1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergio039 [100]
2 years ago
10

. Create an abstract Dollar class with two integer attributes, both of which are non-public (Python programmers - it is understo

od that there is nothing private in Python but try to not access the attributes directly from outside the classes). The int attributes will represent whole part (or currency note value) and fractional part (or currency coin value) such that 100 fractional parts equals 1 whole part.
Computers and Technology
1 answer:
aksik [14]2 years ago
4 0

Answer:

Explanation:

The following code is written in Java. It creates the abstract dollar class that has two instance variables for the dollars and the coins that are passed as arguments. The test output can be seen in the picture attached below.

class Dollar {

   int dollars;

   double coin;

   private Dollar(int dollar, int coin) {

       this.dollars = dollar;

       this.coin = Double.valueOf(coin) / 100;

   }

   

}

You might be interested in
Computers are often referred to as _____.
GalinKa [24]
Smart machines I'm pretty sure
4 0
2 years ago
The title of a Web page is the text that appears on the title bar and taskbar of the browser window. *
forsale [732]

False

True

True

False

False

True

7 0
3 years ago
A computer processes data only using 1s and 0s
ArbitrLikvidat [17]
Yes it only processes data using 1s and 0s
8 0
3 years ago
Read 2 more answers
Hello I am currently working on a multi-sim project. In the file I have already created a timer that goes from 00 - 80 and reset
Digiron [165]

// Copyright 2017 The Chromium Authors. All rights reserved.

// Use of this source code is governed by a BSD-style license that can be

// found in the LICENSE file.

'use strict';

/**

* Alias for document.getElementById.

* @param {string} id The ID of the element to find.

* @return {HTMLElement} The found element or null if not found.

*/

function $(id) {

 // eslint-disable-next-line no-restricted-properties

 return document.getElementById(id);

}

/**

* Get the preferred language for UI localization. Represents Chrome's UI

4 0
2 years ago
a customer receives a message from the bank asking him/her to provide login information. assuming the message is intended to def
gizmo_the_mogwai [7]

The type of infiltration technique used here is phishing. Phishing is a form of social engineering attack that is often used to obtain user information such as login and credit card information.

Phishing is a type of social engineering in which an attacker delivers a false (e.g. fake, fake, or other deceptive) communication designed to trick a person into providing critical information to the attacker, or to install malicious software, such as ransomware, on the victim. infrastructure.

Phishing attacks are becoming more sophisticated and often transparently mirror the website being attacked, allowing the attacker to track everything the victim is doing there and bypass other security barriers with them.

By far the most common attack by hackers as of 2020, according to the FBI Internet Crime Complaint Center, which records more phishing incidents than any other type of cybercrime combined.

To know more about phishing click here:

brainly.com/question/24156548

#SPJ4

7 0
10 months ago
Other questions:
  • What is the relationship between ionic bonds and cleavage
    13·1 answer
  • Traffic that is encrypted will typically pass by an intrusion prevention system untouched.a. Trueb. False
    10·1 answer
  • Exploring Arraylists. Remember that arraylists are good for adding and removing things, and that they are clock-cycle friendlier
    13·1 answer
  • "Write a class named Car that has the following data attributes:" _ _year_model (for the car’s year model) _ _make (for the make
    12·1 answer
  • What decides the amount of delay between shots on a digital camera?
    7·1 answer
  • Which of these lines of code will increment a variable?
    11·1 answer
  • Which one is better AMD Ryzen 5 Or Nvidia Gtx 2080 ti
    6·1 answer
  • Writers in our networked world enhance their credibility by
    5·1 answer
  • Could anyone help me with this assignment please?
    6·1 answer
  • Given three floating-point numbers x, y, and z, output x to the power of y, x to the power of (y to the power of z), the absolut
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!