subject
Computers and Technology, 28.12.2019 03:31 lee9724

Public class someclass { private string aname; private int anumber; private boolean amawesome; public someclass(string name, int number){ aname = name; anumber = number; amawesome = true; } public someclass(string name, int number, boolean awesome){ aname = name; anumber = number; amawesome = awesome; } public void methodawesome(int number){ if(amawesome) anumber += number - 5; amawesome = ! amawesome; } public int method fantastic(boolean fantastic){ fantastic = fantastic & & amawesome; if(! fantastic & & anumber > 0) aname = aname + " is fantastic"; return anumber *= -2; } public void methodamazing(int num){ if(anumber < 0) anumber = num; } public static void main(string[] args) { someclass awesome = new someclass("awesome", 5); awesome. methodamazing(10); int enum = awesome. method fantastic(true); someclass amazing = new someclass("amazing", -10, false); amazing. methodawesome(7); amazing. methodamazing(18); someclass fantastic = new someclass ("fantastic", 11, true); int fannum = fantastic. methodfantastic(true); fantastic. methodawesome(awnum + fannum); } }
how many objects are created in the main method

ansver
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 19:10, sammigrace5820
How might the success of your campaign be affected if you haven’t carefully completed all field data or if you accidentally insert the wrong merge field in the document?
Answers: 1
image
Computers and Technology, 23.06.2019 00:00, addisonrausch
What season was better from fortnite?
Answers: 2
image
Computers and Technology, 24.06.2019 21:30, keelynnbarrier
Computer security/cybersecurity1) each of the following code fragments contains a number of security vulnerabilities. for each fragment, identify these security vulnerabilities and, for each vulnerability, discuss at least one way that it could be improved. note that in your discussion of how each vulnerability could be improved, you do not need to re-write a new version of the program in c; simply discuss your solution, either in pseudocode or in 1-2 sentences. a) /* file descriptor leak */#include #include int main(int argc, char *argv[]){ char *filepath = argv[0]; char *shellpath = argv[1]; file *passwords; passwords = fopen(filepath, "r"); /* read the password and do something with it */ /* . . */ /* fork and execute alternative shell */ execl(shellpath, "shell", null); }b)#include /* assume the following function is written for an electronic storefront. the user will enter the id of the item to be ordered, as well as the quantity of units that they would like to purchase. the program will then lookup the price for the price for the item using a predefined function, and return the total cost of the order.*/int gettotalcost(){ char itemid[9]; int price, unitsordered, cost; printf(" enter the 9-digit id of the item to be ordered: "); scanf("%s", & itemid); /* lookup the price according to the itemid */ price = getpricebyid(itemid); printf(" enter the quantity of units to be ordered: "); scanf("%d", & unitsordered); cost = price * unitsordered; return cost; }c)#include /* the following function is intended to return a user's full name by concatenating the user's first and last name into a single string and then returning that string. */char *getfullname(char *firstname, char *lastname, int max_len){ char fullname[max_len]; strcpy(fullname, firstname); strcat(fullname, " "); strcat(fullname, lastname); return fullname; }d)#include /* the following code snippet runs through the list of cli arguments entered and displays them to the console. */int main(int argc, char *argv[]){ int i; printf("you've entered the following arguments: "); for(i = 0; i < argc; i++){ print(argv[i]); printf("\n"); } /* */}
Answers: 2
image
Computers and Technology, 25.06.2019 08:30, alemvp7258
When converting the erd to a table design, how should you handle the assignedto relationship? (be sure to include a discussion of primary keys, foreign keys, and tables in your answer.)11. true/false projectid will be a foreign key in the employees table to reflect the “manages” relationship.12. after converting the erd to a table design, what fields will be present in the contracts
Answers: 3
You know the right answer?
Public class someclass { private string aname; private int anumber; private boolean amawesome; pu...

Questions in other subjects:

Konu
Mathematics, 29.07.2019 07:00