1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maxonik [38]
3 years ago
7

Assume there is a class AirConditioner that supports the following behaviors: turning the air conditioner on and off. The follow

ing methods provide this behavior: turnOn and turnOff. Both methods take no arguments and return no value.
Assume there is a reference variable myAC to an object of this class, which has already been created. Using the reference variable, invoke a method to tell the air conditioner object to turn on.
Computers and Technology
1 answer:
AleksandrR [38]3 years ago
5 0

Answer:

Hi!

I will use JAVA to answer the question.

The class AirConditioner could be:

public class AirConditioner {

  bolean state;

  AirConditioner(){ <em>//constructor</em>

     this.state = false;

   }

public void turnOff{ <em>//turn off method</em>

 this.state = false;

   }

public void turnOn{ <em>//turn on method</em>

 this.state = true;

   }

}

Program to solve the problem:

public static void main(){ <em>//main program</em>

  AirConditioner myAC = new AirConditioner();  <em>//instanciate the AirConditioner object</em>

  myAC.turnOn(); <em>//call the method turnOn for myAC instance.</em>

}

You might be interested in
Should a social network own our social data? Is it an invasion of privacy for social networks to collect and use the information
Svetradugi [14.3K]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

No, we don't even own our identity data on social networking sites. It may be said as permission is needed as an factor for recognizing an acceptable interpretation and solution to a circumstance as well as a method to be followed.

  • They would conclude that, in contemplating the data generated from social networking, this could be recognized that although the data that they left as our electronic fingerprints must be used with applications that can provide the businesses with the appropriate strategy to best reach the consumer.
  • With all this into consideration, the method of information gathering does not include personal identifying information, and also the reality that we must be made mindful of what details has been accessed as well as the right to get out of obtaining such details from the social platform.
3 0
3 years ago
What is the maximum number of communication paths for a team of twenty people.
Aneli [31]

Answer:

Communication path basically define the path in which the information and messages can be exchange by using the efficient communication path.

There are simple formula for calculating the total number of communication channel that is :

 =\frac{n(n-1)}{2}

Where, n is the number of stack holder.

Now, the maximum number of communication paths for a team of twenty people can be calculated as:

n=20  

=\frac{20(20-1)}{2} = 190

Therefore, 190 is the total number of communication path.

3 0
3 years ago
Which of these about non-disclosure agreements is accurate?
grandymaker [24]

Answer: number 2

Explanation: number 2

6 0
3 years ago
Read 2 more answers
Write the function lettersOnly(s) that takes in a string called s, and returns a string containing only the alphabetic character
Phantasy [73]

Answer:

The program to this question as follows:

Program:

def lettersOnly(s): #defining method lettersOnly

   val="" #defining string variable that return value

   for i in s: #defining loop to calculate value

       if(i.isalpha()): #check condition that value is string

           val=val+ i #add value

   return val #return value

print(lettersOnly("data3base_ro1c3k5s")) #call method and print value

Output:

databaserocks

Explanation:

In the above python code, a method lettersOnly is declared that accepts a string variable  "s" in its parameter. Inside the method, a string variable "val", and loop is declared, in which the "val" variable holds method return value.

  • In the loop and if block is used that uses "isalpha" string method, which checks the check alphabetic character in the given value. if this is true it will calculate all value in "val" variable and return its value.    
  • At the last, the print method is used, which calls the lettersOnly method and prints its return value.
4 0
3 years ago
A person clicks on an ad of a fitness club in a blog on nutrition. The person conducts a search on yoga and moves to another web
ra1l [238]

Answer:

Option A. Third-party cookies

Explanation:

When you are browsing a website, this can store small pieces of useful data, based on your activity during your visit. This information is being collected by the website you are looking at, and you can see its domain on your address bar. Unlike regular cookies (or First-party cookies).

A third-party cookie belongs to a different domain than the one on your address bar. This is widely used in internet ads to show a person ads that will most likely interest him/her, according to where he/she is clicking. If you click on an internet ad, you will send information to the ad's domain, a cookie will be stored, stating that you are interested in this kind of ad. The advertiser can use these cookies to improve his advertising campaign or create more effective ads.

6 0
4 years ago
Other questions:
  • What is micro blogging?
    13·1 answer
  • Technician A says that if the coefficient of friction is too low, the brakes will grab.
    12·1 answer
  • on 5.7.3, we provide an outline of a solution to the dining-philosophers problem using monitors. This problem will require imple
    6·1 answer
  • Name one advantage of modular switches over fixed-configuration switches.
    5·1 answer
  • Which of the following statements is not true? Group of answer choices
    9·1 answer
  • For the purposes of laying out content, the total height of a box is calculated by adding which of the following?
    5·1 answer
  • Which manufacturing industry makes semiconductors that are used in a variety of systems?
    8·1 answer
  • How can you create a messages to look like an IMessage?
    8·1 answer
  • Connection security rules are used to secure traffic between two computers while it crosses internet?
    7·1 answer
  • The software/system that helps make sure the retail firm doesn't have a stockout is?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!