public: int data; Node* next; The linked list class Node's Node class.

Node(int val): data = val, next = NULL, and ;

The following code divides a linked list into two halves: void split(Node* head, Node*& a, Node*& b) int count = 0; Node* curr = head; while (curr!= NULL) count++; curr = curr->next;

for (int I = 1; I mid; i++); curr = head; a = head; int mid = count / 2; "curr" means "curr->next," etc.

If b = curr->next and curr->next is NULL, then

/ Merge two sorted linked lists with this function.

If (a == NULL) returns b, then Node* merge(Node* a, Node* b) returns NULL;

else, if (b == NULL), return a;

If (data->a > data->b), if result = a, then result->next should be merge(a->next, b); otherwise, if result = b, then result->next should be merge(a, b->next); return result;

/ Recursive function that merge sorts the nodes in a linked list.

To know more about algorithm  visit:-

https://brainly.com/question/24452703

#SPJ1

You are the network administrator for a growing business. When you were hired, the organization was small, and only a single switch and router were required to support your users. During this time, you monitored log messages from your router and switch directly from each device's console.The organization has grown considerably in recent months. Now you manage eight individual switches and three routers. It's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner.What should you do?A- Use a remote access utility such as SSH to access router and switch consoles remotely.B- Hire additional resources to help monitor and manage your network infrastructure.C- Use syslog to implement centralized logging.D- Consolidate network resources down to one or two switches.

Answers

Answer:

-use syslog to implement centralized logging

Explanation:

A survey result shows that cell phone usage among teenagers rose from 63% in 2006 to 71% in 2008. Of the following choices, which two statements about cell phone use among teenagers is true? Cell phone usage rose by 8 percentage points. Cell phone usage rose by 11.2%. Cell phone usage rose by 8 percentage points. Cell phone usage rose by 12.7% Cell phone usage rose by 11.2 percentage points. Cell phone usage rose by 12.7%. Cell phone usage rose by 12.7 percentage points. Cell phone usage rose by 8%. RATIONALE

A developer is reading an article on a web page and sees a hyperlink to another page. They decide to open the link in a new tab of her browser.

Which of the following is true about this process?


The JavaScript from the first tab is shared with the second tab via the hyperlink.


New HTML, CSS, and JavaScript are executed in the second tab when it is opened. Answer


The second tab displays the new page, then runs its HTML.


The second tab compiles the new page’s JavaScript before loading.

Answers

In the survey results, cell phone usage among teenagers rose from 63% to 71%.


What are the true statements?

The two true statements are:

Cell phone usage rose by 8 percentage points (71-63) Cell phone usage rose by 12.7% ([71-63]/63*100).

Regarding the developer opening a hyperlink in a new tab, the true statement is: New HTML, CSS, and JavaScript are executed in the second tab when it is opened.

This means that the second tab loads a new web page with its own set of resources, and does not share JavaScript or any other code with the first tab.

The HTML, CSS, and JavaScript for the new page are fetched and executed independently in the second tab.

Read more about HTML here:

https://brainly.com/question/4056554

#SPJ1

i need help on what im doing wrong

i need help on what im doing wrong

Answers

Answer:

The error is that you're trying to convert a string with letters inside into an int. What happens if a user type in 'a' instead of '1'? 'a' is not a number so the int('a') would fail and give you an error. Make you add a line to check whether the input a number or not.

Explanation:

Change your code to

DEorAP  = input("Is it AP or DE?")

if DEorAP.isdigit()

  DEorAP = int(DEorAP)

how do you award a brainliest

Answers

Answer: Usually there has to be 2 answers. When you go to the answers on your question there should be a outlined crown or something like that, then you click that.

Which option is a means of reporting events via the Internet? O A. Taking photos to upload O B. Browsing for fun O C. Downloading music videos D. Searching with search engines​

Answers

Answer:

your answer is A!

Explanation:

photos are often a great form of proof or example material when reporting something over the web!

1. A teacher asked a student to capture and print out a one-slide presentation using MSWord,       showing everything on the screen.
i)       What keys or combination of keys can be used to carry out this operation ?
ii)     Describe the procedures to be followed by the student in carrying out this operation?
iii)  Describe the procedure to be followed by the student in carrying out this assignment using the keyboard.
b) A system Analyst was hired to set up a computer laboratory for Gan di Gan International      School,
    i.) Mention three hardware devices the analyst would need to set up the laboratory
   ii) List two database applications likely to be recommended by the analyst
  iii) State five Word Processing packages likely to be installed

Answers

The keyboard combinations that can be used to capture and print out a one-slide presentation using MSWord, showing everything on the screen is Function key + PrtScr

What is a Key Combination?

This refers to the procedure that is used to combine two or more keys on the keyboard to execute a task.

Hence, we can see that the procedure that can be used to carry out the operation is:

Enter the screen you want to capture and printPress the Function key, followed by the PrtScr. Please note this can vary slightly, depending on the keyboard.

The hardware devices that would be needed to be set up by the system analyst at a computer laboratory are:

System UnitLaptops/MonitorPower adaptersEthernet cables, etc

The database applications that can be recommended by the system analyst are:

MySQL, SQL Server

The five word processing packages that are likely to be installed are:

G00..gle DocsMsWordMSOfficeDropbox PaperCorel WordPerfect

Read more about word processing here:

https://brainly.com/question/985406

#SPJ1

Identify the computer career described below:
Works closely with users to analyze their requirements, designs and develops
additional information systems, and incorporates new technologies.
IT Consultant
Database administrator
Systems analyst
O Corporate Trainer

Answers

The computer career described above is a Systems Analyst

Who is a Systems Analyst?

A Systems Analyst collaborates with users to comprehend their specifications, assesses current systems, creates and builds novel information systems, and integrates advanced technologies to fulfill the organization's demands.

They aim to connect business needs with technological solutions, ensuring that the systems are capable of effectively meeting the intended user's requirements.

System Analysts have an important contribution to make in the implementation, testing, and management of information systems within a company, in addition to their primary role.


Read more about system analysts here:

https://brainly.com/question/30364965

#SPJ1

Applications and services can be assigned to a _____ in order to assign permissions to the application or service.

Answers

Applications and services can be assigned to a role in order to assign permissions to the application or service.

Check more about Computer Application below.

What are Computer Application?

This is known to be a Software classification. An application program is a seen as computer program set up to do a specific task in a system.

A software are system packages that are often made by people to address some particular issues in regards to computing.

Hence, Applications and services can be assigned to a role in order to assign permissions to the application or service and this is what hey work as.

Learn more about Applications  from

https://brainly.com/question/24264599

#SPJ1

post the solve
Q.1 Write all the MATLAB command and show the results from the MATLAB program Solve the following systems of linear equations using matrices. 2y = 8z = 8 and -4x + 5y +9z = -9. x-2y+z=0,

Answers

The solution for the given system of linear equations is x= 3, y = -1, and z = 2.

As the given system of linear equations can be represented in matrix form as:

| 0 2 8 | | y | | 8 |

| -4 5 9 | x | y | = |-9 |

| 1 -2 1 | | z | | 0 |

MATLAB commands to solve the system of linear equations are:

1. Define the coefficient matrix and constant matrix:

>> A = [0 2 8; -4 5 9; 1 -2 1];

>> B = [8; -9; 0];

2. Solve for the variables using the command ‘\’ or ‘inv’:

>> X = A\B % using ‘\’ operator

X =

3.0000

-1.0000

2.0000

>> X = inv(A)*B % using ‘inv’ function

X =

3.0000

-1.0000

2.0000

Hence, the solution for the given system of linear equations is:

x = 3, y = -1, and z = 2.

Learn more about MATLAB: https://brainly.com/question/30641998

#SPJ11

how does kernel know what functions to run when a trap occurs? group of answer choices none of these options. the kernel does not really keep track of traps generated by users. the kernel has an implementation of a trap table that maps trap numbers to system call handlers. the programmer is responsible for writing exception-handling code for the kernel.

Answers

The task of developing the kernel's exception-handling code falls to the programmer.

How much do programmers make?

How much are programmers paid? Yes, generally speaking. Some professions call for more skills and knowledge than in others, and some software engineers are in greater demand than others. But, a programmer in whatever position is a professional person who is entitled to a specific amount of pay. In May 2021, the average yearly pay for software developers was $93,000.

What kind of work does a coder do?

Because computer programmers develop, test, and maintain code, automated systems and programs work. These employees work along with engineers and software developers. They could follow schematics created by software developers when writing code.

To know more about Programmer visit:

https://brainly.com/question/23275071

#SPJ4


Directions: To avoid early damage in the tools, how will you sanitize and store the

following tools in your kitchen. Write your answers in the activity notebook following

the given columns.

Tools Proper Sanitation Proper Storage

Answers

Answer:

1)sterilizing

2)use bleach and water

3)when you wash the measuring spoon,wash them using warm soapy water then rinse them in clear water

4)use a fresh solution of 1 tablespoon of unscented,liquid chlorine bleach per gallon of water

5)let it set in soapy water over night

6)set it in soapy water five minutes and scrub each potter

7)wash mixing bowl in hot ,soapy water to add it to a dishwasher load

8)use a ratio of one part bleach to 20parts of water

9)pour water on thr blender and add dish soap

10)wipe it using clean and smooth towel

how can you eliminate the need to open a dedicated tcp port on your corporate firewall when using mac computers to share screens from the local and remote computers?

Answers

An individual can connect to a remote server from any browser.  For an an individual to be able eliminate the need to open a dedicated TCP port on your corporate firewall when using Mac computers to share screens from the local and remote computers, one must use a third-party remote access app that uses a browser.

A TCP-IP port is simply known as a term that is use  with some dedicated function.

Ports that has number below 255 are used as dedicated ports. Dedicated ports are said to be well-known ports. It is a way to transmit data in a TCP/IP network

TCP is simply defined as a connection-oriented protocol that needs a link  or a circuit between the source sending computer and the destination computer.

Learn more from

https://brainly.com/question/25677840

First, read in an input value for variable valCount. Then, read valCount integers from input and output each integer on a newline followed by the string" reports.".

Ex: If the input is 3 70 65 75, the output is:

70 reports.
65 reports.
75 reports.​

Answers

Answer:

The program in Python is as follows:

valCount = int(input())

reports = []

for i in range(valCount):

   num = int(input())

   reports.append(num)

   

for i in reports:

   print(i,"reports.")

Explanation:

This gets input for valCount

valCount = int(input())

This creates an empty list

reports = []

This gets valCount integer from the user

for i in range(valCount):

   num = int(input())

Each input is appended to the report list

   reports.append(num)

This iterates through the report list

for i in reports:

This prints each element of the report list followed by "reports."

   print(i,"reports.")

what's the valency of carbon , electron configuration 2,4?​

Answers

Answer:

4 is the valency of carbon

because it has 4 valence electrons

hope it helps

a computer typically connects to a router via a...

Answers

Usually, a network interface card is used to link a computer to a router. A separate LAN card is not required today because the majority of modern PCs have NIC cards integrated into the motherboard.

A computer's NIC offers a dedicated, constant connection to a network. It implements the physical layer hardware needed to communicate with a data link layer standard, such as Ethernet or Wi-Fi. Each card functions as a device and has the capacity to organize, transmit, and control the flow of data throughout the network. NICs are directly linked to the motherboard of your computer, either near the USB ports on the back or on the back of the computer (for external network expansion cards) (for onboard NICs). These cards are still extensively used for desktop PCs that lack a motherboard-integrated Ethernet port. Together with other networking devices, NICs are used to establish a connection to a network. Utilizing NICs, only other devices can be connected to. You need a router in order to connect to the internet. Routers are what connect a local network to the internet.

Learn more about network interface card here

https://brainly.com/question/20689912

#SPJ4

Other Questions
EACH of the following is a criterion for evaluating whether an exposure causes a disease or other health outcome EXCEPT:- Multicausality of necessary exposures has been ruled out- the exposure occurred before the onset of the disease- there is a strong statistical association between the exposure and outcome- there is a reasonable biological explanation for why the exposure might cause the outcome PLEASE ANSWER WILL GIVE BRAINLESS What is the best way to measure agile quality? Ishmael made a mistake in his checkbook. He wrote a check for $89.80 for his Verizon bill but mistakenly recorded it in his checkbook as an $89.80 deposit. A) Represent each transaction with a rational number. B) Explain the difference between the transactions. find the k-value so that the point is on the line kx+3y=7; (1,-k) I NEED HELP ASAP!!!If angle MNO = 80, find angle MIf Type your answer as an integer or round to the nearest tenth. is america a democracy or a constitutional republic A marginal change is a small incremental adjustment to an existing plan of action. Select one: True or False What is the impact of the transportation policy in Malaysia?What is the role and authority of the government, policy makers,and transport planner to improve transportation policy? Write a multiparagraph essay that analyzes the shift in focus that occurs in paragraph 3 of the "Gettysburg Address"and explains what Lincoln thinks is the task left to his hearers. Use evidence from the address to support your analysis.Be sure to observe the conventions of standard English. which switch campus three-tier topology role provides an aggregation point for the switches that connect directly to end user devices? -6n - 2n = 16 solve for n multi step equations it is also superior to only relying upon a peaceful popular vote because .... Aphrodite compared to other goddess? consider the set of integers from 1 to 20 inclusive. this set has how many 3-element subsets, such that no two consecutive integers are in the subset? An amendment to the texas constitution requires a balanced budget. This means that _____. The figure below shows parallel lines cut by a transversal: A pair of parallel lines is shown, cut by a transversal. Angle 3 is located in the upper right exterior corner on the top line, and angle 4 is located in the lower left exterior corner of the bottom line. Which statement is true about 3 and 4? 3 and 4 are congruent because they are a pair of alternate exterior angles. 3 and 4 are complementary because they are a pair of alternate exterior angles. 3 and 4 are complementary because they are a pair of alternate interior angles. 3 and 4 are congruent because they are a pair of alternate interior angles. (100 points) Hertz and Enterprise are rental car companies. Hertz charge's $50 for the rental, plus $40 for each day. Enterprise charges $40 for the rental, plus $45 for each day. What is the first day that Enterprise will be more expensive? which of the following statements is/are true about stem cells? check all that apply. check all that apply embryonic stem cells are specific and each can only develop into one type of cell.embryonic stem cells are specific and each can only develop into one type of cell. totipotent stem cells can develop into any type of human cell.totipotent stem cells can develop into any type of human cell. adult stem cells undergo mitosis in the process of differentiating into mature cells.adult stem cells undergo mitosis in the process of differentiating into mature cells. the number of times a stem cell undergoes mitosis is called plasticity.the number of times a stem cell undergoes mitosis is called plasticity. the cells that give rise to sperm and egg cells are unipotent stem cells.the cells that give rise to sperm and egg cells are unipotent stem cells. the Cinde of the radius (2) Evaluate x2 + y2 + 8x+6y=0 (a) (6 (5) 25 ( 4 (d) 5