1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga_2 [115]
4 years ago
5

In Java, write a constructor in such a way that a Vehicle object with color and type can be constructed directly via, say:

Computers and Technology
1 answer:
olya-2409 [2.1K]4 years ago
5 0

Answer:

Explanation:

  • In Java, a Constructor is similar to that of a method which will be called when creating a new object for the class.
  • There is no return type for a Constructor.
  • public Vehicle (String color, String type)

        {

        colourName = color;

        typeName = type;

        }

  • In Java, you can use new operator to create an object of a class.
  • Here, the object for the class Vehicle is created like Vehicle vehicle = new Vehicle("Pink", "Car");
  • When creating the object of the class, the new operator calls the constructor.
  • If there is no constructor defined explicitly, a default constructor is created by the compiler.
You might be interested in
Describe a sub routine​
Maksim231197 [3]

Explanation:

A routine or subroutine, also referred to as a function procedure and sub program is code called and executed anywhere in a program. FOr example a routine may be used to save a file or display the time.

4 0
3 years ago
You have been tasked with ensuring that access to certain server managed resources is only available to client devices with TPM
elixir [45]

Answer:

Device Health Attestation Services

Explanation:

Based on the scenario being described it can be said that the Windows Server role that can be used to automate this check is known as Device Health Attestation Services. This is a role that allows the administrator to automatically check if a device has the required trustworthy BIOS, TPM, or boot software enabled, as well as Bitlocker encryption.

7 0
3 years ago
Need answer ASAP
Alinara [238K]

both software coding and testing occurs during Engineering phase

6 0
3 years ago
Name 3 supercomputers along with their cost, purpose and the country it is located.​
Alika [10]

Answer:

The three super computers are

a) Fujitsu Fugak

b) IBM Summit/IBM/Nvidia/Mellanox

c) Sunway TaihuLigh

Explanation:

Three super computers are as follows

a) Fujitsu Fugak - It is located in Kobe, Japan and its costs is ¥130 billion

b) IBM Summit/IBM/Nvidia/Mellanox - It is located in Oak Ridge, U.S. and it costs $325 million

c) Sunway TaihuLigh- It is located in Wuxi, China and it costs US$273 million

5 0
3 years ago
High-speed memory that reduces the frequency of access by the CPU to conventional memory is called: a. local memory b. cache mem
mestny [16]

Answer:

B. Cache memory.

Explanation:

A cache memory, a special type of random access memory, is a memory that is easily accessibly by a system's CPU (or microprocessor) more quickly than even the regular random access memory. It serves as a buffer between the RAM and the processor. Frequently and commonly used data, programs and applications are temporarily stored in the cache memory so that they are readily accessible and available to the processor. It is as a matter of fact the fastest memory in a computer.

The cache memory comes in three levels - L1, L2 and L3.

L1 cache are often built into the computer's core(s). They are generally small in size between 8KB and 64KB.

L2 and L3 caches are larger than the L1 cache and most times are separate from the CPU.

7 0
4 years ago
Other questions:
  • Which type of system must you connect to and use to make changes to Active Directory?
    15·1 answer
  • Read the scenario below and then answer the
    14·1 answer
  • Consider the problem of solving two 8-puzzles.
    10·1 answer
  • What Is an Antivirus?
    14·2 answers
  • In cell K26, create a formula that counts the number times "Thunder" occurs in the columns containing "Names"
    7·1 answer
  • __________ is a term used to indicate any unwanted event that takes place outside normal daily security operations. This type of
    11·1 answer
  • WILL GIVE BRAINLIEST!!!!!!!
    10·2 answers
  • What validation type would you use to check that numbers fell within a certain range? a) range check b)presence check c)check di
    9·1 answer
  • 8
    7·1 answer
  • What is a best practice when approaching an automation effort?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!