how to create use an array of Course objects instead of individual objects like course 1, course 2, etc

Answers

Answer 1

Answer:

To save the course object instances in an array, use;

Course[] courses = new Course[7];

courses[0] = new Course("IT 145");

courses[1] = new Course("IT 200");

courses[2] = new Course("IT 201");

courses[3] = new Course("IT 270");

courses[4] = new Course("IT 315");

courses[5] = new Course("IT 328");

courses[6] = new Course("IT 330");

Explanation:

The java statement above assigns an array of size 7 with the course class constructor, then order courses are assigned to the respective indexes of the new array.


Related Questions

1) Write a statement that defines an array of four integers named miles. The array should be initialized with the values 1, 5, 9, and 22.
2) Write a statement that defines an array of string objects nameddirections. The array should be implicitly sized, with an initialization list containing the values "Up", "Down", "Left", and "Right.

Answers

Answer:

Explanation:

The following code statements are written in Java and are simple one line statements that can be into any Java code or function. The first code statement creates a simple integer array with 4 predefined values initialized.

1) int[] miles = {1,5,9,22};

The second code statement creates a simple String array with four-string objects in it.

2) String[] nameddirections = {"Up", "Down", "Left","Right"};

If a function is called more than once in a program, the values stored in the function's local variables do not _________ between function calls. g

Answers

Answer:

persist

Explanation:

Calling a function Within a program, can be regarded to as specifying of the name of the function when it is within a statement or it could be by the function itself, it possible for a particular function to call another function, in a case wherby a function returns a value, assignment or using the value to variable is not necessary. It should be noted that If a function is called more than once in a program, the values stored in the function's local variables do not persist between function calls

high level languages are closer to machine language than humans yes or no​

Answers

they are closer to human languages and further from machine so, no.

Answer:

yes

Explanation:

because they were built from humans

Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended SQL input that can be passed to a database?

Answers

Answer:

SQL injection

Explanation:

SQL injection is a vulnerability in databases that occurs when user input is not properly validated. Hackers are able to input SQL query statements to bypass the use of the actual user name and password to gain access to the account.

Using placeholders in programmed SQL statements mitigates the effects of SQL injection.

write the code that writes access granted if the correct password, swordfish is entered and access denied! otherwise

Answers

In python 3.8:

if input("Enter password: ") == "swordfish":

   print("access granted")

else:

   print("access denied!")

When multiple architects work on a construction plan, which section of a construction plan will help them keep track of when the changes are made and by whom?
A.
framing plan
B.
schedule
C.
title block
D.
bill of materials

Answers

Answer:

I believe that it is . A. framing plan

Explanation:

But I am not certain But I do know that it IS NOT B..

Answer:

the answer is schedule!!!

Explanation:

Write an if statement assigns 20 to the variable y, and assigns 40 to the variable z if the statemnet x is greater than 100​

Answers

Answer:

y=20 z=40 x>100

Explanation:

not sure if this is correct but yes

A SQL data source is a control that can be used to get data from a SQL ________________ file such as a Microsoft SQL Server file. g

Answers

Answer:

The answer is "Data"

Explanation:

A Data source is essentially the wellspring of the Data. It tends to be a document, a specific Database on a DBMS, or even a live Data feed. The Data may be situated on a similar PC as the program, or on another PC some place on an organization

At least, every SQL server database has two working operating system records: a Data filet and a log Data. Data files contain Data and items, for example, tables, files, put away methodology, and perspectives. Log records contain the data that is needed to recuperate all exchanges in the Database. Data files can be assembled in file groups for portion and organization purposes.

A part-time job performed while in high school must have the approval of your school counselor.
False
True

Answers

Answer:

False, it only needs approval of your parents/guardian

May I have brainliest please? :)

Answer:

False

Explanation:

Write a class that specify the characteristics of a car, like type (sedan, jeep, mini, SUV, etc), gear (auto, manual), maximum speed (mph), average fuel consumption (mpg), etc. Create few objects to illustrate your desired cars.

Answers

Answer:

Answered below

Explanation:

This is written in Kotlin programming language.

//Creating the class Car. The primary //constructor declares car's properties which //are initialized when it's objects are created.

class Car(

val type: String,

val gear: String,

val maxSpeed: Double,

val avgFuelConsumption: Double)

//Creating several objects of car.

val sedan: Car = Car("sedan", "auto", 23.4, 500)

val jeep: Car = Car("jeep", "manual", 40, 350)

val mini: Car = Car("mini", auto, 26.7, 86, 234)

The inFS.open(str) function has a string parameter str that specifies the _____ of the file to open.

Answers

Answer:

str represents the name of the file to open

Explanation:

Required:

What does str represents in the above syntax

Before the inFS function can be used to access or read or write into a file, the file name has to be specified.

This could be done in any of the following ways:

1. inFS.open("abc.txt")

2. str = "abc.txt"; inFS.open(str);

In (1), the file name is specified directly into the function

While in (2), the filename is passed into a string variable which is then further passed to the inFS function.

In the case of this question, method 2 is used and the str represents the name of the file

How is fraudulent email spread that makes it so difficult to track?

Answers

The owner of the email could be using a VPN.

In order to be an effective employee who knows recent information on loans and laws, in what topic should your information be current?

regional trends

industry politics

regional politics

industry trends

Answers

Answer:

industry politics

Explanation:

In order to be an effective employee who knows recent information on loans and laws, your information should be current in industry politics.

This ultimately implies that, an employee who wants to be well-informed and knowledgeable on recent informations on loans and laws, is saddled with the responsibility of gathering and sourcing for informations through industry politics. Thus, the employee must have been involved in working with various industry leaders and most likely to have interacted with various employees working there.

Industry politics can be defined as a group of policies, standards and regulations set by the government to promote and facilitate competitiveness among the private and publicly owned industries.

Answer:

industry politics

Explanation:

the other person is first and correct mark him brainliest!

Suppose that the LC-3 instruction LD R1, DATA is located at x3100 in memory and the label DATA is located at x 310F. The machine code (in hex) for the above instruction is

Answers

Answer:

The machine code is located at x210F.

Explanation:

The DATA is located at x3100 while the DATA label is located at the x310F (in hex) in the memory which is F address away (8 bits) from the DATA itself. The machine code location is relative to the address of the DATA label.

Dictionaries You are given a dictionary consisting of word pairs. Every word is a synonym the other word in its pair. all the words in the dictionary are different. after the dictionary there's one more word given . Find a synonym for him. Given a list of countries and cities of each country. then given the names of the cities. for each city specify thr country in which it is located.... python

Answers

Answer:

To add values to a dictionary, specify the dictionary name with the key name in quotes inside a square bracket and assign a value to it.

 dictionary_name["key_name"] = value

Explanation:

A python dictionary is an unindexed and unordered data structure. It's items a key-value pair separated by a colon and the entire dictionary items are enclosed in curly braces. Unlike a list, the dictionary does not use an index but uses the key to get or add a value to the dictionary.

Answer:

Python answer:

dict = {}

times = int(input())

for _ in range(times):

   a = input()

   w1, w2 = a.split()

   dict[w1] = w2

   dict[w2] = w1

print(dict[input()])

Explanation:

Intialize your dictionary.

Ask for how many keys you will be adding to the dictionary.

Over a for loop, take an input of keys and values and split them and add them to the dictionary.

I set the key as a value and a variable due to the fact that we are working with synonyms and if the user inputs a synonym that is only the value, we can't get another synonym out. Therefore it is better if we make each word a key and a value.

Then print a synonym of whatever the user inputs.

A job placement agency helps match job seekers with potential employers. The agency would like to design a simulation in order to help predict the likely job placement outcomes for job seekers based on historical trends and patterns. Which of the following is most likely to be a benefit of the simulation?

A. The computer simulation will be able to include more details and complexity than the real-world job placement process.
B. The computer simulation could be used to test hypotheses about patterns in the job placement process that are costly or time consuming to observe in reality.
C. The computer simulation will be able to precisely predict the real-world outcomes for each job seeker.
D. The computer simulation will remove the bias that may arise in the real-world job placement process.

Answers

Answer:

B

Explanation:

The point of simulating would be to eliminate the part of having to go through un patential applications and save time.

The option that is most likely to be a benefit of the simulation is B. The computer simulation could be used to test hypotheses about patterns in the job placement process that are costly or time-consuming to observe in reality.

Computer simulation simply refers to the process through which the behavior or outcome of a physical system can be predicted through modeling.

Since the agency would like to design a simulation so that it can forecast the likely job placement outcomes, then it should be noted that computer simulation could be used to test hypotheses about patterns in the job placement process that are costly or time-consuming to observe in reality.

In conclusion, the correct option is B.

Read related link on:

https://brainly.com/question/19703126

Define a toString prototype method that returns the cat's name, gender, and age separated by semicolons.

Answers

Answer:

Following are the program to this question:

import java.util.*;//import package for user input

public class Main//defining main class

{

public static String Cat (String name, String gender, int age)//defining string method Cat that accept parameter value

{

return name + ';' + gender + ';' + age;//return parameter value

}

public static void main(String[] args) //defining main method

{

   String name,gender;//defining String variable

   int age;//defining integer variable

   System.out.println("Enter name, gender and age: ");//print message

   Scanner obx=new Scanner(System.in);//creating Scanner class object for user input

   name=obx.next();//input name value

   gender=obx.next();//input gender value

   age=obx.nextInt();// input age value

   System.out.println(Cat(name,gender,age));//print return method value

}

}

Output:

Enter name, gender and age:  

dani

Female

12

dani;Female;12

Explanation:

In the above-given code, a string method Cat is declared, that accepts three variable "name, gender, and age", inside the method return keyword is used that returns the parameter values.

In the main method, the above parameter variable is declared, which is used to input value from the user-end, and used the print method to print its return value.

What does using nesting in HTML allow you to do?
Style the HTML automatically
Automatically add missing opening or closing tags to the HTML
Prevent any misspelled tag keywords from appearing in the HTML
Improve readability and find and fix problems more easily

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The given options to this question are:

Style the HTML automatically Automatically add missing opening or closing tags to the HTML Prevent any misspelled tag keywords from appearing in the HTML Improve readability and find and fix problems more easily

The correct option to question is Option 1. i.e.

Style the HTML automatically.

Nesting HTML refers to enlist the HTML tage within HTML tag.

For example, the <p> tag is used to insert paragraph text. You can insert nesting HTML tags within the paragraph tag to style the pragraph.

such as:

<p>

<b>

This is a paragraph

</b>

</p>

The above HTML code bold the paragraph.

While the options are not correct because:

Nesting HTML does not allow to insert missing opening or closing tags to the HTML and also does not prevent appearing the misspelled tag keyword. Nesting HTML does not improve readability and find and fix the problem easily because nesting HTML mostly made the HTML more complex in terms of readability.  

PLS I WILL GIVE BRAINLIEST IF CORRECT

Select the correct answer.

Stacy is in the process of creating a storyboard for her personal website, but she is unable to decide which storyboarding technique to use. Which technique would work best for her?


A. hierarchical
B. linear
C. webbed
D. wheel

Answers

Answer:webbed

Explanation:

k

Answer:

Webbed

Explanation:

Match the following internet related terms to their definition

Answers

Answer:

1st buble goes to web address 2nd goes to browser 3rd goes to chat 4th goes to email

Explanation:

Which item is essential to know before sketching a navigation menu flowchart?
template specifics, such as horizontal or vertical menu layout
whether or not the site will implement a search feature
all of the pages in the site and the content each page will contain
who will be using the site and the design theme selected for them

Answers

Answer:

A, template specifics, such as horizontal or vertical menu layout

Explanation:

Answer:

D. who will be using the site and the design theme selected for them

Explanation:

I am doing the exam right now.

write c++ program from 1to 100 to find prime numbers using statement.​​

Answers

#include <iostream> using namespace std; int isPrimeNumber(int); int main() { bool isPrime; for(int n = 2; n < 100; n++) { // isPrime will be true for prime numbers isPrime = isPrimeNumber(n); if(isPrime == true) cout<<n<<" "; } return 0; } // Function that checks whether n is prime or not int isPrimeNumber(int n) { bool isPrime = true; for(int i = 2; i <= n/2; i++) { if (n%i == 0) { isPrime = false; break; } } return isPrime; }

Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3, D with frequency 2, and E with frequency 8. Professor Byte suggests using the variable length codes:
Character Code
A 1
B 00
C 01
D 10
E 0
The professor argues that these codes store the text in less space than that used by an optimal Huffman code. Is the professor correct?

Answers

Answer:

This is not true

Explanation:

The optimal Huffman code is used to encrypt and compress text files. It uses fixed-length code or variable-length code for encryption and compression of data.

The professor's character code is similar to Huffman's variable-length coding which uses variable length od binary digits to represent the word strings. The file size of the text file above is;

= 6 x 1 + 2 x 2 + 3 x 2 + 2 x 2 + 8 x 1 = 28 bits

This would be the same for both cases.

The encrypt would be the problem as the encoded and decoding of the characters B and E may cause an error.

hello hello . please help me​

Answers

Answer:

#include <iostream>  

using namespace std;  

int main()  {  

 int num, check=0;  

 for(int num = 1; num<=100;num++){

for(int i = 2; i <= num/2; i++)  {

     if(num % i == 0)   {  

         check=1;  

         break;         }     }  

 if (check==0)  {       cout <<num<<" ";     }

 check = 0;

 }

 return 0;  

}

Explanation:

This line declares num as integer which represents digits 1 to 100.

A check variable is declared as integer and initialized to 0

 int num, m=0, check=0;  

This for loop iterates from 1 to 100

 for(int num = 1; num<=100;num++){

This iterates from 2 to half of current digit

for(int i = 2; i <= num/2; i++)  {

This checks for possible divisors

     if(num % i == 0)   {  

If found, the check variable is updated to 1

         check=1;  

And the loop is terminated

         break;         }     }  

The following if statement prints the prime numbers

 if (check==0)  {       cout <<num<<" ";     }

 check = 0;

 }

Which will you see on the next line 9, 2, 3.5, 7]

Answers

Answer:

plenipotentiaries. It was by far the most splendid and

important assembly ever convoked to discuss and

determine the affairs of Europe. The Emperor of

Russia, the King of Prussia, the Kings of Bavaria,

Denmark, and Wurttemberg, all were present in

person at the court of the Emperor Francis I in the

Austrian capital. When Lymie put down his fork and

began to count them off, one by one, on the fingers

of his left hand, the waitress, whose name was Irma,

thought he was through eating and tried to take his

plate away. He stopped her. Prince Metternich (his

right thumb) presided over the Congress, and

Prince Talleyrand (the index finger) represented

France? please let me know if this is the answer you were looking for!!

Answer:

I guess 6.......maybe or 1 kinda.....

I am dumb for this question

WILL MARK BRAINILY!!

Muriel's program is supposed to show flashing lights to test the user's vision, but the lights don't flash for the right
amount of time. What should Muriel do?
O assess the program
O edit the program
O debug the program
O renew the program

Answers

Answer: He/she should debug the program

Explanation: If it's not right, it's edit or renew the program.

Answer:

he should edit the program

What is the information that oranges contain vitamin C considered?

Answers

Answer:

Nutritional Information or Nutritional facts.

Explanation:

They are on most foods, on medicines it's called Drug Facts, and on vitamins it's called Supplementary facts!

write passage on computer virus​

Answers

In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code.

Answer:

A computer virus is a relatively small program that attaches itself to data and program files before it delivers its malicious act. There are many distinct types of viruses and each one has a unique characteristic. Viruses are broken up into to main classes, file infectors and system or boot-record infectors.

hope it helps

From a neural network with 11 input variables, one hidden layer with three hidden units, and one output variable, how many parameters (weights and biases) needs to be estimated by this model?

Answers

Answer:

40

Explanation:

Given that:

A neural network with 11 input variables possess;

one hidden layer with three hidden units; &

one output variable

For every input, a variable must go to every node.

Thus, we can calculate the weights of weight with respect to connections to input and hidden layer by using the formula:

= ( inputs + bias) × numbers of nodes

= (11 + 1 ) × 3

= 12 × 3

= 36 weights

Also, For one hidden layer (with 3 nodes) and one output

The entry result for every hidden node will go directly to the output

These results will have weights associated with them before computed in the output node.

Thus; using the formula

= (numbers of nodes + bais) output, we get;

= ( 3+ 1 ) × 1

= 4 weights

weights with respect to input and hidden layer total = 36

weights with respect to hidden and output layer total = 4

Finally, the sum of both weights is = 36 + 4

= 40

Choose the correct term to complete the sentence

The ____ function removes the element with an index of zero.

1)popleft
2)leftremove
3)leftpop

Answers

Answer:

popleft

Explanation:

Answer: pop left

Explanation: got it right on edgen

Other Questions
The Battle of Antietam was significant because itwas theA) turning point of the war.B) bloodiest single day of the war.C) bloodiest battle of the war.D) first battle to use the Gatlin gun. Bob bought school supplies for school. A mechanical pencil for $2.53, a 5 subject notebook for $6.10, glue for $.50 and a pencil sharpener for $1.45. How much did get in change if he paid with a $20? * 20 points Which of the following would be an argument made against abolitionist claims?Slaves could choose their jobs on a plantation.Slaves were able to travel freely.Slaves could marry and enter into legal contracts.O Slaves were cared for their entire lives. The dangerous game who or what is general zaroffs new quarry Most recent fossils are found in which layer of rock? Which sentence depicts that alternate sales channels are cost effective for small businesses?Alternative sales channels could work well for you if your product and target customer base profiles support them. These alternative channels can offer you a less competitive route to increased sales. Telemarketing is an example of one such alternative channel. It is the next most interactive medium after direct (face-to-face) sales. What is Vietnam like under French rule? 15. What is the most important social unit in Saudi society?O the villageO the nationO the familyO the workersPlease help me out guys What is the equation of the line that passes through the point (-5, 7) and has a slope of -2/5? Brandon and his son went fishing. Brandon caught 3 3/4 kg of fish while his son caught 2 1/5 kg of fish. What is the total weight of the fishes that they caught? Which of the following is related to a persons self-concept?A) what neighborhood he or she lives inB) his or her sense of self-worth C) how good an athlete he or she isD) how attractive he or she is A monatomic ideal gas with an initial pressure of 500 kPa and an initial volume of 1.80 L expands isothermally to a final volume of 5.20 L. How much work is done on the gas in this process?A) 1700J B) 875J C) 1570J D) 900J E) 955J What are your thoughts about the corona vaccines? Select the correct answer.Which is true of making multiple arguments about the same plece of literature?A.It is possible because a plece of literature can have more than one meaning.It is possible because arguments can be structured in many different ways.B.Multiple arguments cannot be made about the same plece of literature.D.none of the aboveResetNext Why has Abe Lincoln never been completely understood? Also if you have the answers to the reading counts quiz for the book 'Lincoln: A photobiography' that would be amazing. Please Hurry. I will give brainliest to the first person with a good answer. The edge of a flying disc with a radius of 0.13 m spins with a tangential speed of 3.3 m/s. The centripetal acceleration of the edge of the disc is ?m/s2. Nation-states are difficult to create because When Romeo declares his love for Juliet in the balcony scene, who hears it? The temperature fell from 0 Degrees Fahrenheit to 15 and one-half Degrees Fahrenheit below 0 in 5 and three-fourths hours. Wen tried to find the change in temperature per hour. Her work is shown below. Negative 15 and one-half divided by 5 and three-fourths = negative StartFraction 31 over 2 EndFraction divided by StartFraction 23 over 4 EndFraction = negative StartFraction 31 over 2 EndFraction times StartFraction 23 over 4 EndFraction = Negative StartFraction 713 over 8 EndFraction When she checked the answer by estimating, it did not make sense. What error did Wen make? Wen incorrectly converted a mixed number to an improper fraction. Wen added the numerators and denominators instead of multiplying. Wen did not take the reciprocal of the divisor. Wen did not change the division problem to multiplication. A local little league has a total of 65 players, of whom 20% are right-handed. How manyright-handed players are there?