1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ExtremeBDS [4]
3 years ago
6

Design and implement a class called Sphere that contains instance data that represent the sphere’s diameter. Define the Sphere c

onstructor to accept and initialize the diameter, and include getter and setter methods for the diameter. Include methods that calculate and return the volume and surface area of the sphere (see Programming Project 3.5 for the formulas). Include a toString method that returns a one-line description of the sphere. Create a driver class called MultiSphere, whose main method instantiates and updates several Sphere objects.
Computers and Technology
1 answer:
Zolol [24]3 years ago
3 0

Answer:

Import java.awt.*;

import java.util.*;

public class Sprhere

{// Instance Data private double surfaceA, volume, r, diameter; //Constructors public Sphere ()

{r = 0;diameter = 0; surfaceA = 0;volume = 0;}

public Sphere (double radius, double d, double SA, double v)

{this. r = radius; this. diameter = d; this. surfaceA = SA;this.volume = v;}

//--------------------------------------------------------------------// Accesors.//--------------------------------------------------------------------public double get Radius()

{return r;}

public double get Diameter()

{return diameter;}

public double get SurfaceA()

{return surfaceA;}

public double get Volume()

{return volume;}

//--------------------------------------------------------------------// Mutators.//--------------------------------------------------------------------

You might be interested in
Computer Hardware and Maintenance
Gnesinka [82]

Answer:

All of these answers

Explanation:

8 0
3 years ago
Have all of my coins because i will delete acount there will be part 2, 3 , 4 ,5,6,7,8
kirza4 [7]
Thank you very much your are awesome
3 0
3 years ago
Read 2 more answers
What is a binary message
noname [10]
Binary SMS messages allow sending of various types of rich-content, such as transfering ringtones, telphone system settings and WAP-Push via text messaging. Any binary SMS message has 140 bytes of data which can be used. This data is split into two distinct parts - the user data header (UDH) and the message data.
4 0
3 years ago
Read 2 more answers
A network administrator is examining a RIPv2 routing table and notices that several subnets are advertised in individual entries
timama [110]

Answer:

Answer to the following question is to Use the auto-summary command.

Explanation:

Because with the implementations of the dynamic routing protocol, the RIP summarizes the networks at the classful boundary by default. Configure the router to automatically summarizes the networks, auto-summary command would be used.

An auto summarization is the features that allow the RIP(Routing Information Protocol) to summarizes its route to their the classful network automatically. For example, To consider that we are plan to use the eight subnets of the class B default the networks 172.16.0.0/16, subnet using three-bits subnetting.

5 0
3 years ago
Compunere toamna minim 15 randuri<br> VA ROGGGGG!!!!!!!!!!!
Natasha2012 [34]
Answer: what
explanation: what??
7 0
3 years ago
Other questions:
  • Alcatel-Lucent’s High Leverage Network (HLN) increases bandwidth and network capabilities while reducing the negative impact on
    6·1 answer
  • Suppose we are comparing implementations of insertion sort and merge sort on the same machine. for inputs of size n, insertion s
    10·1 answer
  • Which process refers to starting up a computer?
    13·2 answers
  • A sentinel value ________ and signals that there are no more values to be entered:____
    14·1 answer
  • Consider a network of 8 routers connected together to provide more than one path of connectivity between host A and host B at tw
    8·1 answer
  • Jack is going for a safari. Which camera should he take with him and why?
    6·1 answer
  • 2.7 code practice question 1 edhesive
    13·2 answers
  • The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities.
    15·1 answer
  • Which of these is true about moores law
    6·1 answer
  • The largest amount of data, in bytes, which can be accomodated by a particilar network, link, or physical-layer is called the?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!