1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makkiz [27]
2 years ago
6

JAVA CODE.

Computers and Technology
1 answer:
kykrilka [37]2 years ago
3 0

Solution :

public class Rectangle  

{

int len,bre;

Rectangle(int l,int b)

{

setLength(l);

setBreadth(b);

}

void setLength(int l)

{

len=l;

}

void setBreadth(int b)

{

bre=b;

}

int getLength()

{

return len;

}

int getBreadth()

{

return bre;

}

void makeSquare(Rectangle r)

{

r.setBreadth(len);

System.out.println("Square Parameter");

System.out.println("Length:" +r.getLength() + " Length: ".getBreadth());

}

public static void main(String[] args){

Rectangle r=new Rectangle(10,5);

System.out.println("Rectangle Parameter");

System.out.println("Length:"+r.getLength()+" Breadth:"+r.getBreadth());

r.makeSquare(r);

 }

 }

}

You might be interested in
What do you mean by an algorithm?<br>​
Over [174]
A program that can be used in many scenarios
8 0
2 years ago
You need to protect sensitive files from unauthorized users even if the disk is stolen. What feature should you use and on what
Lynna [10]

Answer:

EFS on NTFS

Explanation:

EFS (Encryption File System) allows users to store confidential information about a computer when people who have physical access to your computer could otherwise compromise that information, intentionally or unintentionally. EFS is especially useful for securing sensitive data on portable computers or on computers shared by several users.  An attacker can also steal a computer, remove the hard drive(s), place the drive(s) in another system, and gain access to the stored files. Files encrypted by EFS, however, appear as unintelligible characters when the attacker does not have the decryption key.

The Encrypting File System (EFS) that is included with the operating systems provides the core file encryption technology to store NTFS files encrypted on disk.

7 0
3 years ago
An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks
Fittoniya [83]

Answer:

e. Phishing

Explanation:

Phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

Attackers use it to steal sensitive user data or information.

5 0
3 years ago
Read 2 more answers
Which of these substances is a very important natural resource that is useful in the making of computer chips?
Arisa [49]

Silicon is the conductive material used in making Computer Chips. Krypton only exists in the DC Universe, Granite is a rock and Boron is used for rocket thruster ignitors and other pyrotechnic things.

8 0
3 years ago
Read 2 more answers
What is the value of the num_colors variable? var colors = ["red","blue","orange","yellow","green","brown","purple"]; num_colors
barxatty [35]

Answer:

Hello the options to your question is missing here are the options

  • 6
  • 7
  • 8
  • NaN

answer : 7

Explanation:

The value of the num_colors variable is 7 and this because you have to neglect the fact that there is no termination symbol at the end of the assignment operation in the code.

But when we consider the none existence of a termination symbol at the end of the assignment operation in the code, the code will generate a syntax error instead of a value.

4 0
2 years ago
Other questions:
  • PLEASE HELP 15 POINTS Emma plans on building a dog house using an algorithm. What will be the final step of the process? a) crea
    6·1 answer
  • How i can connect to internet automatically when i switch on my computer?
    8·1 answer
  • What is often called a platform, a collection of computer programs that work together to manage hardware and software to ensure
    12·1 answer
  • A member function of a derived class may not have the same name as a member function of a base class
    9·1 answer
  • What percentage of business are using social media today
    14·1 answer
  • What is the cell reference for row 22 and column B? __________<br><br> In excel
    5·1 answer
  • Son opciones de configuración espacio multimedia llamado blog
    9·1 answer
  • I WILL GIVE BRAINLIST THING TO WHOEVER GIVES ME THE CORRECT ANSWER
    11·1 answer
  • Which part of the computer is responsible for managing memory allocation for all applications
    12·1 answer
  • Which of the following describe the characteristics of a good logo? Choose all that apply. It is a complex design It is memorabl
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!