1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rodikova [14]
3 years ago
10

Modify the FitnessTracker class, created in Chapter 4 Programming Exercise 3AB, so that the default constructor calls the three-

parameter constructor. Use TestFitnessTracker2 to test the new version of the class.
FitnessTracker2.java:
import java.time.*;
public class FitnessTracker2 {
String activity;
int minutes;
LocalDate date;
public FitnessTracker2() {
}
public FitnessTracker2(String activityParam, int minutesParam, LocalDate dateParam) {
}
public String getActivity() {
}
public int getMinutes() {
}
public LocalDate getDate() {
}
}

TestFitnessTracker2.java:
import java.time.*;
public class TestFitnessTracker2
{
public static void main(String[] args)
{
FitnessTracker2 exercise = new FitnessTracker2();

System.out.println(exercise.getActivity() + " " + exercise.getMinutes() +
" minutes on " + exercise.getDate());

// code to test constructor added for exercise 3b

LocalDate date = LocalDate.of(2020, 8, 20);
FitnessTracker2 exercise2 = new FitnessTracker2("bicycling", 35, date);

System.out.println(exercise2.getActivity() + " " + exercise2.getMinutes() +
" minutes on " + exercise2.getDate());
}
}
Computers and Technology
1 answer:
Ivenika [448]3 years ago
5 0

Answer:

Is this coding?

Explanation:

You might be interested in
The entirety of a packet at one Layer becoming the payload section at another is know as?
MA_775_DIABLO [31]
The answer to the question is: encapsulation
8 0
3 years ago
Read 2 more answers
A file name extension provides what information about a file?
ASHA 777 [7]
In a file extension, it tells what type of file it is and tells what compiler to run the code.
8 0
3 years ago
Read 2 more answers
Write at least 4 sentences
elixir [45]

Answer:

I don't know who advance the evolution who is it!

8 0
3 years ago
A network needs to be set up with 60 subnets. Given the IPv4 class C address 192.168.100.0, what subnet mask value should be use
d1i1m1o1n [39]
We are asked for the subnet mask and the total usable host. There are given values such as a network needs to be set up with 60 subnets given that the IPv4 class C address 192.168.100.0. The subnet mask is "255.255.255.0". The total host is "254".
6 0
3 years ago
Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identi
kvasek [131]

Answer:

B. Intrusion Detection Software (IDS)

Explanation:

An Intrusion Detection Software (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS  product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.

3 0
3 years ago
Other questions:
  • _____ is an information-analysis tool that involves the automated discovery of patterns and relationships in a data warehouse.
    12·1 answer
  • If there is no index.html file in the root folder nothing will be displayed when you navigate to the site address
    14·1 answer
  • Cleaning the keyboard is the most important part of keeping your computer running at peak performance.
    5·2 answers
  • How should you dress for a phone interview
    12·2 answers
  • ______ is the software that blocks a user from being able to access your computer.
    9·1 answer
  • Amitha writes up a one-page summary of a novel during her summer internship at a publishing company. When she reads over the pag
    10·1 answer
  • How does kinetic energy affect the stopping distance of a small vehicle compared to a large vehicle?
    14·2 answers
  • If the predetermined overhead allocation rate is 245% of direct labor cost, and the Baking Department's direct labor cost for th
    13·1 answer
  • In 3 to 5 sentences, describe whether or not files should be deleted from your computer. Explain you answer.
    14·2 answers
  • Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, et
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!