1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nookie1986 [14]
3 years ago
10

1) Design a class named Axolotl that holds attributes for an axolotl's name, weight, and color. Include methods to set and get e

ach of these attributes
2)Create a small program that declares two Axolotl objects (using the class above) and sets each axolotl's name, weight, and color attributes. The program must also output each axolotl's name, weight, and color after they are set
Computers and Technology
1 answer:
crimeas [40]3 years ago
5 0

what subject is this exactly?

You might be interested in
This innovator created “honeypots” in which fake accounts are set-up in order to catch cyber criminals.
statuscvo [17]

Answer: A

Explanation:

3 0
4 years ago
Read 2 more answers
Which of the following statements about global variables is true? 1.A global variable is accessible only to the main function. 2
Korvikt [17]

Answer:

A global variable can have the same name as a variable that is declared locally within the function.

Explanation:

In computer program, we refer to a global variable as that variable that comes with a global perspective and scope, ensuring its visibility throughout the program, except it is shadowed. The set of this kind of variable is referred to as global state or global environment. One feature of global environment is that it can have similar name as a variable declared locally within the function.

7 0
3 years ago
You run the ipconfig command on your computer, and it reports an IP address of 169.254.75.10 on the Ethernet interface. Which de
Ray Of Light [21]

Answer:

This IP address is assigned to the interface by the following device:

d. The local computer

Explanation:

  • Ipconfig command is also known as Internet protocol configuration command. It is command line tool that is used to configure the IP of network connections. This command give us information about the information about IP and other parameters like default gateways.
  • The IP address 169.254.X.X is such IP address that can have values from 169.254.0.1 to 169.254.254.
  • 169.254.X.X is a Automatic Private IP Address that tells that our computer is not connected with the internet because the computer is not getting IP address from server.
5 0
4 years ago
A data center designer requested additional lighting for the entrance to the data center as well as the removal of a object whic
Ira Lisetskai [31]

Answer:

SURVEILLANCE-SPECIFIC DESIGN.

Explanation:

Defensible space offers a series of architectural guidelines that can be used in the design of new urban residential complexes to promote both the residential group’s territorial claim to its surroundings and its ability to conduct natural surveillance. The designs are: site interrelationship design, site design, street design and surveillance-specific design.

Surveillance-specific design can be used to increase general visibility by providing adequate lighting, by reducing or eliminating physical barriers to visibility, and by the visibility-promoting location of key areas (entrances, lobbies, elevator waiting areas, parking areas e.t.c.) so as to be directly visible from as many viewpoints as possible.

Since the data center designer requested additional lighting for the entrance to the data center as well as the removal of a object which is blocking security's view of the entrance, then it is an example of SURVEILLANCE-SPECIFIC DESIGN.

6 0
3 years ago
Hy plzz help me friends​
timama [110]

Answer:

Ok so RAM is Random-Access-Memory.

RAM can store data just like in a hard drive - hdd or solid state drive - ssd

but the thing is that ram is really fast and data is only stored when RAM chips get power. On power loss your all data will be lost too.

ROM thanslates to Read-Only-Memory - so data in ROM chips can't be modifyed computer can just read the data but not write.

Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware.

Have a great day.

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • Amy has decided to use a dark background and light colored text for her prensentation. Which toolbar option will let her change
    5·1 answer
  • Analog false color in computer graphics
    6·1 answer
  • Which event occurred in the 1990s?
    5·1 answer
  • Differentiate between the broadcasting and telecommunication
    5·1 answer
  • What information is stored in the file system?
    5·1 answer
  • C programmig : Output all combinations of character variables a, b, and c, using this ordering:abc acb bac bca cab cbaSo if a =
    12·2 answers
  • Software engineers typically use UML as a principle means of explaining design. UML stands for:
    12·1 answer
  • WHAT ARE THE RISK OF DUST​
    15·1 answer
  • The Open Systems Interconnection (OSI) Reference Model: defines standards for many aspects of computing and communications withi
    12·1 answer
  • Select a software package/electronic device that you know well. It can be from any domain (work related, entertainment, desktop,
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!