1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Talja [164]
3 years ago
9

Suppose TestSimpleCircle and SimpleCircle in Listing 9.1 are in two separate files named TestSimpleCircle.java and SimpleCircle.

java, respectively. What is the outcome of compiling TestsimpleCircle.java and then SimpleCircle.java?
Computers and Technology
1 answer:
Brilliant_brown [7]3 years ago
3 0

Answer:

Both will compile without any error

Explanation:

Since there was nothing to note we assume that they have no errors in them, we compile each java file by typing javac "name of file.java", javac TestsimpleCircle.java in the case of TestsimpleCircle file, and later go on to type java TestsimpleCircle to see the output. Java files can be compiled either in the console (as done above) or in the development environment like Netbeans where you click the run button and it compiles and run the program for you.

You might be interested in
What steps can you take to secure your private information?.
pogonyaev

Answer:

Below:

Explanation:

1. Practice mail security. Use a public mailbox rather than your home mailbox to send bill payments and other mail containing sensitive information. Pick your mail up promptly and ask the post office to hold it while you’re away.

2. Guard your Social Security number. Don’t carry your Social Security card, military ID, Medicare, or other cards that have your Social Security number on them unless you are going somewhere where you will need them. Only provide your Social Security number when there is a legitimate need to do so.

3. Lock and shred. Keep your billing and banking statements and other personal records locked up and shred them when no longer needed.

4. Stop prescreened credit and insurance mailings. Call toll-free 1-888-567-8688 to get off mailing lists for credit and insurance offers. Your Social Security number will be required. This keeps thieves from intercepting and accepting the offers in your name and doesn’t affect your eligibility for credit or insurance.

5. Keep private information to yourself. Never respond to phone calls or emails asking to confirm your Social Security number or account numbers. Don’t leave PIN numbers, passwords or other personal information around for others to see.

6. Be safe online. Use anti-virus and anti-spyware software and a firewall on your computer and keep them updated. When you provide financial or other sensitive information online, the address should change from “http” to “https” or “shttp.” A symbol such as a lock that closes may also indicate that the transmission is secure.

7. Look at your bills and bank statements promptly. If you find any charges or debits that you never made, contact the bank or company immediately.

Hope it helps.......

It's Muska...  

6 0
3 years ago
An archive of files that usually contain scripts that install the software contents to the correct location on the system is ref
Anika [276]

Answer:

Option 3 is the correct answer for the above question.

Explanation:

  • A tarball is a software which is used to encrypt the other software or hide the other software and make it small. It again makes the original software program from the encrypted ones.
  • It is used to make the file sort and can use for the transfer which takes some amount of memory.
  • The above question asked about that technology which is used to make encrypted software from the original software and use it with the help of some script. Then the answer is tarball which is referred to from option 3. Hence Option 3 is the correct answer for the above question while the other is not because--
  • Option 1 states about the package manager which is used to manage the library only.
  • Option 2 states about the DBMS which is used to manage the database.
  • Option 4 states about the router which is used for the internet.

8 0
3 years ago
Easy coding question, please help.
borishaifa [10]

Answers:

What is the index of the last element in the array? stArr1.length()-1

This prints the names in order. How would I print every other value? Change line 4 to: index = index +2

Change line 7 to: i < names.length

5 0
3 years ago
The word software is interchangeable with what word
defon
It could be interchangeable with the word program
4 0
3 years ago
Why is it important to think about the programming language to use?
Sloan [31]
In think is C or B in my opinion
6 0
3 years ago
Other questions:
  • What does cro stand for?
    7·2 answers
  • Fill in the blanks:(a)Every Java program must have at least one ______________.(b)The Java program is executed from _________ me
    12·1 answer
  • 25 Points Discuss games you have played that have poor game design puzzles and how you might improve them.
    10·1 answer
  • ________________is a distribution of Linux Operating<br>system for desktop computers.<br>​
    15·1 answer
  • Design a full adder circuit using NAND gates only (input : A, B, Cin and output = S, Cout).
    5·1 answer
  • Hi whats airpods good for
    15·2 answers
  • Write a program that allows the user to enter their name from the keyboard. Allow the user to pick how many times they want thei
    12·1 answer
  • Program 3.Study the code carefully and write out the line where there is error, debug it and write out the correct code
    13·1 answer
  • How to make a website
    15·2 answers
  • Write two statements that each use malloc to allocate an int location for each pointer. Sample output for given program:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!