1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ludmilkaskok [199]
3 years ago
13

Given a class called Measure that has the methods and data as specified, choose the correct code to satisfy the requirements of

the class.
public class Measure implements Comparable

{

//Instance variables yards, feet, inches;

//Constructors (default and overloaded)

//Accessors for yards, feet, and inches

//Mutators for yards, feet, and inches


//totalInches returns an int of the total inches for the current object

//toString returns a string in the form: 6 yards, 2 feet, and 5 inches

//Adding 2 measure objects (current object and one passed in as a parameter)

//addMeasure returns a measure object that is the sum of two measure objects,

// the current object and one that is passed in as a parameter

}

Which of the following would be the correct implementation for the method totalInches that returns an int of the total inches for the current object in the measured class? (36 inches = 1 yard)

A. return 36 * feet + 12 * yards + inches;
B. System.out.println(36 * yards + 12 * feet + inches);
C. int total = 36 * yards + 12 * feet + inches;
return total;
D. none of these
Computers and Technology
1 answer:
Nina [5.8K]3 years ago
7 0

Answer:

D

Explanation:

You might be interested in
50 Points Will Give brainliest Help (right answers only please)
gulaghasi [49]

Answer:

The boss, since it’s none of her business that Delilah’s appointment was for mental health, and asking for a doctor’s note after the fact is harassment, and docking her pay might be illegal.

That's what I think (I hope I'm right).

6 0
3 years ago
Read 2 more answers
The term used for doing business online is referred to as ___.
liubo4ka [24]
The process for doing business online is referred to as e-commerce.
6 0
3 years ago
What is the full form of" MIPS"​
Zepler [3.9K]
Million instructions per second
4 0
3 years ago
Read 2 more answers
A broadcast network is one in which a transmission from anyone attached station is received by all other attached stations over
malfutka [58]

Network layer is third layer of seven layers in the network technology. In network layer and physical data transmission been made through Ethernet or wireless, which Is connected to router and connect to other workstation or desktop or laptop.

<u>Explanation:</u>

On network layer connection is established, on success connection next layer is transport layer it is fourth layer of server layers.

Following error detection can be occurred

1. Accessing folder

2. Sometime immediate conflict  on tcpip address

3. Sometime subnet mask different

4. Host different

5. Ping to workstation on tablet or laptops  some dropping the packets

Transport layer always successful as end to end communication.

5 0
3 years ago
A(n) ____________________ is an assessment to determine the characteristics of hardware or software needed to meet a user's job
vampirchik [111]
<span>An user requirement is an assessment to determine the characteristics of hardware or software needed to meet a user's job requirements.
</span>The user requirements include the basic Hardware<span><span> (Central processing unit (CPU), memory, storage space, a keyboard, mouse, monitor..)</span>, hardware Maintenance and upgrades, software and software upgrades, data and information, technical support...
</span>

7 0
3 years ago
Other questions:
  • Amy wants to insert clip art in her document, and she wants it to be in gif file format. How can she look for only clip art in a
    10·1 answer
  • Can someone please help me? I have no clue what any of this is and how I'm going to find out 15 examples of these. It's due some
    5·1 answer
  • Where would you go to add fractions to a document in adobe indesign
    5·1 answer
  • Is there an ethically acceptable reason to study and use the various attack methods described in this chapter? Can you think of
    14·1 answer
  • ( Game Design) The companies who get video games out to consumers are called:
    12·1 answer
  • class llist { private: record * start; char filename[16]; int readfile(); int writefile(); record * reverse(record * ); void cle
    11·1 answer
  • Today, scientists agree that good research is ethical in nature and is guided by basic respect for human dignity and safety. How
    6·1 answer
  • Synchronization barriers are a common paradigm in many parallel applications.
    8·1 answer
  • Why isn't image display working on wacom tablet.
    8·1 answer
  • How to assign some object key values to other name react const.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!