1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ludmilkaskok [199]
3 years ago
8

Print person1's kids, call the incNumKids() method, and print again, outputting text as below. End each line with a newline.Samp

le output for below program with input 3:Kids: 3New baby, kids now: 4// ===== Code from file PersonInfo.java =====public class PersonInfo { private int numKids; public void setNumKids(int setPersonsKids) { numKids = setPersonsKids; } public void incNumKids() { numKids = numKids + 1; } public int getNumKids() { return numKids; }}// ===== end =====// ===== Code from file CallPersonInfo.java =====import java.util.Scanner;public class CallPersonInfo { public static void main (String [] args) { Scanner scnr = new Scanner(System.in); PersonInfo person1 = new PersonInfo(); int personsKid; personsKid = scnr.nextInt(); person1.setNumKids(personsKid); /* Your solution goes here */ }}// ===== end =====

Computers and Technology
2 answers:
professor190 [17]3 years ago
8 0

Answer:

System.out.println("Kids: " + person1.getNumKids());

person1.incNumKids();

System.out.println("New baby, kids now: " + person1.getNumKids());

Explanation:

Reminder: To be able to call a function that is inside a class, we need to use an object of that class. In this case, person1 is our object. If we would like to access any function, we need to type person1.functionName().

1) We need to call getNumKids() to get how many kids they have (It is 3 because user inputs 3 and it is set to the this value using setNumKids() function). To call this function, we need to use person1 object that is created earlier in the <em>main</em> function. To be able to print the result, we call the function inside the <em>System.out.println().</em>

2) To increase the number of kids, we need to call incNumKids() method with person1 object again. This way number of kids are increased by one, meaning they have 4 kids now.

3) To get the current number of kids, we need to call getNumKids() function using person1 object. To be able to print the result, we call the function inside the <em>System.out.println().</em>

andriy [413]3 years ago
6 0

Answer:

System.out.println("Kids: " + person1.getNumKids());

person1.incNumKids();

System.out.println("New baby, kids now: " + person1.getNumKids());

Explanation:

You might be interested in
What do you do to think positive and maintain discipline to play
Agata [3.3K]

Answer:

to make peaceful mind.to develop our character..

6 0
3 years ago
What is the fullform of BIT​
Natalija [7]

▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬

The full Form of BIT is "Binary digit" which is the basic unit of information in computing . A Binary digit can be 0 or 1 . 0 represents off state & 1 represents on state .

▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬

8 0
3 years ago
Apple users tend to like the company and love its products. Apple has successfully nurtured this __________ component of its cus
kow [346]

Answer:

Affective

Explanation:

Affective Component − This is the second model of customers attitude. This consists of a person’s feelings, sentiments, and emotions for a particular brand or product. They treat them as the primary criteria for the purpose of evaluation. The state of mind also plays a major role, like the sadness, happiness, anger, or stress, which also affects the attitude of a consumer.

7 0
3 years ago
Describe three ways to call attention to the text on a web page.
vichka [17]

Answer:

Underline the important text.

Make Links a Different Colour.

Making visual adjustments such as making text bold, making it italicized, making it ALL CAPS.

8 0
3 years ago
Frank discovers a keylogger hidden on the laptop of his company’s chief executive officer. What information security principle i
pochemuha
Frank discovers a keylogger hidden on the laptop of his company’s chief executive officer. What information security principle is the keylogger most likely designed to disrupt?
3 0
4 years ago
Other questions:
  • What is an embedded system. Give examples
    12·1 answer
  • An excel user should use a relative cell reference when it is important to ____. preserve the relationship to the formula locati
    7·1 answer
  • ____ is a bundled set of communications services, including internet, telephone, and tv, that operates over a total fiber-optic
    5·1 answer
  • True or False <br><br> Rootkits are only made by black-hat hackers.
    8·1 answer
  • Given a scanner reference variable named input that has been associated with an input source consisting of a sequence of strings
    14·2 answers
  • Rounding up and down for 389,422
    7·1 answer
  • Able to make a survey form using VB (Visual basics 6.0) to represent ways of conservation of
    8·2 answers
  • 2. How is accessing the Internet through a home network and public Wi-Fi similar?​
    15·1 answer
  • Why is it important to prepare the farm resources before you start working? explain​
    14·1 answer
  • The RGB value below produces a shade of purple. What does the number 175
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!