1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashutka [201]
3 years ago
8

Create a class called Fraction. Provide a constructor that takes 2 integers. Provide methods for:

Computers and Technology
1 answer:
tekilochka [14]3 years ago
8 0

Answer:

Explanation;

else

System.out.println("f1 and f2 are not equal");

switch (input.charAt(0)

{

case '+':

f3 = f1.add(f2);

System.out.println("f1+f2=" + f3);

break;

case '-':

f3 = f1.subtract(f2);

System.out.println("f1-f2=" + f3);

break;

case '*':

f3 = f1.multiply(f2);

System.out.println("f1*f2="+f3);

break;

case '/':

f3 = f1.divide(f2);

System.out.println("f1/f2="+f3);

break;

default:

System.out.println("Illegal command: " + input );

break;

}

}// end of while loop

} // end of main

}

 

Note ; this is the last part of the programme check the attachment from 1-5  this is the 6th .

You might be interested in
A network engineer arrives at work and discovers that many users are having problems when attempting to connect to the company n
skad [1K]

Answer: Change management

Explanation:

The change management document contains the entire details regarding the changes that could be brought about in the network. It starts with identifying the change, Then it goes for approval of the change and finally if it is approved then the change is implemented in the final step.

Some of the documents in change management are:

1. change management planning

2. the scope of the change

3. create the project plan for the identified scope.

4. The associated risk management plan.

S consulting the change management the NOC technician could know where the problem is as it contains detail of the data entry and the related risk  and mitigation's in the change management document.

4 0
4 years ago
Read 2 more answers
which scheduling algorithm allocate the CPU firt to the process that request the CPU first, (a) first come first serve,(b) short
stepladder [879]

Answer:

is correct answer

(a)first come first serve

Explanation:

8 0
3 years ago
Which statement best describes a social impact of computing on the world?
DiKsa [7]

Answer: Smartphones have changed the way people communicate through text messages and emojis.

Explanation:

it would only make sense that this is the correct answer because globally smartphones are used for communication, considering the fact that we dont tend to write letters to people across the country as our main source of communication, or in a different continent all together. The steady growth of technology has clearly made getting in touch with people of all nations much easier.

3 0
3 years ago
Is it possible to have a deadlock involving only oneprocess? Explain your answer.
Aleonysh [2.5K]

Answer:

Hi!

It is not possible to have a deadlock involving only one process.

Explanation:

Deadlock is only possible if there are multiple processes trying to access the same shared resources. Another way to see it is if you have shared resources only can be a deadlock if multiple processes attempt to use it.

With only one process, you can use shared resources without the risk of fall into deadlock, but you don't have concurrence either.

4 0
4 years ago
What is computer graphics uses of computer graphics​
d1i1m1o1n [39]

Answer:

The technology that deals with the design and pictures on computer is called computer graphics.

It is displaying art and image data effectively and meaningfully to the consumer.

It is also used for processing image data received from the physical world, such as photo and video content.

8 0
4 years ago
Other questions:
  • The ________ occurs when the user presses the enter key without typing a value for an input operation.
    5·1 answer
  • Who has access to the source code of proprietary software?
    15·2 answers
  • This is important I need help please
    14·1 answer
  • Convert 1001101012 to base 10
    5·1 answer
  • What do secondary sources rely on for their analysis of events?
    6·2 answers
  • Alex builds a 1 GHz processor where two important programs, A and B, take one second each to execute. Each program has a CPI of
    6·1 answer
  • ​ In the U.S., a work that was created in 2000 by an individual author who died in 2005 will be protected by copyright until ___
    5·2 answers
  • Line installers must complete a four-year university degree program in order to be hired.
    5·2 answers
  • List the caveats to this analysis and how they affect the research. How does this document define the ""typical game developer""
    7·2 answers
  • Is hp pavilion pc a digital or analog computer
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!