1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANTONII [103]
3 years ago
5

Lesson 9 looping and random numbers

Computers and Technology
1 answer:
Pavlova-9 [17]3 years ago
8 0

Answer:

??????????????????????????????????????????////

Explanation:

You might be interested in
g If a class named Student has a data member named gpa , and one of its member functions has a parameter also named gpa , how ca
victus00 [196]

Answer:

By using the this keyword

Explanation:

The this keyword in java is used for pointing the current object or current variable .The this keyword is removing the ambiguity among the characteristics of the class as well as the variables with the similar name.

In the given question if the class student has member variable gpa also we have a method having the argument gpa with the help of this keyword we can refer the gpa variable inside the method .

Following are the implementation of the given question

public class Main // main class

{

 int gpa; // variable declaration

 public Main(int gpa) // constructor

 {

   this.gpa = gpa; // this keyword

 }

 public static void main(String[] args) // Main method

 {

   Main m= new Main(55); // creating object of class

   System.out.println("The Value of gpa is : " + m.gpa); // display value

 }

}

Output:

The Value of gpa is :55

5 0
4 years ago
Does anyone know edhesive 4.3 question 1
navik [9.2K]

No

.................................. :)

5 0
3 years ago
Read 2 more answers
The security manager assigned a new security administrator the task of implementing secure protocols on all wireless access poin
Marysya12 [62]

Answer:

Good choice, as its one of the most secure wireless communications encryption methods, even though WPA2 would be the best

Explanation:

8 0
4 years ago
In a real-world environment, changing granularity requirements might dictate changes in primary key selection, and those changes
scoray [572]

In a real-world environment, changing granularity requirements might dictate changes in primary key selection, and those changes might ultimately require the use of surrogate keys.

Explanation:

A surrogate key is a unique identity as an object or entity. It is used as an object in the database and as an entity in the modern world. Surrogate key is not a natural key hence it cannot be derived from application data.

Advantages of using surrogate key:

  • They are unique
  • They have uniform rules
  • It allows unlimited values
  • It stands the test of time
3 0
3 years ago
Read the following code used to calculate the weight of an item with two-pound packaging:
Veronika [31]

When there is an error in the code, the function that should be used is A. float(); weight requires decimals

<h3>When is a code?</h3>

Computer code, or a set of instructions or a system of rules defined in a specific programming language, is a term used in computer programming (i.e., the source code). It is also the name given to the source code after a compiler has prepared it for computer execution.

A float is a number with a decimal place since it is a floating-point number. When greater precision is required, floats are employed. The provided value is transformed into a floating point number by the float() function. In this case, the code is used to calculate the weight of an item and the float function will be vital.

Learn more about programs and code on:

brainly.com/question/22654163

#SPJ1

7 0
1 year ago
Other questions:
  • You will extend zyLab3, by adding a Player class and extending the PokemonField class. You will be working with three.java files
    13·1 answer
  • Which process alters readable data into unreadable form to prevent unauthorized access known as?
    8·1 answer
  • In the retrieval phase of Godden and Baddeley (1975) study of the encoding specificity principle, participants were asked to sup
    9·1 answer
  • Surprisingly, many of us may be unknowing victims of botnets. Because of the rising sophistication of botnet schemes, your compu
    14·1 answer
  • When responding to an incident in which explosive materials are suspected, is it safe to use wireless communication devices?
    12·1 answer
  • Suppose a computer has 1GB of memory. Operating System takes 256 MB of memory. Imagine each task takes up 196 MB of memory and t
    12·1 answer
  • Exercise : Randomizer In this exercise, we are going to create a static class Randomizer that will allow users to get random int
    14·1 answer
  • Discuss your favorite video games and why you like them. What types of features make a game fun to play? Why are they features e
    11·2 answers
  • What is computer virus?​
    12·1 answer
  • What is the task included in the information systems manager?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!