1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ss7ja [257]
3 years ago
10

Write the definition of a class employee base on the modular specification: . A data member for Id of type int (private). A data

member for EmpName of type string (private). A data member for Salary of type double (private). A method to display the fields Id, EmpName, and Salary.
Computers and Technology
1 answer:
djyliett [7]3 years ago
7 0

Answer:

public class Employee {

   private int id;

   private String empName;

   private double salary;

   

   public void displayEmployee(){

       System.out.print("Employee ID: " + id + "\nEmployee name: " + empName + "\nSalary: " + salary);

   }

}

Explanation:

- Declare the class variables

- Write a method called <em>displayEmployee</em> to display the fields

You might be interested in
Research online the variety of web services (see pages 197-198) currently available to software developers. List three different
Mrrafil [7]

Answer:

  1. lastpass
  2. Hootsuite
  3. Microsoft azure

Explanation:

4 0
3 years ago
a. Show the output of the following program: 1: public class Test { 2: public static void main ( String [] args ) { 3: A a = new
faust18 [17]

Answer:

See attached file.

Explanation:

See attached file.

Download txt
3 0
3 years ago
In the ____ letter style, all components of the letter begin flush with the left margin.
Sedaia [141]
In the block <span>letter style, all components of the letter begin flush with the left margin.</span>
4 0
2 years ago
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
When would you use a composite primary key? Group of answer choices
vichka [17]

Answer:

A. Multi-field attributes

B. A ternary relationship

C. A unary relationship

6 0
2 years ago
Read 2 more answers
Other questions:
  • 2. a. Write pseudocode for a divide-and-conquer algorithm for finding valuesof both the largest and smallest elements in an arra
    11·1 answer
  • Checking the ___________ will reduce the possibility of having to rebuild or replace the engine.
    9·2 answers
  • Cloud computing service providers manage different computing resources based on the services they offer. Which resources do IaaS
    11·1 answer
  • What contains the computer brain the central processing unit
    8·2 answers
  • How many arguments are required for the sum function?
    15·1 answer
  • One key to success in a career is to be an accomplished
    15·1 answer
  • Text can be easily moved from one location to another using _____.
    15·1 answer
  • Please Help ASAP. Marking Brainliest For Correct Answer.
    5·1 answer
  • How many operations can a computer perform every second?
    13·1 answer
  • Your friends are having difficulties with their computer setups. Can you suggest a way to help each friend?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!