1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Iteru [2.4K]
3 years ago
14

For this question you must write a java class called Rectangle and a client class called RectangleClient. The partial Rectangle

class is given below. (For this assignment, you will have to submit 2 .java files: one for Rectangle class and the other one for RectangleClient class.) // A Rectangle stores an (x, y) coordinate of its top/left corner, its width and height. public class Rectangle { private int x; private int y; private int width; private int height; // constructs a new Rectangle with the given inX, inY and inSideLength public Rectangle(int inX, int inY, int inWidth, int inHeight) // returns the fields' values public int getX() public int getY() public int getWidth() public int getHeight() public int getArea() public bool IsSquare() // returns a string such as "Rectangle located at (1,2) with dimensions 3x4 and area 49.", where 3 is width, 4 is height and 12 is the area. public String toString() ... }
Computers and Technology
1 answer:
polet [3.4K]3 years ago
8 0

Answer:

Java.

Explanation:

public class Rectangle {

   private int x;

   private int y;

   private int width;

   private int height;

   ///////////////////////////////////////////////////////////

   public Rectangle(int inX, inY, inWidth, inHeight) {

       x = inX;

       y = inY;

       width = inWidth;

       height = inHeight;

   }

   ///////////////////////////////////////////////////////////

   public int getX() {

       return x;

   }

   public int getY() {

       return y;

   }

   

   public int getWidth() {

       return width;

   }

   public int getHeight() {

       return height;

   }

   ///////////////////////////////////////////////////////////

   public int getArea() {

       return width * height;

   }

   public bool isSquare() {

       if (width == height) {

           return true;

       }

       else

           return false;

   }

   ///////////////////////////////////////////////////////////

   public String toString() {

       return "Rectangle located at (" + x + "," + y + ")" + "with dimensions " + width + "x" + height + "and " + getArea() + "is the area.";

   }

}

You might be interested in
TCP connections are established through sequence numbers. Someone can guess a client's next sequence number and then impersonate
solong [7]

Options: True or false

Answer: True

Explanation:TCP(TRANSMISSION CONTROL PROTOCOL) is is an internet control protocol that allows Communication between internet users or computers by collecting and compiling packets of data and then sending such collected packets of data to the desired user.

Before using a TCP one must first create a connection which will enable it to effectively communicate with the other user.

TCP are established using sequence numbers which can be predicted by another party for their own personal gain.

6 0
3 years ago
What is the major problem with using pneumatics for robots, and how do we correct it?
Pepsi [2]
Well m<span>ost pneumatic system issues are caused by attempts to make a cylinder and related compressed air system components do something outside of the hardware’s design parameters. In order to fix this, use a filter regulator, do not oversize the cylinder, also ensure proper plant supply pressure, make sure you are using a manual, lockable air dump valve as well.
Hope this helps!</span>
4 0
3 years ago
A technician installs a new WAP and users in the area begin to report poor performance. The technician uses a ping and only 3 of
krek1111 [17]

Answer: the correct answer is D. Spectrum Analyzer tool

Explanation:

A spectrum analyzer is a piece of electronic equipment that is used to gauge the magnitude (amplitude or strength) of a given input signal set against the full frequency range of the instrument. It is mainly used to measure the strength of the range of known and unknown signals.

4 0
3 years ago
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
vodomira [7]

Answer:

Phishing.

Explanation:

Networks and computer systems in a network are susceptible to cyber attacks. A cyber attack is a networking term that describes a situation where a network is penetrated by a malicious process or program induced by an attacker or attackers.

A cyber attacker's sole intention is to steal information needed to achieve a malicious and devastating action to a client's personal assets. An example of such attacks is phishing.

Phishing is an attack that collects client's personal information at an imposter website after receiving an email from a person masquerading as an employee from a bank.

5 0
4 years ago
When delivering digital technologies to clients, what is a best practice to make those solutions sustainable?
lidiya [134]

When delivering digital technologies to clients, a best practice is to: Recommend the client spread out their data centers to distribute energy usage globally.

<h3>What is a computational sustainability?</h3>

Computational sustainability can be defined as a process through which societal, economic, ecological and environmental resources are balanced through the use of various mathematical and computational techniques.

<h3>The importance of computational sustainability</h3>

Generally, computational sustainability helps to produce sufficient amount of energy for the world to globally distribute and support its biological systems.

In order to achieve computational sustainability, it is essential to practice the following:

  • Ensure that software applications are widespread.
  • Clients should spread out their data centers.

In conclusion, a best practice for delivering digital technologies to clients is to recommend a spread out of data centers to distribute energy usage globally.

Read more on computational sustainability here: brainly.com/question/24882256

6 0
3 years ago
Other questions:
  • Suppose you have two arrays of ints, arr1 and arr2, each containing ints that are sorted in ascending order. Write a static meth
    7·1 answer
  • Digital information is stored using a series of ones and zeros. Computers are digital machines because they can only read inform
    15·1 answer
  • Choose the list of the best uses for word processing software.
    5·1 answer
  • Which is a disadvantage ofsimulation?
    5·1 answer
  • this device can be used to type documents,send email,browse the internet,handle spreadsheets,do presentations,play games,and mor
    14·1 answer
  • RAM that can be changed. True or False
    9·2 answers
  • Why is an array like a list? How do you identify and find elements in an array? Explain the purpose of a try-catch block and giv
    5·1 answer
  • Help me pls!!! last question
    9·1 answer
  • Which of the following is a method to create a new table in Access?
    12·1 answer
  • FS EVERFI:
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!