1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serjik [45]
1 year ago
10

See attached. I have code typed out but still having problems.

Computers and Technology
1 answer:
densk [106]1 year ago
5 0

The constructor that takes four arguments: the title, the artist, and two arguments representing the song length in minutes and seconds is given below:

<h3>The Java Code</h3>

public class Song

{

   // instance variable declaration

  private String songTitle;

  private String songArtist;

  private Duration songLength;

// Constructors

  public Song (String title , String artist , int min , int sec )

  {

       this( title , artist , Duration.ofMinutes( min ).plusSeconds( sec ) ) ;

  }

  public Song (String title , String artist , int totalSeconds )

  {

      this( title , artist , Duration.ofSeconds( totalSeconds ) ) ;

  }

  public Song (String title , String artist , Duration duration )

  {

      this.songTitle = title;

      this.songArtist = artist;

      this.songLength = duration ;

  }

Read more about java programming here:

brainly.com/question/18554491

#SPJ1

You might be interested in
Security measures are sometimes described as a combination of physical, technical, and administrative (PTA) safeguards. Which of
attashe74 [19]

Answer:

Measures including device data encryption, anti-malware software, and communications encryption.

6 0
3 years ago
You’re responsible for an always-on VPN connection for your company and have been told that it must utilize the most secure mode
liq [111]

Answer:

Tunneling

Explanation:

A networking protocol that is used to send data from one network to another network by encapsulation process.

It is the more secured method as it secures the data with the help of encapsulation process. Rest of the protocols are not helpful in security of data.

8 0
3 years ago
A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to sever
Leno4ka [110]

Answer:

B. Change the router's default administrative password

Explanation:

The best way to prevent any unauthorized use is to change the password to something more secure using 12 minimum characters and including number, symbols, upper and lower case.

4 0
3 years ago
Alma will make the honor roll if she has at least a 3.80 GPA and misses less than 5 days of school in a year. In which of the fo
Whitepunk [10]

Answer: 4. Alma has a 3.81 GPA and misses 3 days of school

Explanation: The others don't meet the requirments.

8 0
2 years ago
Which of the following is not a SQL*Loader file?
MatroZZZ [7]

Answer:

D. Good file

Explanation:

SQL loader is responsible for loading data from files into the database. It needs the mandatory control file, bad file, log file and an optional discard file.

A. Bad file

This file shares its name with the data file and has .bad extension.

The bad file holds all the records which are rejected ( bad data ). If a bad file is not available, it is automatically created. The data is either rejected by the SQL loader or by Oracle itself. The rejected records are not placed in the data file and hence, have to be placed in the bad file.

It is mandatory to have a bad file for every data file.

B. Control file

This is a mandatory file. This is a text file needed by the SQL loader to perform the loading process.

It contains the information related to location of data, specifies the criteria for selecting data for insertion, location for inserting data, and the like.

C. Discard file

The discard file is created if the need arises. This is not a mandatory file to be present.

The data which is discarded and gets filtered out, is placed in the discard file.

The data is not inserted in the table because it does not matches the criteria for the data to be inserted.

This criteria is mentioned in the control file.

The data is discarded only due to the mismatch and not because it is rejected or is bad data.

E. Log file

This file is mandatory to the execution. In absence of log file, the loader does not proceeds with execution and gets terminated.

In the beginning of the execution, a log file must be created by the loader. This file contains all the information regarding the data loading and also the errors encountered during the loading process.

6 0
3 years ago
Other questions:
  • How would I view the ruler on my document if it was not visible
    9·1 answer
  • Array A is not a heap. Clearly explain why does above tree not a heap? b) Using build heap procedure discussed in the class, con
    15·1 answer
  • Which of the following is the strongest password? Xo795&amp;A &amp;cGo9Tz F5h#3u9g vU7#$3T sC9$d&amp;cF5h#3u9g
    13·2 answers
  • The ability to learn a new computer software program is to ____________ as knowledge of state capitals is to _____________.
    11·1 answer
  • In a program, you need to store the identification numbers of 10 employees (as integers) and their weekly gross pay (as double v
    14·1 answer
  • A mobile device user is having problems launching apps and texting. The user touches an app to launch it, but the app icon next
    13·1 answer
  • What is not true about contracts?
    12·2 answers
  • What are ip addresses? why are these important for forensic scientists?
    5·1 answer
  • A. Why are the data known as raw facts? Explain.​
    14·2 answers
  • Which of the following is the key business objective behind the technologies implemented by PCL Construction, as discussed in th
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!