1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
julia-pushkina [17]
3 years ago
10

The following table describes the required fields for two classes and typical values stored in those fields.

Computers and Technology
1 answer:
enot [183]3 years ago
8 0

Answer:

hope this helps,if it did pls mark my ans as brainliest

Explanation:

using System;

class Printer{ string companyName; int pagesOutput;

double price;

public Printer(string companyName,int pagesOutput,double price){

this.companyName=companyName; this.pagesOutput=pagesOutput; this.price=price;

}

public virtual void Display(){ Console.WriteLine("companyName: "+companyName+" pagesOutput: "+pagesOutput+" price: "+price);

}

}

class PrinterCumScanner:Printer{ int imageDpi;

public PrinterCumScanner(string companyName,int pagesOutput,double price,int imageDpi):base(companyName,pagesOutput,price){ this.imageDpi=imageDpi; }

public override void Display(){ base.Display(); Console.WriteLine("imageDpi: "+imageDpi);

}

}

public class Program { static void Main(string[] args) { const int NUM_PRINTERS=3;

Printer []stock=new Printer[NUM_PRINTERS];

stock[0]=new Printer("HP",40,89.50);

stock[1]=new PrinterCumScanner("HP",40,215.0,320); stock[2]=new PrinterCumScanner("Cannon",30,175.0,240);

foreach(Printer aPrinter in stock){ aPrinter.Display();

}

}

}

You might be interested in
Write a class of complex numbers consisting of:
Gnom [1K]

Answer:

hi sorry for not knowing the answer

but please follow have a great day,night, or afternoon

3 0
3 years ago
1. provides a list of at least five SSIDs and the
taurus [48]

One of the most important ways to provide wireless security is through:

  • The use of encryption.

<h3>What is Wireless Security?</h3>

This refers to the network authentication and use of encryption to secure a network from unauthorized access or compromise of the network by an external agent.

With this in mind, we can see that SSID is a WiFi network name and it makes use of WPA2 security encryption to protect the wireless network through wireless encryption protocol.

Please note that your question is incomplete so I gave you a general overview to help you get a better understanding of the concept.

Read more about wireless security here:
brainly.com/question/14449935

8 0
2 years ago
Just letting all my friends know, i am deleting this account and making a new one same username and profile picture so you know
ki77a [65]

Answer:

Explanation:

OK good luck

3 0
3 years ago
Read 2 more answers
Which of these statements regarding mobile games is true? A. They are typically played indoors. B. They have detailed environmen
Lyrx [107]

Answer:

c and d

Explanation:

6 0
4 years ago
A good sentence about art
victus00 [196]

Answer:

Art, in its broadest sense, is a form of communication. It means whatever the artist intends it to mean, and this meaning is shaped by the materials, techniques, and forms it makes use of, as well as the ideas and feelings it creates in its viewers . Art is an act of expresThe three classical branches of visual art are painting, sculpture, and architecture. Music, theatre, film, dance, and other performing arts, as well as literature and other media such as interactive media, are included in a broader definition of the arts.

sing feelings, thoughts, and observations.

Now, remove any element founded in creativity, art and design, and all that remains are piles of materials that require human imagination and visual thinking. Art forces humans to look beyond that which is necessary to survive and leads people to create for the sake of expression and meaning.

MAY THE FORC E BE WITH U

6 0
3 years ago
Other questions:
  • A user would like to format an arrow that has been inserted into a chart. What is the most efficient method for completing this
    9·1 answer
  • What two optical disc drive standards support writing discs with a total capacity of 8.5gb?
    12·1 answer
  • Function templates ___________.
    5·1 answer
  • Energy is defined as stored energy
    13·2 answers
  • Do rats smell good? what do you think
    8·2 answers
  • What is the latest date you can file the FAFSA if you're planning to start
    6·2 answers
  • A customer seeks to buy a new computer for private use at home. The customer primarily needs the computer to use the Microsoft P
    9·1 answer
  • Which of these statements about the truck driving occupation in the U.S. are accurate?
    12·2 answers
  • In 2008, researchers at Princeton University demonstrated techniques to retrieve RAM contents after the computer had been powere
    8·1 answer
  • use c , c, java or python (any one) programming language for the following programming exercises. do not call built-in library f
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!