1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolbaska11 [484]
3 years ago
10

Add the following method to your Rectangle class: public boolean contains(Rectangle rect) Returns whether the given other rectan

gle lies entirely within the bounds of this rectangle. (You don't need to write the class header or declare the fields; assume that this is already done for you. Just write your methods' complete code in the box provided.) See previous exercises for a description of the Rectangle and Point classes and their public members.
Computers and Technology
1 answer:
Radda [10]3 years ago
8 0

Answer:

Explanation:

The code is not provided in the question but can be easily found online. The code is written in Java and the Rectangle class contains the following variables for the Rectangle object

   double x;

   double y;

   double width;

   double height;

The x and y represent the starting positions and then the width and height are added to these starting positions to indicate the endpoints. Ultimately, these four points create the rectangle. The following method detects if these points from the rectangle passed as an argument are within the rectangle in question

public boolean contains (Rectangle r) {

   return x < r.x + r.width && x + width > r.x && y < r.y + r.height && y + height > r.y;

}

You might be interested in
How many total numbers can be represented with an 8-bit binary (base-2) system?
ddd [48]

Answer:

256

Explanation:

4 0
3 years ago
What term is the ability to restore service quickly and without lost data if a disaster makes your components unavailable or it
oksian1 [2.3K]

Answer:

"Recoverability" is the appropriate solution.

Explanation:

  • The above refers to either the DBMS work timetables where only certain processes are conducted out only when all transactions where such modifications are learned by the submission are implemented or operated.
  • This technique is used to reinstate make informed even without system failures.
8 0
3 years ago
PLS HURRY!!!<br> Look at the image below!
max2010maxim [7]

Answer:

Ctrl+c

Explanation:

6 0
3 years ago
Read 2 more answers
The Gramm-Leach-Bliley Act contains a rule that ensures security and confidentiality of customer information, protects against a
ValentinkaMS [17]

Answer:

b. The Safeguards Rule

Explanation:

According to a different source, these are the options that come with this question:

a. The Information Assurance Rule

b. The Safeguards Rule

c. The Safety Rule

d. The Guardian Rule

This rule is called the <em>Safeguards Rule</em>, and it comes from the Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999. This is an act of Congress signed by President Bill Clinton that removed barriers among banking companies, securities companies and insurance companies. This meant that organizations such as commercial banks, investment banks, securities firms, and insurance companies were able to consolidate.

7 0
3 years ago
Read 2 more answers
Horizontal cabling Group of answer choices A. is cabling that extends out from the telecommunications closet into the LAN work a
likoan [24]

Answer:B

Explanation:.is cabling that extends out from the work area into the LAN.

4 0
4 years ago
Other questions:
  • Information permanently stored on a hard disk, diskette, cd-rom disk, or tape, is called ________ storage.
    8·1 answer
  • Ipv6 includes a native information security framework (ipsec) that provides both data and control packets. true false
    15·1 answer
  • How does modularity provide flexibility in a structured programming design?
    6·1 answer
  • If the list above is named list1 and is implemented as a list, whatstatement would you use to find the number ofelements?list1.s
    9·1 answer
  • PLEASE HELP QUICK WILL GIVE BRAINLY
    6·1 answer
  • A reflexive pronoun is a pronoun
    6·1 answer
  • What is the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.e
    9·1 answer
  • Discuss five processes for analyzing a qualitative study
    11·2 answers
  • China's cultural diversity, China is composed of 56 ethnic groups.
    5·1 answer
  • If you need to multiply 50 and 8 and divide by 2, what would you type on the numerlc keypad?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!