1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weeeeeb [17]
2 years ago
10

Write an application that allows a user to input the height and width of a rectangle. It should output the area and perimeter of

the rectangle. Use methods for entering the values, performing the computations, and displaying the results. Results should be formatted with one position to the right of the decimal and printed number aligned in a tabular display.
Computers and Technology
1 answer:
Whitepunk [10]2 years ago
5 0

Answer:

Explanation:

This code is written in Java. It creates a Rectangle class that contains variables for the height and width. It also contains constructor, methods for calculating perimeter and area, and a printInfo method to print out all the results. A test case has been created in the main method which creates a Rectangle object and prints out the printInfo which calls the area and perimeter methods as well. The output can be seen in the attached image below. Due to technical difficulties I have added the code as a txt file below.

Download txt
<span class="sg-text sg-text--link sg-text--bold sg-text--link-disabled sg-text--blue-dark"> txt </span>
7dee09595372d8f22e295e207a8b645b.jpg
You might be interested in
Which of the following statements is false?
Sergio039 [100]

Answer:

Option (d)

Explanation:

Option (a) the return type of the method specifies the type of the data that is returned for the method calling. The return type can be void if it doesn't return any value. The method return can be int, string and bool etc. So, option (a) is true and it not the correct option.

Option (b) is true it doesn't need any parameters. So, option (b) is not the correct option.

Option (c) is true. If the method has some return type other than void it must return something according to the return type.So, option (c) is not the correct option.

Option (d) is false. Getters and setters methods are used for accessing private variables but the name MUST start with get or set is false. The best practice is to start with get and set but it is NOT a must.

So, option (d) is correct option.

6 0
2 years ago
You have a technical interview for a new position in digital media. One of the questions you are asked is this: “A client asks y
GalinKa [24]

Pre-production is vital to all members of the crew. It ensures that the entire crew knows exactly what's going on. If they need to know why we're shooting in a certain way, or why we're shooting in a certain place, they can see the entire process that we've gone through in order to get to where we are.

7 0
3 years ago
HELPPP PLEASE <br><br> Html can be used to create complicated mobile applications <br> True or false
Hatshy [7]
It might be true because it’s technically a programming language so having knowledge on it can help you create mobile applications
7 0
2 years ago
Define a class, addresstype, that can store a street address, city, state, and zip code. use the appropriate functions to print
xxTIMURxx [149]

We will use Python for this task. 
 class addrestype(object): 
 # Constructor to initialize member variables
 def __init__(self, addr, city, state, zip):
  self.address = addr
  self.city = city
  self.state = state
  self.zip = zip 
 # Function to print the address (overrides behavior of builtin "print")
 def __str__(self):  return self.address + ", " + self.city + ", " + self.state + ", " + str(self.zip)

4 0
3 years ago
security investigators discovered that after attackers exploited a database server, they identified the password for the sa acco
daser333 [38]

Organization must notify the DPA and individuals

<h3>What was the typical weakness that outside attackers exploited?</h3>

One frequent flaw in network security that some attackers have learnt to take advantage of is the propensity of some web browsers, like Safari, to launch "safe" or "trusted" scripts automatically. Threat detection is the process of scrutinizing a security ecosystem from top to bottom to find any malicious behavior that could jeopardize the network. If a threat is identified, mitigating measures must be taken to effectively neutralize it before it can take advantage of any existing vulnerabilities. It's critical to often scan because security professionals and hackers frequently discover new vulnerabilities, like Log4Shell. Therefore, scanning for and identifying security vulnerabilities is the initial step in the vulnerability remedy procedure.

To learn more about outside attackers refer to

brainly.com/question/17329931

#SPJ4

3 0
11 months ago
Other questions:
  • He would like to get rid of the graph. What will accomplish
    8·1 answer
  • Write a calculator program using a switch statement that: a) Prompts the user to enter two numbers b) Prompts the user to select
    13·1 answer
  • Why is the answer B?
    6·1 answer
  • Which value can be entered to cause the following code segment to display the message: "That number is acceptable." int number;
    11·1 answer
  • Which shortcut key combination will move the cursor to the beginning of the line?
    13·1 answer
  • What does t'challa actions reveal about his character( black panther movie)​
    6·1 answer
  • What values can represent a bit
    8·1 answer
  • #done with school already
    14·1 answer
  • Which statement is true?
    13·2 answers
  • besides entering a url to go directly to a website, what else can you enter in a browser address bar to explore the internet?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!