1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana66690 [7]
3 years ago
13

Create a class named Employee. The class must contain member variables for the employee name and salary. It should contain gette

r methods for returning the name and salary. It should also contain setter methods for storing the name and salary. The class must include a constructor method for setting both the name and the salary. In addition, it should contain a toString() method.2- Create the client code to test the class Employee.
Computers and Technology
1 answer:
Lerok [7]3 years ago
8 0

Answer:

Explanation:

The following code was written in Java. The code contains the Employee class which contains the two variables (name, salary), the constructor, getter and setter methods for both variables, and an overwritten toString method. It also contains a tester class with the main method inside and creates a Employee object and initializes it. Then it calls the toString method. The output can be seen in the attached image below. Due to technical difficulties I have added the code as a txt file below.

You might be interested in
. What type of device is a computer? Where does it use?​
LenKa [72]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Computer is an electronic and digital device. Computer can be used everywhere in our daily life. You can use a computer to search for something over the internet related to your study etc.

The following fields where you can see the use of computers.

  1. Education
  2. Business
  3. Hospital
  4. Banking sector
  5. Home
  6. Marketing
  7. Government offices
  8. etc

You can see the use of computers everywhere in our daily life.

7 0
3 years ago
Type the correct answer in the box. In which phishing technique are URLs of the spoofed organization misspelled? _____ is a phis
vodka [1.7K]

Answer:

Link manipulation

Explanation:

With the link manipulation the phisher manipulate the URL link, in this case, the URL can seem similar to an original website, but this link sends you to a fake website, and you enter for example your bank or personal information, the phisher use this data to steal money or delicate data, sometimes these links are sent by email or text messages.

4 0
4 years ago
Which programming languages are the best choices for desktop applications? Select 3 options.
slega [8]
The three are Python c and html
5 0
3 years ago
Read 2 more answers
Write a class of complex numbers consisting of:
Gnom [1K]

Answer:

hi sorry for not knowing the answer

but please follow have a great day,night, or afternoon

3 0
3 years ago
3. Which of the following is the best definition of a workplace policy?
Oksi-84 [34.3K]

The best definition of a workplace policy is: d. the standard course of action adopted by a business.

Workplace policies are a company’s standard rules of what should and should not be done by its workforce. These policies are strictly enforced as the workforce’s actions reflects the company. Failure to comply with these policies may lead to a member of the workforce’s removal from the business.

6 0
3 years ago
Other questions:
  • Mitchell is assisting her teacher in a project by entering data into the spreadsheet. Which types of data can Michelle enter in
    14·2 answers
  • James wishes to access a certain software service via different computing systems over the Internet. What technology provides so
    13·2 answers
  • You've been asked to find the average of a range of numbers. Which of the following could you use to find the average of cells A
    9·1 answer
  • Assume that the system has a multiple level queue with a variable time quantum per queue, and that the incoming job needs 80 ms
    14·1 answer
  • A ____________ is a set of commands which can be run by calling it by name. (Phyton)
    7·2 answers
  • What scheme is usually used today for encoding signed integers?
    5·1 answer
  • Which tcp/ip troubleshooting command should you use to determine whether a client and server are communicating with each other?
    7·1 answer
  • )what item is at the front of the list after these statements are executed?
    15·1 answer
  • 2. What is data redundancy?
    14·1 answer
  • Function of pons for class 7​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!