1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
max2010maxim [7]
3 years ago
12

Create a class called Book with the following properties using appropriate data types: Title, Author, numberOfPages, Create a se

cond class called Volume with the following properties using appropriate data types: volumeName, numberOfBooks and Book [ ]. The Book [ ] contains an array of book objects.
Directions

Create a class called Book with the following properties using appropriate data types: Title, Author, numberOfPages, The only methods necessary in the Book class, for this exercise, are the constructor and a toString(). Create a second class called Volume with the following properties using appropriate data types: volumeName, numberOfBooks and Book [ ]. Book [ ] will contain an array of book objects.
Computers and Technology
1 answer:
tamaranim1 [39]3 years ago
7 0

Answer:

I don't know the answer sorry

You might be interested in
Stuart wants to delete some text from a slide. What should Stuart do?A. From the Review tab, choose Highlight text and then pres
Anna [14]
C. Highlight the text to be deleted, right-click and choose Cut
5 0
3 years ago
Read 2 more answers
Which of the following actions can NEGATIVELY impact your credit score?
Tresset [83]
The answer to the question stated above is "<span>forget to pay the cable bill"
>Payment history influences your credit score the most.

Here are the following choices to this question:
</span><span> A-dispute an item on your credit report 
B- forget to pay the cable bill 
C- pay all bills in cash 
D- use small amount of your available credit</span>
3 0
3 years ago
What are the two basic steps in communication
Andrei [34K]

The sender forms an idea.The sender encodes the idea in a message.

4 0
4 years ago
Choose the appropriate computing generation.
tia_tia [17]

Answer:

5th generation : artificial intelligence

3rd generation: integrated circuits

4th generation : microprocessors

5th generation: parallel processing

<em>hope this helps!</em>

5 0
3 years ago
Read 2 more answers
There are local administrators for each of the departments, excluding the IT. These local administrators will use the local admi
torisob [31]

Answer:

Listed below are the few ways Linux Server can be secured

1. Group policies: This is a way to ensure security by applying group policies and permissions both on the group level and the files level. Through proper permission configuration we can easily restrict other users from accessing those files and directories.

2. Implementation of the firewall: Implementing firewall in each of the Linux server will definitely help in securing your machine from outside threats. Iptables will help in filtering the network traffic that are entering into the system and even going out of the system.

3.Enabling SELINUX: Enabling SELINUX is another way to secure your system especially a Linux Server. Selinux is a powerful security that checks and allows applications to run into the system. It won't allow any untrusted application to run into the system.

6 0
3 years ago
Other questions:
  • Dan is a Civil Engineer for a company that builds nuclear power plants throughout the world. Which best describes the places he
    14·2 answers
  • The first version of the SMTP protocol was defined in RFC 821. The current standard for SMTP is defined in RFC 5321 considering
    11·1 answer
  • When planning a backup strategy, ideally one needs to prioritize important data and only back up what is absolutely necessary fo
    15·1 answer
  • One of the most common uses of spreadsheet are
    12·1 answer
  • Which line of code outputs the decimal portion of a float stored in the variable x? print (x % 1000) print (x) O print (x / 1000
    13·1 answer
  • How many total bits are required for a direct mapped cache with 16 KB of data and 4 word blocks Assuming a 32 bit address
    12·1 answer
  • Add me on Fortn!te <br> TsarBacon (imma girl)
    11·1 answer
  • 1. Who was the first lady programmer?​
    14·2 answers
  • What is the meaning of FTTH
    9·2 answers
  • How will technology help people with disabilities become more transportation independent?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!