1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anni [7]
3 years ago
9

Write a partial class that shows a class constant and an instance method. Write an instance method that converts feet to inches

using a class constant representing the number of inches in one foot. The value passed to the method represents the distance in feet.
Computers and Technology
1 answer:
MA_775_DIABLO [31]3 years ago
4 0

Answer:

Please the code snippet below, the code was writen in Kotlin Language

Explanation:

const val inches:Int= 12 .   //This is the const value

fun main(args: Array<String>) {

 //this will ask the user for input

   print("Enter a number")            

  //this will do the conversion

var valueInFeet= Integer.valueOf(readLine())*inches

   print("The value in feet is $valueInFeet feet(s)")  

   }

You might be interested in
А.<br> is the highest education degree available at a community college.
s344n2d4d5 [400]

Answer:

The answer is "associate".

Explanation:

The two-year post-school degree is also known as the associate degree, in which the students pursuing any of this degree, which may take as little as 2 years to complete the course, although many prefer to do it at the same rate. Its first two years of a Bachelor (fresh and sophomore years) were covered by an Associate degree.

8 0
3 years ago
A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is
lakkis [162]

Complete Question:

A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Group of answer choices

A. scanning

B. subrogation

C. delegation

D. targeting

Answer:

A. Scanning.

Explanation:

A step commonly used for Internet vulnerability assessment includes scanning, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Internet vulnerability assessment can be defined as the process of defining, analyzing, measuring, identifying, classification and prioritization of vulnerabilities in network resources used to access the internet. The main purpose of an internet vulnerability assessment is to provide necessary informations or data about the threats being posed to an individual or organization through the use of a scanning program or system such as a network security scanner

7 0
3 years ago
Alan wants to buy camera support equipment that would provide mechanical support to his camera and which could also store extra
Andru [333]

Answer:

Could it be tripod?

Explanation:

If you did this question do you remember what the answer was?

4 0
3 years ago
1) What is y after executing the statements?
balu736 [363]

Answer: d. 12

Explanation: if X = 5, then y = 5 + 1 because in y = x + 1, You are replacing the x with 5.

y is now 6.

Now you are multiplying 6 * 2 because of y * 2. You replace the Y with the 6.

6 * 2 = 12

y = 12 or letter d

6 0
2 years ago
What was the most surprising thing you learned this term? Why did it surprise you? ​
vaieri [72.5K]

Answer:

is this just a small question you are asking the world?

Explanation:

because i am not fully understanding this, could you please give further detail?

8 0
3 years ago
Other questions:
  • Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use t
    9·1 answer
  • MTV can now be seen by most of the world's population. This is an example of
    7·1 answer
  • A(n) ____ is a primary key that consists of a column that uniquely identifies an entity, such as a person's social security numb
    14·1 answer
  • What is the name of small programs stored on the hard drive that tell the computer how to communicate with a specific hardware d
    5·1 answer
  • Why did the creation of ARPANET help with this critical need?
    9·1 answer
  • You can invoke or call a method from another program or method. When methods must share data, you can pass the data into and ret
    6·1 answer
  • To update a bibliography field that is not contained in a ____, right-click the bibliography, and then click Update Field on the
    10·1 answer
  • WhAt is a jpeg do i look like i know what a jpeg is
    13·1 answer
  • Consider a file/directory with the following info:
    14·1 answer
  • Jim is working on a network design for a small office running a Windows file and printer server with Internet
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!