1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laila [671]
3 years ago
14

1. Which of the following would be the most appropriate way to invoke the CalculateAvg( ) method found in the Student class if a

n object named gradStudent had been instantiated from the class? public double CalculateAvg(double,double) a. gradStudent = CalculateAvg(87.2, 90); b. answer = Student.CalculateAvg(87.2, 90); c. CalculateAvg(87.2, 90); d. answer = gradStudent.CalculateAvg(double, double); e. answer = gradStudent.CalculateAvg(87.2, 90); 6. Which of the following is one of the user-defined methods inherited from the object class?
a. ToString( )
b. Main( )
c. CalculateAvg( )
d. EqualsHashCode( )
e. TypeHashCode( )
2. Properties are associated with the of the class while methods are affiliated with the of the class.
a. activity, fields
b. accessors, mutators
c. objects, instances
d. data, behavior
e. behavior, data
3. Which of the following is a valid overloaded method for CalculateAvg( )? int CalculateAvg(int val1, int val2)
a. void CalculateAvg(int val1, int val2)
b. int CalculateAvg(int val1, int val2)
c. int CalculateAvg(double val1, double val2)
d. double CalculateAvg(int val1, int val2)
e. int CalculateAverage(int val2, int val1)
Computers and Technology
1 answer:
ICE Princess25 [194]3 years ago
6 0

Answer:

The correct answer to the following questions is:

1.) Option e.) answer = gradStudent.CalculateAvg(87.2, 90);

6.) Option a.) ToString( ).

2.) Option d.) data, behavior.

3.) Option c.) int CalculateAvg(double val1, double val2).

Explanation:

There are two types of methods in every programming language.

1. User-defined methods -These methods are those which is defined by the user and these methods where the user wants.

2. Built-in methods - These methods are those which are already defined in these language. Only users can call these methods.

Overloaded method - These functions are those functions which have the same name but different in the argument list.

You might be interested in
An operating system coordinations the___ of a computers operation
qwelly [4]
\\\\\\\\\\\\\\\\\\\\\\\\\Operating system///////////////////////
                            Is the Answer
8 0
3 years ago
I will mark you as BRAINLIEST if you give me the correct answer of the questions... Pls asap with all details i am time limited
Alex_Xolod [135]

Answer:

11. 1million square decimetres (from online)

20. assuming room is rectangular,

length= (p - 2b)/2

because perimeter= 2 length + 2 breadth for rectangular

6 0
3 years ago
Read 2 more answers
What tells the hardware what to do and how to do it?
oksano4ka [1.4K]

Answer:

I think its CPU

Explanation:

8 0
3 years ago
5. Write a function that takes two lists of integers and returns a list containing tuples with corresponding elements from both
Allisa [31]

Answer:

def corresponding_of_lists(lst1, lst2):

   c = ""

   corresponding_list = []

   if (lst1 is None) or (lst2 is None):

       return None

   else:

       for i in lst1:

           for j in lst2:

               c = "(" + str(i) + "," + str(j) + ")"

               corresponding_list.append(c)

   return corresponding_list

Explanation:

- Create a function called corresponding_of_lists that takes two lists as parameter

- Initialize an empty list to hold the corresponding values

- Check if any of the lists are null, if they are return None

- Otherwise, get the corresponding elements and put them into the corresponding_list

Return the corresponding_list

7 0
3 years ago
hackers can use as part of a reconnaissance process to learn about active network addresses and active processes?
aalyn [17]

Answer:

ICMP.

Explanation:

Hackers might use ICMP for gain knowledge about current system addresses and specific procedures as part of a reconnaissance process.

ICMP is a failure informing system used by network protocols such as routers to produce warning to that of the source Address while network issues interrupt IP packet transmission.

3 0
3 years ago
Other questions:
  • Given main(), define the Team class (in file Team.java). For class method getWinPercentage(), the formula is:teamWins / (teamWin
    15·1 answer
  • A______ is a picture icon that is a direct link to a file or folder
    13·1 answer
  • What is the difference between First Person Shooters and Construction Simulations?
    12·2 answers
  • What are the coordinates of (3 comma space 8 )relative to the basis open curly brackets space (1 comma space 1 )comma space (0 c
    15·1 answer
  • What are the consequences of plagiarism?
    7·2 answers
  • What is online school like 6 sentences
    12·1 answer
  • A TCP ________ segment is a request to the other transport process to close a connection. ACK FIN SYN CLS
    15·1 answer
  • Create a dictionary that maps a fruit name to its color. Both the keys and the values should be stored as strings. Include only
    7·1 answer
  • Can someone please help me answer the extension activity and the exit ticket. I’ll award you. Thanks❤️.
    12·1 answer
  • Molly claims that she doesn’t have to proofread her code for typos because the interpreter will catch her mistakes for her. Is s
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!