1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jonny [76]
3 years ago
10

For this exercise, you are going to create a part of an Animal hierarchy. Unlike some of our examples and the previous exercises

, this exercise is going to have 3 levels in the hierachry.
At the top is the Animal class. Below that, we are going to have a subclass for Pets. Under pets, we are going to have 2 subclasses, Dogs and Fish.
You will need to create your class hierarchy and add instance variables, getters, and setter methods to accommodate the following information:
I need to save what type of animal I have (String variable)
I want to be able to save a name for my fish and dog (String variable)
I want to know which fish need salt water v. fresh water (String variable)
I want to know if my dog has been trained (boolean variable)
I want to know the size of my dog and fish (String variable)
Make sure you use common sense names for your variables!
public class Animal
{
}
public class Fish extends Pet public class Pet extends Animal public class Dog extends Pet
{ { {
} } }
Computers and Technology
1 answer:
kati45 [8]3 years ago
5 0

Answer:

vehicle super class 9.1.4

Explanation:

So you need to create a super class containig all the animals use the class above for referance

You might be interested in
Select the correct word to complete the sentence.
Mariana [72]

Answer:

NSFNET

Explanation:

6 0
2 years ago
What subsection of the Internet requires specialized browser to access and is frequently used by cyber criminals and underground
kotykmax [81]

Answer:

c. Dark Web                                                

Explanation:

Surface web is also called visible web is a part of world wide web that can be easily searchable using search engines as its contents are indexed by the search engines such as Google and its contents are accessible by public using standard web browsers. So a is not a suitable choice.

Deep Web is called invisible web as it is not accessible or searchable to standard search engines like Google. Search engines cannot index the contents of these sites. However such sites do not requires specialized browsers to access. So b is not a suitable choice.

Dark Web: It is a part of Deep Web sites but it requires specialized software and browsers to access. These sites cannot be indexed and cannot be searchable through standard search engines. This is also called dark side of the world wide web darker which is frequently used by criminals, hackers, black markets, hit-men. Illegal activities on a massive level is takes place in the dark web such as access to stolen sensitive information, malware, drug trade and terrorist operations. These sites are temporary and keep changing addresses to lessen the risk of getting caught by govt agencies or security officials. So c is the suitable choice.

Crypto-Net is a kind of neural network which works with encrypted data which can make a prediction based on the data without disclosing the data and prediction to the 3rd party. So d is not a suitable option.

6 0
3 years ago
Choose the correct term to complete the sentence.
Diano4ka-milaya [45]

Answer:

Object-oriented programming

Explanation:

When used in object-oriented programming , a class is a factory for creating object. An object is a collection of data and behavaiors that represent some entity(real or abstract).

6 0
3 years ago
Users of an access point share the transmission capacity of the access point. The throughput a user gets is called the ________.
sdas [7]

Solution:

Users of an access point share the transmission capacity of the access point. The throughput a user gets is called the bits per seconds.

Thus this is the required answer.

6 0
3 years ago
My current lesson is The Excel Screen and Worksheets and the question is:
Usimov [2.4K]
I can't tell you the answer without a picture, but to find the answer yourself: Go straight up from the cell containing 'Activity Questions' this will tell you a letter such as B. Go directly across to the left of the cell containing 'Activity Questions' this will tell you a number such as 3. The name of the cell I used as an example would be called B3.
3 0
4 years ago
Other questions:
  • Which of the following is an appropriale way to declinc an offer in a<br>professional environment?​
    13·2 answers
  • HELLLLLP ill make you brainiest and ill give u a lot of points if you HELP ME Directions Part One.
    12·2 answers
  • Clifford visits a website that has a lot of multimedia content. He watches a few videos. However, some videos do not play. The b
    14·1 answer
  • Transforming a message into an understandable sign and symbol system is _________.
    15·1 answer
  • _________________ is a standard method or protocol for web pages to request special processing on the web server, such as databa
    7·1 answer
  • What does technological convergence mean, with examples?
    10·1 answer
  • Run a Monte Carlo simulation on this vector representing the countries of the 8 runners in this race:
    7·1 answer
  • In Marvel Comics, what imaginary rare metal is an important natural resource of Wakanda, the home country of Black Panther?
    15·1 answer
  • What if the result of conectivity testing is 100%Loss?Explain.​
    14·1 answer
  • _______ is a very common approach to multisystem authorization.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!