1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laila [671]
3 years ago
14

1. Which of the following would be the most appropriate way to invoke the CalculateAvg( ) method found in the Student class if a

n object named gradStudent had been instantiated from the class? public double CalculateAvg(double,double) a. gradStudent = CalculateAvg(87.2, 90); b. answer = Student.CalculateAvg(87.2, 90); c. CalculateAvg(87.2, 90); d. answer = gradStudent.CalculateAvg(double, double); e. answer = gradStudent.CalculateAvg(87.2, 90); 6. Which of the following is one of the user-defined methods inherited from the object class?
a. ToString( )
b. Main( )
c. CalculateAvg( )
d. EqualsHashCode( )
e. TypeHashCode( )
2. Properties are associated with the of the class while methods are affiliated with the of the class.
a. activity, fields
b. accessors, mutators
c. objects, instances
d. data, behavior
e. behavior, data
3. Which of the following is a valid overloaded method for CalculateAvg( )? int CalculateAvg(int val1, int val2)
a. void CalculateAvg(int val1, int val2)
b. int CalculateAvg(int val1, int val2)
c. int CalculateAvg(double val1, double val2)
d. double CalculateAvg(int val1, int val2)
e. int CalculateAverage(int val2, int val1)
Computers and Technology
1 answer:
ICE Princess25 [194]3 years ago
6 0

Answer:

The correct answer to the following questions is:

1.) Option e.) answer = gradStudent.CalculateAvg(87.2, 90);

6.) Option a.) ToString( ).

2.) Option d.) data, behavior.

3.) Option c.) int CalculateAvg(double val1, double val2).

Explanation:

There are two types of methods in every programming language.

1. User-defined methods -These methods are those which is defined by the user and these methods where the user wants.

2. Built-in methods - These methods are those which are already defined in these language. Only users can call these methods.

Overloaded method - These functions are those functions which have the same name but different in the argument list.

You might be interested in
Write an interface, PointingDevice, containing: an abstract method, getXCoord that returns an int an abstract method, getYCoord
vaieri [72.5K]

Answer:

Following are the code in java language

abstract interface PointingDevice // interface  PointingDevice,

{

// abstract method getXCoord()

public abstract int getXCoord();

// abstract method getYCoord()

public abstract int getYCoord();    

// abstract method attentionRequired()

public abstract boolean attentionRequired();  

// abstract method setResolution( )

public abstract double setResolution(double a);  

}

Explanation:

In this code we have declared a abstract interface "PointingDevice" which contains the four abstract method getXCoord of type int , getYCoord() of type int , attentionRequired() of type boolean and setResolution() of type double .

These method have only declaration not definition any interface or class which inherit the inteface PointingDevice must define all these four method otherwise it also be abstract .

4 0
3 years ago
In older systems, often the user interface mainly consisted of ____-control screens that allowed a user to send commands to the
Scilla [17]

Answer:

Process

Explanation:

In older systems, the user interface mainly consisted of process-control screens that allowed a user to send commands to the system. These systems were used in a great variety of industries, and it gave the user control over process measurements or process variables. It also allowed the user to view the current state of the process, modify the operation of the process, and perform other related actions.

6 0
4 years ago
Recently, from around june through september 2022, a social engineering campaign, attributed to a nation-state group, has been u
Archy [21]

The commonly attributed name of the threat actor is called ZINC. A wide range of social engineering campaigns using weaponized legitimate open-source software by an actor tracked as ZINC.

ZINC weaponizing a wide range of open-source software including PuTTY, KiTTY, TightVNC, Sumatra PDF Reader, and muPDF/Subliminal Recording software installer for these attacks.

Who is ZINC?

ZINC is a nation-state activity group that is highly operational, destructive, and sophisticated. Active since 2009, the activity group gained public attention in 2014 after a successful attack on Sony Pictures Entertainment. ZINC is known to employ a number of custom remote access tools (RATs), including those identified by Microsoft as FoggyBrass and PhantomStar.

ZINC seeks to coerce employees of companies it is attempting to infiltrate into installing seemingly benign programs or opening weaponized documents containing malicious macros.

To know more about Open Source Software(OSS), visit: brainly.com/question/4593389

#SPJ4

5 0
1 year ago
SUWIDHA stands for .​
Anettt [7]
SUWIDHA stands for Single User-friendly Window Disposal & Help-line for Applicants.

Hope it helps
5 0
3 years ago
The part of the computer that provides access to the internet is the
Kruka [31]
Modem, is the part of the computer that provides access to the internet.
3 0
3 years ago
Other questions:
  • Write a program that generates a random number and asks the user to guess what the number is. If the user's guess is higher than
    6·1 answer
  • Sending an email to customer support before looking through the site and reading the frequently asked questions is an example of
    5·1 answer
  • Maria found a cupcake recipe on a cooking blog. However, she would like to read comments and suggestions before she begins bakin
    6·2 answers
  • Which is the MOST efficient means of disentangling passengers from a wrecked​ vehicle? A. Remove the steering wheel and column.
    10·1 answer
  • Juan is interested in getting a job in the technological field. He is interested in protecting data from threats, and stopping h
    9·1 answer
  • An organization is conducting a study to see if hazardous waste sites pose health risks for cancer or other conditions, such as
    12·1 answer
  • Write a program that defines an array of integers and a pointer to an integer. Make the pointer point to the beginning of the ar
    12·1 answer
  • What can help you estimate how much money you might get in
    7·1 answer
  • Reesa works for a large real estate company. She is responsible for installing and supporting the company's internet systems, in
    5·1 answer
  • Which feature helps an edit-test-bug cycle work faster in the python programming language
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!