Design a class named Complex for representing complex numbers and the methods add, subtract, multiply, divide, abs for performing complex-number operations, and override toString method for returning a string representation for a complex number. The toString method returns a + bi as a string. If b is 0, it simply returns a.
Provide three constructors Complex(a, b), Complex(a), and
Complex(). Complex() creates a Complex object for number 0 and
Complex(a) creates a Complex object with 0 for b. Also provide
the getRealPart() and getImaginaryPart() methods for returning
the real and imaginary part of the complex number, respectively.
Your Complex class should also implement the Cloneable
interface.
Write a test program that prompts the user to enter two complex numbers and display the result of their addition, subtraction, multiplication, and division.
Here is the main class. It cannot be changed.
import java.util.Scanner;
public class Test {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.print("Enter the first complex number: ");
double a = input.nextDouble();
double b = input.nextDouble();
Complex c1 = new Complex(a, b);
System.out.print("Enter the second complex number: ");
double c = input.nextDouble();
double d = input.nextDouble();
Complex c2 = new Complex(c, d);
System.out.println("(" + c1 + ")" + " + " + "(" + c2 + ")" + " = " + c1.add(c2));
System.out.println("(" + c1 + ")" + " - " + "(" + c2 + ")" + " = " + c1.subtract(c2));
System.out.println("(" + c1 + ")" + " * " + "(" + c2 + ")" + " = " + c1.multiply(c2));
System.out.println("(" + c1 + ")" + " / " + "(" + c2 + ")" + " = " + c1.divide(c2));
System.out.println("|" + c1 + "| = " + c1.abs());
Complex c3 = (Complex)c1.clone();
System.out.println(c1 == c3);
System.out.println(c3.getRealPart());
System.out.println(c3.getImaginaryPart());
}
}

Answers

Answer 1

Answer:

Explanation:

The following code is written in Java, it creates the entire complex class as requested so that it works with the main method that has been provided in the question without having to change anything in the main method. Proof of output can be seen in the attached picture below

import java.util.Scanner;

class Test implements Cloneable{

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       System.out.print("Enter the first complex number: ");

       double a = input.nextDouble();

       double b = input.nextDouble();

       Complex c1 = new Complex(a, b);

       System.out.print("Enter the second complex number: ");

       double c = input.nextDouble();

       double d = input.nextDouble();

       Complex c2 = new Complex(c, d);

       System.out.println("(" + c1 + ")" + " + " + "(" + c2 + ")" + " = " + c1.add(c2));

       System.out.println("(" + c1 + ")" + " - " + "(" + c2 + ")" + " = " + c1.subtract(c2));

       System.out.println("(" + c1 + ")" + " * " + "(" + c2 + ")" + " = " + c1.multiply(c2));

       System.out.println("(" + c1 + ")" + " / " + "(" + c2 + ")" + " = " + c1.divide(c2));

       System.out.println("|" + c1 + "| = " + c1.abs());

       Complex c3 = c1;

       System.out.println(c1 == c3);

       System.out.println(c3.getRealPart());

       System.out.println(c3.getImaginaryPart());

   }

}

class Complex implements Cloneable {

   public interface Cloneable { }

   private double realPart;

   public double getRealPart() {

       return realPart;

   }

   public void setReal(double real) {

       this.realPart = real;

   }

   private double imaginaryPart;

   public double getImaginaryPart() {

       return imaginaryPart;

   }

   public void setImaginary(double imaginary) {

       this.imaginaryPart = imaginary;

   }

   public Complex(double a, double b) {

       realPart = a;

       imaginaryPart = b;

   }

   public Complex(double a) {

       realPart = a;

       imaginaryPart = 0;

   }

   public Complex() { }

   public Complex add(Complex comp2) {

       double real1 = this.getRealPart();

       double real2 = comp2.getRealPart();

       double imaginary1 = this.getImaginaryPart();

       double imaginary2 = comp2.getImaginaryPart();

       return new Complex(real1 + real2, imaginary1 + imaginary2);

   }

   public Complex abs() {

       double real1 = Math.abs(this.getRealPart());

       double imaginary1 = Math.abs(this.getImaginaryPart());

       return new Complex(real1, imaginary1);

   }

   public Complex subtract(Complex comp2) {

       double real1 = this.getRealPart();

       double real2 = comp2.getRealPart();

       double imaginary1 = this.getRealPart();

       double imaginary2 = comp2.getRealPart();

       return new Complex(real1 - real2, imaginary1 - imaginary2);

   }

   public Complex multiply(Complex comp2) {

       double real1 = this.getRealPart();

       double real2 = comp2.getRealPart();

       double imaginary1 = this.getRealPart();

       double imaginary2 = comp2.getRealPart();

       return new Complex(real1 * real2, imaginary1 * imaginary2);

   }

   public Complex divide(Complex comp2) {

       double real1 = this.getRealPart();

       double real2 = comp2.getRealPart();

       double imaginary1 = this.getRealPart();

       double imaginary2 = comp2.getRealPart();

       return new Complex(real1 / real2, imaginary1 / imaginary2);

   }

   public String toString() {

       String result;

       result = realPart + " + " + imaginaryPart + "i";

       return result;

   }

}

Design A Class Named Complex For Representing Complex Numbers And The Methods Add, Subtract, Multiply,

Related Questions

List the types of infrared we have

Answers

Answer: infared types like the sun, sun light, heat lamps, and radiators

The L-exclusion problem is a variant of the starvation-free mutual exclusion problem. We make two changes: as many as L threads may be in the critical section at the same time, and fewer than L threads might fail (by halting) in the critical section. An implementation must satisfy the following conditions:_____.
L-Exclusion: At any time, at most L threads are in the critical section.
L-Starvation-Freedom: As long as fewer than L threads are in the critical section, then some thread that wants to enter the critical section will eventually succeed (even if some threads in the critical section have halted).
Modify the n-process Bakery mutual exclusion algorithm to turn it into an L-exclusion algorithm. Do not consider atomic operations in your answer. You can provide a pseudo-code solution or written solution.

Answers

Answer:

The solution is as follows.

class LFilters implements Lock {

int[] lvl;

int[] vic;

public LFilters(int n, int l) {

lvl = new int[max(n-l+1,0)];

vic = new int[max(n-l+1,0)];

for (int i = 0; i < n-l+1; i++) {

lvl[i] = 0;

}

}

public void lock() {

int me = ThreadID.get();

for (int i = 1; i < n-l+1; i++) { // attempt level i

lvl[me] = i;

vic[i] = me;

// rotate while conflicts exist

int above = l+1;

while (above > l && vic[i] == me) {

above = 0;

for (int k = 0; k < n; k++) {

if (lvl[k] >= i) above++;

}

}

}

}

public void unlock() {

int me = ThreadID.get();

lvl[me] = 0;

}

}

Explanation:

The code is presented above in which the a class is formed which has two variables, lvl and vic. It performs the operation of lock as indicated above.

Page Setup options are important for printing a PowerPoint presentation a certain way. The button for the Page Setup dialog box is found in the
File tab.
Home tab.
Design tab.
Slide Show tab.

Answers

Answer: Design tab

Explanation:

The page setup simply refers to the parameters which are defined by a particular user which is vital in knowing how a printed page will appear. It allows user to customize the page layout. The parameters include size, page orientation, quality of print,margin etc.

It should be noted that page setup options are vital for printing a PowerPoint presentation in a certain way and the button for the Page Setup dialog box can be found in the design tab.

Which line of code will use the overloaded multiplication operation?

class num:
def __init__(self,a):
self.number = a

def __add__(self,b):
return self.number + 2 * b.number

def __mul__(self, b):
return self.number + b.number

def __pow__(self, b):
return self.number + b.number

# main program
numA = num(5)
numB = num(10)

Which line of code will use the overloaded multiplication operation?

class num:
def __init__(self,a):
self.number = a

def __add__(self,b):
return self.number + 2 * b.number

def __mul__(self, b):
return self.number + b.number

def __pow__(self, b):
return self.number + b.number

# main program
numA = num(5)
numB = num(10)

a) product = numA * numB
b) product = numA.multiply(numB)
c) product = numA.mul(numB

Answers

For multiplication one: product = numA * numB

For the addition: result = numA + numB

got 100 on this ez

(searched all over internet and no one had the answer lul hope this helps!)

Answer: First option: product = numA * numB

second option-numA + numB

Explanation:

who would benefit from using self-driving cars

Answers

Answer:

self independent

no need to depend on others

Answer:

Door dash employee's/Uber eat employees

would benefit from this

Careers emerge solely to make profit for the industry.


False

True

Answers

Explanation:

Careers emerge solely to make profit for the industry: False

Brainliest and follow and thanks

morning dude

How many types of video
compressions__
a. 4
b. 2.
• c. 3
d. 6​

Answers

A. I think correct me if I’m wrong

Apart from the OOPs concepts learned in this lesson, identify additional concepts and write an essay on their functions. Explain how they are used in a program.
PLSSSS HELLP MEEE ASAP!!!!​

Answers

Explanation:

Object Oriented Programming (OOPS or OOPS for Object Oriented Programming System) is the most widely used programming paradigm today. While most of the popular programming languages are multi-paradigm, the support to object-oriented programming is fundamental for large projects. Of course OOP has its share of critics. Nowadays functional programming seems the new trendy approach. Still, criticism is due mostly to misuse of OOP.

La herramienta …………………………... en el programa CorelDraw X8, está conformado por texto artístico.

Answers

Answer

what are you talking about, thats crazy!

Explanation:

no seriasly, what are you taking about


Explain working principle of computer.​

Answers

Explanation:

The working principle of the computer system. Computers do the work primarily in the machine and we can not see, a control center that converts the information data input to output. This control center, called the central processing unit (CPU), How Computers Work is a very complex system.

hope it is helpful to you

cmo se puede añadir amigo ??'

Answers

Answer:ok

Explanation:

the first page of a website is what?​

Answers

Answer:

index.html

Explanation:

The name of the html file for the homepage of a website is usually "index.html"

Landing page or Home page

A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection contains the cleartext credentials of every major breach for the last four years. The security team pulls and compares users' credentials to the database and discovers that more than 30% of the users were still using passwords discovered in this list. Which of the following would be the BEST combination to reduce the risks discovered?

a. Password length, password encryption, password complexity
b. Password complexity least privilege, password reuse
c. Password reuse, password complexity, password expiration
d. Group policy, password history, password encryption

Answers

Answer:

a. Password length, password encryption, password complexity

Explanation:

Under this scenario, the best combination would be Password length, password encryption, password complexity. This is because the main security problem is with the user's passwords. Increasing the password length and password complexity makes it nearly impossible for individuals to simply guess the password and gain access, while also making it extremely difficult and time consuming for hackers to use software to discover the password as well. Password excryption would be an extra layer of security as it encrypts the password before storing it into the database, therefore preventing eavesdroppers from seeing the password and leaked info from being used without decryption.

explain three main steps in mail merging (6 marks) ​

Answers

Answer:

Explanation:

The mail merging process generally requires the following steps:

Creating a Main Document and the Template.

Creating a Data Source.

Defining the Merge Fields in the main document.

Merging the Data with the main document.

Saving/Exporting.

PLEASE HELP ME FIX THIS CODE.

I WANT IT TO HAVE USER INPUT TO CHANGE AND IMAGE FILTER TO BLUE RED OR GREEN.


user_color = input("What color would you like to paint the canvas, blue, red or green?:")



def user_red(pixel):
pixel[0] = 100 + pixel[0]
pixel[1] = 100 - pixel[1]
pixel[2] = 100 - pixel[2]

return pixel

def user_green(pixel):
pixel[0] = 100 + pixel[0]
pixel[1] = 100 - pixel[1]
pixel[2] = 100 - pixel[2]

return pixel

def user_blue(pixel):
pixel[0] = 100 + pixel[0]
pixel[1] = 100 - pixel[1]
pixel[2] = 100 - pixel[2]

return pixel


def custom_filter(image, user_color):
for x in range(image.get_width()):
for y in range(image.get_height()):
pixel = image.get_pixel(x,y)
new_colors = invert_pixel(pixel)
image.set_red(x, y, new_colors[0])
image.set_green(x, y, new_colors[1])
image.set_blue(x, y, new_colors[2])



return image


def change_image():
global image
image = custom_filter(image, user_color)



timer.set_timeout(change_image, IMAGE_LOAD_TIME)

Answers

PLEASE HELP ME FIX THIS CODE.

I WANT IT TO HAVE USER INPUT TO CHANGE AND IMAGE FILTER TO BLUE RED OR GREEN.

user_color = input("What color would you like to paint the canvas, blue, red or green?:")

def user_red(pixel):

pixel[0] = 100 + pixel[0]

pixel[1] = 100 - pixel[1]

pixel[2] = 100 - pixel[2]

return pixel

def user_green(pixel):

pixel[0] = 100 + pixel[0]

pixel[1] = 100 - pixel[1]

pixel[2] = 100 - pixel[2]

return pixel

def user_blue(pixel):

pixel[0] = 100 + pixel[0]

pixel[1] = 100 - pixel[1]

pixel[2] = 100 - pixel[2]

return pixel

def custom_filter(image, user_color):

for x in range(image.get_width()):

for y in range(image.get_height()):

pixel = image.get_pixel(x,y)

new_colors = invert_pixel(pixel)

image.set_red(x, y, new_colors[0])

image.set_green(x, y, new_colors[1])

image.set_blue(x, y, new_colors[2])

return image

def change_image():

global image

image = custom_filter(image, user_color)

timer.set_timeout(change_image, IMAGE_LOAD_TIME)

def shared_motif(dna_list):
This function takes in a list of DNA strings and returns the longest common substring. A substring is a contiguous sequence of characters within a string. A common substring is a substring of every element in the given list of DNA strings. Note that the number of DNA strings in the input list is not always the same! There may be multiple solutions, but you only need to return the first one.
Example:
Sample input DNA list:
("GATTACA", "TAGACCA", "ATACA"]
The returned longest common substring:
"TA"

Answers

Answer:

Explanation:

The following code is written in Python, the function creates various nested loops to loop through each individual string comparing letter by letter in order to find the longest common substring. Finally, returning the substring itself.

def shared_motif(dna_list):

   substr = ''

   if len(dna_list) > 1 and len(dna_list[0]) > 0:

       for x in range(len(dna_list[0])):

           for i in range(len(dna_list[0]) - x + 1):

               if i > len(substr) and all(dna_list[0][x:x + i] in y for y in dna_list):

                   substr = dna_list[0][x:x + i]

   return substr

arr = ["GATTACA", "TAGACCA", "ATACA"]

stems = shared_motif(arr)

print(stems)

What is the main fuction of command interpreter​

Answers

The command interpreter or the command-line interface is one of the ways a user can interface with the operating system. The command interpreter's main task is to understands and executes commands which it turns into system calls. The kernel is the central module of an OS.

_________________

Brainliest would be greatly appreciated!

I found this!

_________________

#SpreadTheLove

#SaveTheTrees

- Mitsu JK

When dragging a sheet tab to move it, the location of the _______ determines where the sheet tab will be moved.

square
line
arrow
last tab

Answers

the location of the arrow determines it

what is the best plugin for subscription sites?

Answers

Answer:

Explanation:

MemberPress. MemberPress is a popular & well-supported membership plugin. ...

Restrict Content Pro. ...

Paid Memberships Pro. ...

Paid Member Subscriptions. ...

MemberMouse. ...

iThemes Exchange Membership Add-on. ...

Magic Members. ...

s2Member.

A train protection system automatically applies the brakes of a train if the speed limit for a segment of track is exceeded, or if the train enters a track segment that is currently signaled with a red light (i.e., the segment should not be entered). There are two critical-safety requirements for this train protection system:
The train shall not enter a segment of track that is signaled with a red light.
The train shall not exceed the specified speed limit for a section of track.
Assuming that the signal status and the speed limit for the track segment are transmitted to on-board software on the train before it enters the track segment, propose five possible functional system requirements for the onboard software that may be generated from the system safety requirements.

Answers

Explanation:

Five possible functional system requirements for the onboard software that may be generated from the system safety requirements:

software should enable the brakes to be applied instantly when the red light is signaled.speed of the train should be monitored when it's running on a segment so that it does not exceed the maximum speed limit.important for the system to examine the color displayed before a train enters a segment of the track.constant checking of the speed limit and color of the light so as to determine when the brakes should be applied. when there is a red light the system should notify/prevent the train from entering the segment.

Write a C program that right shifts an integer variable 4 bits. The program should print the integer in bits before and after the shift operation. Does your system place 0s or 1s in the vacated bits?

Answers

Solution :

#include<[tex]$\text{stdio.h}$[/tex]>

#include<conio.h>

void dec_bin(int number) {

[tex]$\text{int x, y}$[/tex];

x = y = 0;

for(y = 15; y >= 0; y--) {

x = number / (1 << y);

number = number - x * (1 << y);

printf("%d", x);

}

printf("\n");

}

int main()

{

int k;

printf("Enter No u wanted to right shift by 4 : ");

scanf("%d",&k);

dec_bin(k);

k = k>>4; // right shift here.

dec_bin(k);

getch();

return 0;

}

Code.org lesson 8 level 5

Answers

Answer:

and?

Explanation:

an image can have only one background layer true or false​

Answers

Answer:

True

Explanation:

The background will always just be the background. You cannot blend two images together to make two background because it would be considered one background nonetheless.

Crop-Harvesting robots manage harvest automation, seeding, and weeding.
True
False

Answers

Answer: False

Explanation: I think there are specific robots for seeding, weeding and harvest automation. Unless its a multi purposed crop-harvesting robot I would assume it would only be related to harvesting tasks. (picking)

More info here: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7273211/

Create a PetStore class, a Dog class, and Cat class. Once instantiated, a PetStore should be able to take in and give out pets. The store's method for receiving pets should be called receive. This method should take a single pet object (either a Dog or Cat instance) and should add it to the store's inventory of pets. The store's method for giving out a pet should be called sell and can take no arguments. The method returns a pet when called.

Answers

Answer:

thanks to the great place

Explanation:

hottest year in hindi history and happiness and the world is not a big deal to me because I think it's a good thing for a woman who has been a good friend of yours and happiness and be happy with examples

what are the difference between bit address 7ch and byte address 7ch

Answers

so a byte address can only send  a get bytes (8 bits)

when a bit address can be more detailed as it can send a get not only bytes but bits also

-scav

HOW TO DOWNLOAD BEAMNG DRIVE

Answers

Explanation:

Answer:

Explanation:

on what device

answer any one: write a computer program:​

Answers

Answer:

hope this helps you look it once.

∉∉∉⊆αβ∞∞the life of me

Answers

Answer:

?

Explanation:

I honestly agree to this statement
So poetic

Fill in the blanks using A to J below.

1. ----- = command driven

2. ----- = general purpose

3. ----- = custom written

4. ----- = icon

5. ----- = menu driven

6. ----- = integrated software

7. ----- = desktop

8. ----- = system software

9. ----- = Window

10. ----- = software house

A. Software written to meet the specific needs of a company.

B. Related specialized programs combined in a unified package.

C. This software can be adapted for specific needs but is not written for any specific business purpose.

D. This interface requires the user to type in codes or words.

E. A pictorial representation of a file, folder, program, task or procedure.

F. This interface allows you to move a mouse or cursor to make a selection.

G. A rectangle that displays information on the screen.

H. A visual background over which all your work is done.

I. This software notifies the computer to begin sending data to the appropriate program to get a document printed.

J. A company that specializes in writing software.

Answers

Answer:

A.software written to meet specific needs of company

B.Related specialized programs combined in a unified package

Other Questions
A firm has the following account balances for this year. Sales for the year are $500,000. Projected sales for next year are $545,000. The percentage of sales approach is used for pro forma purposes. All balance sheet accounts, except long-term debt and common stock, change according to that approach. The firm plans to decrease the long-term debt balance by $5,000 next year. Retained earnings is expected to increase by $3,500 next year. What is the projected external financing need?a) $10,520b) $14,720c) $18,520d) $20,720e) $25,620 What are Canadas four original colonies? Write an equation that represents the following word problem. Jackie has four more apples than Mark and together they have twelve apples. How many apples do each Jackie and Mark have?A. a + (a - 4) = 12B. a + (a + 4) = 12C. both of these would workD. neither of these would work under what conditions can carrying capacity for a population reach equilibrium John often sees squiggly lines when he looks at a bright sky or white paper. His doctor says that they are called eye floaters, which are small bits of protein in the fluid that fills the eyeball.In what part of the eye are eye floaters found?a) corneab) vitreous humorc) retinad) convex lens Need help Will give brainliest Just need to match the word to the right one nutrient deficiency symptoms of plans What is on the HANNA ORLEANS ALGEBRA 1 (7th for 8th) PLACEMENT TEST GUIDE? Assignment for Blood vesselsDisorders(Atherosclorosis and varicos veins) ADD NOTEQUESTION GUIDEEXIT TESTWhich of these is an important legacy of colonial powers in Africa?The movement of the national capital from Lagos to Abuja Cultural conflict within country bordersState legal systems based on Islamic law G Ellos ________ la excursin . 3.COMPARE AND CONTRAST: Harriet Tubman: Conductor on the Underground Rallroad and "The People Could Fly" are about similar topics but indifferent genres. The first is a historical account of slavery in American history. The second is a fictional portrayal of the same topic or theme.How did Virginia Hamilton use historical facts in "The People Could Fly"? What changes does she make and what are the effects? Remember tosupport your analysis with evidence from the texts. Placid Lake Corporation acquired 90 percent of the outstanding voting stock of Scenic, Inc., on January 1, 2020, when Scenic had a net book value of $640,000. Any excess fair value was assigned to intangible assets and amortized at a rate of $7,000 per year. Placid Lake's 2021 net income before consideration of its relationship with Scenic (and before adjustments for intra-entity sales) was $540,000. Scenic reported net income of $350,000. Placid Lake declared $170,000 in dividends during this period; Scenic paid $64,000. At the end of 2021, selected figures from the two companies' balance sheets were as follows: Placid Lake Corporation Scenic, Inc. Inventory $350,000 $111,000 Land 810,000 410,000 Equipment (net) 610,000 510,000During 2019, intra-entity sales of $180,000 (original cost of $84,000) were made. Only 30 percent of this inventory was still held within the consolidated entity at the end of 2019. In 2020, $300,000 in intra-entity sales were made with an original cost of $80,000. Of this merchandise, 40 percent had not been resold to outside parties by the end of the year.Required:a. What is consolidated net income for Placid Lake and its subsidiary?b. If the intra-entity sales were upstream, how would consolidated net income be allocated to the controlling and noncontrolling interest?c. If the intra-entity sales were downstream, how would consolidated net income be allocated to the controlling and noncontrolling interest?d. What is the consolidated balance in the ending Inventory account? Three Methods for Choosing JudgesAt the federal level, judges are nominated by the President and then those nominees have to be approved by the Senate. The U.S. Constitution does not specify how states can choose their judges so different states use different methods. The three most common methods used by states are listed below:Method 1: Direct elections - Candidates raise money and campaign to be a judge. The voters then elect one of the candidates.Method 2: Appointment - In this method, state judges are appointed by the Governor. There is often no legislative approval required. A couple of states have the state legislature appoint judges, but usually it is the Governor.Method 3: The Missouri Plan - This is a compromise between methods 1 and 2. In the Missouri Plan, the governor appoints judges, but the governor must make each appointment from a list of three candidates recommended by a judicial nominating commission. The commission is made up of a sitting judge, several legal experts, and some private citizens. Each judge named by the governor serves until the next election. The judge's name then appears on the ballot without opposition. The voters decide, in a yes-no vote, whether or not that judge should be kept in office. Should the voters reject a sitting judge, the process begins again.Read the information above about the three methods most commonly used to select judges at the state level. Pick the method that you believe is the best. Write a paragraph persuading your fellow Ohioans that Ohio should start using this method. If you agree with how Ohio already chooses its judges, then persuade a different state to use our current method. Your essay needs to provide three (3) arguments supporting your method of choice, and you need to back these arguments up with supporting details. For example, you could use constitutional principles to back up your arguments.plz help can someone solve this please Please Help and fast!! I Will give Brainliest (but will also report) It is for French 2 Explain to someone how to do something using the technology vocabulary you have learned. For example, you could tell them how to download and save a file, how to get to a certain website, how to get their internetworking, etc. Make simple instructions and use at least 2 new vocabulary words. Could someone do this for me since I have a lot of work for other classes please help so i can go hi help pls its 15 pts:(( Here are four fractions. Write them small to large2/33/55/87/11