1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ExtremeBDS [4]
3 years ago
6

Design and implement a class called Sphere that contains instance data that represent the sphere’s diameter. Define the Sphere c

onstructor to accept and initialize the diameter, and include getter and setter methods for the diameter. Include methods that calculate and return the volume and surface area of the sphere (see Programming Project 3.5 for the formulas). Include a toString method that returns a one-line description of the sphere. Create a driver class called MultiSphere, whose main method instantiates and updates several Sphere objects.
Computers and Technology
1 answer:
Zolol [24]3 years ago
3 0

Answer:

Import java.awt.*;

import java.util.*;

public class Sprhere

{// Instance Data private double surfaceA, volume, r, diameter; //Constructors public Sphere ()

{r = 0;diameter = 0; surfaceA = 0;volume = 0;}

public Sphere (double radius, double d, double SA, double v)

{this. r = radius; this. diameter = d; this. surfaceA = SA;this.volume = v;}

//--------------------------------------------------------------------// Accesors.//--------------------------------------------------------------------public double get Radius()

{return r;}

public double get Diameter()

{return diameter;}

public double get SurfaceA()

{return surfaceA;}

public double get Volume()

{return volume;}

//--------------------------------------------------------------------// Mutators.//--------------------------------------------------------------------

You might be interested in
So if i was a you tuber and i went to a very popular site and posted my channel link but i am not a very big you tuber what woul
luda_lava [24]

Answer:

10%-30%

Explanation:

depends on what site and how the site works

5 0
3 years ago
What is Server Message Block (SMB) used for in Windows and can a hacker still damage a network using SMB?
Aleksandr [31]

Answer:

The absolute most decimating ransomware and Trojan malware variations rely upon vulnerabilities in the Windows Server Message Block (SMB) to proliferate through an association's system. Windows SMB is a convention utilized by PCs for record and printer sharing, just as for access to remote administrations.  

A fix was discharged by Microsoft for SMB vulnerabilities in March 2017, yet numerous associations and home clients have still not applied it. So now, the unpatched frameworks permit dangers that exploit these vulnerabilities inside, helping dynamic malware crusades spread like Californian rapidly spreading fire.  

SMB vulnerabilities have been so effective for danger entertainers that they've been utilized in the absolute most unmistakable ransomware episodes and refined Trojan assaults of the most recent two years. Truth be told, our item telemetry has recorded 5,315 discoveries of Emotet and 6,222 of TrickBot in business systems—two Trojan variations that are utilizing the SMB vulnerabilities—over the most recent 30 days alone.

7 0
3 years ago
Read 2 more answers
What grants the creator of work exclusive rights for use and distribution
Vesna [10]

Answer:

Copyright law grants you several exclusive rights to control the use and distribution of your copyrighted work. The rights include the exclusive power to: reproduce (i.e., make copies of) the work; create derivative works based on the work (i.e., to alter, remix, or build upon the work)

4 0
3 years ago
If a compiler detects a violation of language rules, it refuses to translate the class to ____.
Lubov Fominskaja [6]

Answer:

The correct answer is a. Machine code

Explanation:

The syntax of a language is a set of rules that indicates how to write programs.

A compiler is a system that in most cases has to handle an incorrect entry. Especially in the early stages of creating a program.

Syntactic errors are those that occur at the time of writing the program in the high level programming language and that do not comply with the grammatical rules of said programming language. These errors are generally detected by the compiler itself, since it only translates programs that are ''well written''. Therefore, a program that contains syntactic errors can never be compiled.

In summary, syntax errors are detected in the process of translating source code into binary code. On the contrary that happens with the errors of execution and of logic, that can only be detected when the program in being executed.

7 0
3 years ago
Read 2 more answers
When you make taffy (a pliable candy), you must heat the candy mixture to 270 degrees Fahrenheit. Write a program that will help
hichkok12 [17]

Answer:

The solution code is written in Python 3.

  1. temp = int(input("Enter current temperature (Fahrenheit): "))
  2. while(temp < 270):
  3.    temp = int(input("Enter current temperature (Fahrenheit): "))
  4.    
  5. if(temp > 330):
  6.    print("You burned the taffy!")
  7. else:
  8.    print("Your taffy is ready for the next step")

Explanation:

Firstly, we can try to get a first temperature reading (Line 1)

if the first reading is smaller than 270, keep prompting user for the next reading using while loop (Line 3 - 4)

if the input temperature is bigger or equal to 270, the program will exist the while loop and proceed to check if the final temperature reading is bigger than 330 to determine an appropriate message to display (Line 6 - 9).

3 0
3 years ago
Other questions:
  • what's the best mouse for fast clicking ? I play a lot of fps and a lot of pvp games I need a mouse that I can click fast with a
    14·1 answer
  • friend wanted us to decode this message ----- .---- ----- ----- .---- ----- ----- .---- / ----- .---- .---- .---- ----- .---- .-
    11·1 answer
  • CPT, which is used to code procedures in an office, is an example of a/an
    12·1 answer
  • What do you understand by technological depenence?
    9·1 answer
  • A lack of financial literacy can cause you to lose your
    10·1 answer
  • What are the differences betweenCONS, LIST, and APPEND?
    5·1 answer
  • Team ordering You have the results of a completed round-robin tournament in which n teams played each other once. Each game ende
    15·1 answer
  • When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework
    8·1 answer
  • Pleaseeeee helppp
    5·1 answer
  • Why can i go to discord if my school blocks it-
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!