1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
almond37 [142]
4 years ago
11

Creating a Graphical User Interface in Java

Computers and Technology
1 answer:
tankabanditka [31]4 years ago
4 0

Answer:

JPanel PayrollPanel=new JPanel();

JButton saveButton=new JButton("Save");

A full code snippet and screen shot is provided in the explanation section

Explanation:

import java.awt.*;

import javax.swing.*;

public class TestClass {

   TestClass()  {

       JFrame f= new JFrame("Payroll Panel");

       JPanel payrollPanel=new JPanel();

       payrollPanel.setBounds(10,20,200,200);

       payrollPanel.setBackground(Color.gray);

       JButton saveButton=new JButton("Save");

       saveButton.setBounds(50,100,80,30);

       saveButton.setBackground(Color.yellow);

       payrollPanel.add(saveButton);

       f.add(payrollPanel);

       f.setSize(400,400);

       f.setLayout(null);

       f.setVisible(true);

   }

   public static void main(String args[]) {

       new TestClass();

   }

}

You might be interested in
Liz will use a CD-R compact disk to write to more than once. Carlo will use a CD-RW compact disk to write to more than once. Who
Helen [10]
A. Only Carlo is correct.

CD-R drives once burned cannot be reused, however CD-RW can be rewritten for up to 1000 times.
8 0
4 years ago
Which of the following involves unethical use of another’s intellectual property?
harkovskaia [24]

Answer:

d

a would be wrong because you include the citation. b is legal because you paraphrase and it's not a direct quote. in c you have an osl meaning you can use it without permission to create

8 0
3 years ago
Which function in Ecels tells how many numeric entries are there​
goldenfox [79]

Answer:

CHKNUM is the answer

Explanation:

good luck

4 0
3 years ago
Read 2 more answers
Need help answering this
elena55 [62]
I think it is c if that helps x
3 0
3 years ago
Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcast
qwelly [4]

Answer: Option (A) is correct

Explanation:

Evil twin is known as a fraudulent point of access in a Wi-Fi which tends to  appear to be honest and legitimate but is known as a set up to oversee on the wireless communications. Evil twin is referred to as the WLAN equal of a phishing scam.  This kind of attack is mostly used in order to steal passwords of an unsuspecting users, that is done either by by phishing or by monitoring the connection, this mostly involves developing a fake web site and thus luring people.

8 0
3 years ago
Other questions:
  • What is ‘Black-Box’ testing?
    14·1 answer
  • An expression involving byte, int, and literal numbers is promoted to which of these?
    12·1 answer
  • Write a statement that compares the values of score1 and score2 and takes the following actions. When score1 exceeds score2, the
    7·1 answer
  • When saving a PowerPoint presentation as a show which object will not be saved with the presentation
    13·2 answers
  • Imagine a switch with three configured VLANs. How many IP subnets are required, assuming that all hosts in all VLANs want to use
    14·1 answer
  • What is this car first to awnser is the brianliest
    5·2 answers
  • If you want the input gear to spin in the same direction as the output gear you must use a _______ gear.
    13·1 answer
  • Who knows my cousin better?
    14·1 answer
  • A.1111+1011. b. 10111+11111 c. 1111*1011 d. 1110*1101 perform the binary calculations.​
    12·1 answer
  • A hacker corrupted the name:IP records held on the HOSTS file on a client, to divert traffic for a legitimate domain to a malici
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!