1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yakvenalex [24]
3 years ago
9

Create a class Circle with one instance variable of type double called radius. Then define an appropriate constructor that takes

an initial value for the radius, get and set methods for the radius, and methods getArea and getPerimeter.
Computers and Technology
1 answer:
Mrrafil [7]3 years ago
4 0

public class Circle {

// the private data members

private double radius;

private double area;

private double diameter;

public void setRadius(double r)

{

 radius = r;

}

public double getRadius()

{

 return radius;

}

public double computeDiameter()

{

 return radius * 2;

}

public double computeArea()

{

 return ((radius * radius) * 3.14);

}

}

You might be interested in
What is Converting digital data and see information to display screen can use to create an image?
aksik [14]

Answer:

Most displays in current use employ cathode ray tube ( CRT ) technology similar to that used in most television sets. The CRT technology requires a certain distance from the beam projection device to the screen in order to function.

4 0
3 years ago
You are using a program that can run multiple operating systems and manage hardware
stellarik [79]

Answer:

<u>Hypervisor Type 1</u>

<u>Explanation:</u>

The Hypervisor Type 1 is a program known for its ability to run multiple operating systems and still use and manage the same hardware and storage resources.  

This software does this by means of a technology called Virtual machines (virtualization). So it is most likely possible that one is using Hypervisor Type 1.

3 0
3 years ago
What is the difference between hacking and cracking
liq [111]

Explanation:

The basic difference is that a hacker uses their extensive knowledge of computer logic and code, while a cracker looks for back doors in programs, and exploits those back doors.

3 0
3 years ago
8) What do the following programs print? Ishow the tables of variables in memory.
OleMash [197]

Answer:

The output prints 12.

Explanation:

7 0
3 years ago
Extremes of the grayscale are produced with high contrast lighting.<br> True<br> False
ehidna [41]

Extremes of the grayscale are produced with high contrast lighting. Its true

4 0
3 years ago
Other questions:
  • Write a Python function called validateCreditCard that takes 8-digit credit card number as the input parameter (string value) an
    8·1 answer
  • What is the numerical ratio that is equivalent to 19.2 dB?
    14·1 answer
  • Consider the following method: static void nPrint(String a, int n) { System.out.println(a.charAt(n)); } What potential error cou
    7·1 answer
  • List the mistakes and the steps you need to take to minimize errors while typing. Incorporate these measures into your typing, t
    9·1 answer
  • A department store plans to upgrade its IT infrastructure to support a new order-processing application with rich features. The
    13·1 answer
  • What do newly PivotTables look like?
    9·1 answer
  • Why coaxial cable is called coaxial cable?
    11·1 answer
  • Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthe
    6·1 answer
  • In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.
    13·1 answer
  • How is kerning used in Word?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!