1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tema [17]
4 years ago
11

A class named Clock has two instance variables: hours (type int) and isTicking (type boolean) Write a constructor that takes a r

eference to an existing Clock object as a parameter and copies that object's instance variables to the object being created Your task: Write a Clock constructor that makes this possible. Just write this constructor-don't write the whole class or any code outside of the class! 1-ublic ClockOt this.hours hours 3 this.isTicking - isTicking; 75 characters 5000 maximum Previous Submissions xCode Analysis: Logic Error(s) Remarks and Hints: The constructor should take one parameter. Unexpected identifiers: this Your assignment seems to be backwards.
Computers and Technology
1 answer:
NeX [460]4 years ago
7 0

Answer:

public Clock (Clock c)

{

hours = c.hours;

isTicking = c.isTicking;

}

Explanation:

Since the name of the Java class is called Clock, the constructor must have that same name, so we start by declaring the constructor as public Clock (Clock c) with a clock parameter. Within the contructor body we assign the variables hours and isTicking to the respective member feilds

You might be interested in
Why would a business consider using virtual machines?
Nuetrik [128]
The answer is A, or To be able to maintain servers remotely. Why? Well, a business would not want to allow outside customers access to files because that’s a blatant red flag. There would be no reason to completely eliminate physical servers because there simply isn’t a reason to. They would not want to secure the company intranet because if they did, their solution would not be to use virtual machines surely.

Your final answer: To be able to maintain servers remotely. It’s slightly more efficient, and it makes sense for the company to be accomplishing this goal by using virtual machines.
7 0
2 years ago
I'd: 9872093250, password: qqqqq, join the meeting​
jenyasd209 [6]
No thanks but Happy Mother’s Day!!!
8 0
3 years ago
The phrase ____ refers to an organization of components that define and regulate the collection, storage, management and use of
Burka [1]

Answer:

A. Database Management System

Explanation:

A Database Management System or DBMS is a set of programs that allow the DB administrator to the information extraction, storage and modification out of a database. It also provides tools to add, erase, modify or even analyze the data within the DB. Some examples of DBMS are MySQL, mongo DB, Ms SQL Server, etc.

3 0
4 years ago
Copyright ownership analysis starts with this principle: The ________ is the owner.
pogonyaev

Answer: Author

Explanation: self explanatory

3 0
3 years ago
Write a pseudocode thats accept and then find out whether the number is divisible by 5 ​
meriva

Answer:

input number  

calculate modulus of the number and 5  

compare outcome to 0  

if 0 then output "divisible by 5"  

else output "not divisible by 5"

Explanation:

The modulo operator is key here. It returns the remainder after integer division. So 8 mod 5 for example is 3, since 5x1+3 = 8. Only if the outcome is 0, you know the number you divided is a multiple of 5.

3 0
4 years ago
Other questions:
  • You have connected thirteen pcs and laptops to a wireless network. to make your wlan more secure, what should you do to disallow
    11·1 answer
  • A. True
    5·1 answer
  • Which operator is used for quotient division in java​
    6·1 answer
  • What can be done in order to secure a WLAN/wireless access point?
    12·1 answer
  • File Sales.java contains a Java program that prompts for and reads in the sales for each of 5 salespeople in a company. It then
    8·1 answer
  • What technique is used when setup times at a workstation are sequence dependent?
    15·1 answer
  • The encapsulating security ______ protocol provides secrecy for the contents of network communications as well as system-to-syst
    14·1 answer
  • ___________ is a computer programming language.
    9·2 answers
  • May someone help me with the this question pls , The governor of a state wants to inform the people about a change in the tax po
    9·1 answer
  • "a web client that connects to a web server, which is in turn connected to a bi application server, is reflective of a"
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!