1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laila [671]
3 years ago
14

1. Which of the following would be the most appropriate way to invoke the CalculateAvg( ) method found in the Student class if a

n object named gradStudent had been instantiated from the class? public double CalculateAvg(double,double) a. gradStudent = CalculateAvg(87.2, 90); b. answer = Student.CalculateAvg(87.2, 90); c. CalculateAvg(87.2, 90); d. answer = gradStudent.CalculateAvg(double, double); e. answer = gradStudent.CalculateAvg(87.2, 90); 6. Which of the following is one of the user-defined methods inherited from the object class?
a. ToString( )
b. Main( )
c. CalculateAvg( )
d. EqualsHashCode( )
e. TypeHashCode( )
2. Properties are associated with the of the class while methods are affiliated with the of the class.
a. activity, fields
b. accessors, mutators
c. objects, instances
d. data, behavior
e. behavior, data
3. Which of the following is a valid overloaded method for CalculateAvg( )? int CalculateAvg(int val1, int val2)
a. void CalculateAvg(int val1, int val2)
b. int CalculateAvg(int val1, int val2)
c. int CalculateAvg(double val1, double val2)
d. double CalculateAvg(int val1, int val2)
e. int CalculateAverage(int val2, int val1)
Computers and Technology
1 answer:
ICE Princess25 [194]3 years ago
6 0

Answer:

The correct answer to the following questions is:

1.) Option e.) answer = gradStudent.CalculateAvg(87.2, 90);

6.) Option a.) ToString( ).

2.) Option d.) data, behavior.

3.) Option c.) int CalculateAvg(double val1, double val2).

Explanation:

There are two types of methods in every programming language.

1. User-defined methods -These methods are those which is defined by the user and these methods where the user wants.

2. Built-in methods - These methods are those which are already defined in these language. Only users can call these methods.

Overloaded method - These functions are those functions which have the same name but different in the argument list.

You might be interested in
While researching ideas for cutting energy costs is his company. Hector watches an online video in which a business expert says,
Nataliya [291]
B. Put it in quotes if it is directly quoted as is and cite the source. You should likely also list the source in the works cited but not the phrase itself.
6 0
2 years ago
Read 2 more answers
When you heat a pot on a stove, the handle gets warm. which type of heat transfer is possible
valina [46]

Answer:

conduction

Explanation:

The handle will warm up until it's total heat losses equal the total heat coming in. Heat comes in mostly by conduction from the body of the pot.

5 0
3 years ago
Read 2 more answers
Do all light bulbs server a practical purpose?
Greeley [361]

Answer:

A light bulb produces light from electricity

6 0
3 years ago
a network administrator for a large oil company has discovered that a host on the company network has been compromised by an att
Slav-nsk [51]

My recommendation as an immediate response to prevent further spoofing of the host is to Revoke the host's certificate.

<h3>What does revoke certificate mean?</h3>

Certificate revocation is the process by which one can  invalidate a TLS/SSL and this is one that is often done before its scheduled expiration date.

Note that A certificate need to be revoked immediately  and as such, based on the case above, My recommendation as an immediate response to prevent further spoofing of the host is to Revoke the host's certificate.

Learn more about network administrator from

brainly.com/question/4264949

#SPJ1

8 0
2 years ago
In today's digital marketplace, the line between retailer and distributor has become less distinct.
jenyasd209 [6]

Answer:

The answer you're looking for is True - The line between retailer and distributor has become less distinct.

Explanation:

5 0
3 years ago
Other questions:
  • PLEASE HELP Which of the following is considered a modern method of communication?
    6·2 answers
  • What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?
    8·1 answer
  • What type of firewall works on the Session layer that creates a connection and allows packets to flow between the two hosts with
    8·1 answer
  • One of the attributes in a table in your database depends on another attribute for its meaning. What type of dependency has been
    14·1 answer
  • Consider the following C code fragment:
    10·1 answer
  • What do u say to your bf if he says sayy lesssss
    14·2 answers
  • Whats a hybrid wired network
    9·1 answer
  • Which view would you need to use to make changes to the design theme for the entire presentation?
    10·2 answers
  • The computer components that enables a computer to send and receive data, instructions or information from one or more computers
    13·1 answer
  • 30 POINTS FOR THE CORRECT ANSWERS
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!