Assume the existence of a Window class with a method getClientAreaHeight that returns an integer representing the height of the portion of the window that an application program can use for its display. Assume also, a subclass BorderedWindow with an integer instance variable borderSize, that represents the size of the border around the window.

Required:
Override the getClientAreaHeight in BorderWindowto return the client area height as returned by the superclass minus the border size (taking into account top and bottom borders).

Answers

Answer 1

Answer:

Following are the code to this question:

public int getClientAreaHeight() //defining a method getClientAreaHeight

{

return super.getClientAreaHeight() - 2 * borderSize;//using the return keyword with the superkey return value

}

Explanation:

In the above-given java program code, an integer method "getClientAreaHeight" is defined that returns only the integer value.

Inside the method, the return keyword is used with the super key, which calls the "getClientAreaHeight" method, that subtracts with the 2 times of the "borderSize" variable value.


Related Questions

Which of the following statements is true?
1. Computers have only been around since the 1940's
II. One reason computers were first developed was to do mathematical computations faster
III. Some modern computers include laptops, cell phones, and tablets
IV. Computers are able to perform tasks by using logic

Answers

Answer: The correct answer is II, III, and IV.

Explanation: The correct answer is 2,3,4. Number 1 is wrong because computers were made in 4000BC. II is right because since the beginning of time. Hand made computers were used more as of caculators. III is right because laptops, cell phones, tablets and even toys all have digital coding that originated since 1940 when the first digital computer was made. IV is right partially. Computers do certain tasks set by humans and use's logic to complete them. (Depends). II, III, IV, are the correct answers

You can expect to see ________.
A. STOP signs or traffic lights on limited access highways
B. only traffic lights on limited access highways
C. only STOP signs on limited access highways
D. no STOP signs or traffic lights on limited access highways

Answers

Answer:

You can expect to see no stop signs or traffic lights on limited access high way.

Define what is a PC?

Answers

PC stands for Personal Computer (generic term) This definition appears very frequently and is found in the following Acronym Finder categories: Information technology (IT) and computers.

PC stands for personal computer and can be used for anything from desktops to laptops

With _____, human thinking and problem-solving is performed by a machine, including learning, reasoning, and self-correction. wearable technologies quantum computers artificial intelligence Moore's Law

Answers

Answer:

THE ANSWER IS B

Explanation:

Which definition of AI do you like best? How would you define AI? Let's first scrutinize the following definitions that have been proposed earlier: "cool things that computers can't do" machines imitating intelligent human behavior autonomous and adaptive systems Your task: Do you think these are good definitions? Consider each of them in turn and try to come up with things that they get wrong - either things that you think should be counted as AI but aren't according to the definition, or vice versa. Explain your answers by a few sentences per item (so just saying that all the definitions look good or bad isn't enough). Also come up with your own, improved definition that solves some of the problems that you have identified with the above candidates.

Explain with a few sentences how your definition may be better than the above ones?

Answers

Answer:

1. "Cool things that computers can't do"

AI is Artificial Intelligence, which can involve anything from robots to programs on computers/websites. Sure, AI can learn things and adapt in ways unlike computers, but they are still quite similar in the fact that they both are technology.

2. "Machines imitating intelligent human behavior"

This is a bit closer to the definition of AI. However, AI does not necessarily have to imitate humans - rather, it's most known for being able to adapt and learn (which is the part where this definition is correct). Also, our current AI is nowhere near the level of mimicking intelligent human behavior enough to fool us.

3. "Autonomous and adaptive systems"

This is, by far, the best definition given here yet. Most AI are autonomous and/or adaptive systems, used to automate tasks which would take time for us humans. I suppose one thing that could be wrong with it is that not all AI are made to be autonomous systems.

A high school in a low-income area offers special programs to help students acquire the technical skills needed to find jobs as computer technicians. This program is most strongly related to which aspect of life? culture ethics society economy

Answers

Answer:

economy.

Explanation:

As per the question, technical skills and training help low-income group members to easily find jobs and thus become self-independence. it not only fosters there basic necessities but also gave them the confidence to earn respect in society and lead a life of dignity. Special programs like these help more people to integrate into society and leave less space to take up anti-social steps like criminal activities. it improves their economic as well as social life.

Answer:

economy is the answer

The ________ is responsible for the Internet's domain name system and the allocation of IP addresses. ICANN W3C ISOC IAB

Answers

Answer:

ICANN

Explanation:

It handles the installation and processing of various databases related to network domains and provides a consistent and secure networking service and there are incorrect options are described as follows:

IAB, which provides a protocol for managing IETF, is therefore incorrect. W3C is used in web development. ISOC is used to provide Internet access.

Which type of design is used when a web site is correctly and effectively displayed on small, mobile devices (as well as desktop devices)

Answers

Answer:

system analysis and design

Explanation:

a broad term for describing methodologies for developing high quality information Sytem which combines Information Technology, people and Data to support business requirement...A methodology is essentially a procedure to get something done.

Mention any three features of an antivirus software? ​

Answers

Answer:

Real-time Scanning

Automatic Updates

Protection for Multiple Apps

Auto-Clean

Fights Against All Types of Malware

HOPE I HELPED

PLS MARK BRAINLIEST  

DESPERATELY TRYING TO LEVEL UP

✌ -ZYLYNN JADE ARDENNE

JUST A RANDOM GIRL WANTING TO HELP PEOPLE!

                     PEACE!

The three attributes of antivirus software include auto-cleaning, automatic updates, and real-time scanning.

The information regarding the three attributes of antivirus software is as follows:

The work of the antivirus software discovered malicious software. In the auto-cleaning, it rid of the viruses that could come in the laptops.In real-time scanning, it regularly checks whether there is any malicious software or not due to this the laptop does not damage.The antivirus software required regular updates so that they could track the new threats if any also at the same time it protects your laptops.

Therefore we can conclude that the three attributes of antivirus software include auto-cleaning, automatic updates, and real-time scanning.

Learn more about the software here: brainly.com/question/15937118

Disk ___________________ helps improve the speed and efficiency of a hard disk.

Answers

Disks “Response Time” and “Disks Throughput” have great impact on speed and efficiency of a hard disk.

Answer:

Defragmentation

Explanation:

PLATO - correct answer

An error condition consisting of an error in the passing of parameters -- a method passes or returns an unexpected value such as a negative price -- is usually found in what kind of testing?

a. Unit testing
b. Integration testing
c. System testing
d. Acceptance testing

Answers

Answer:

b. Integration testing.

Explanation:

An error condition consisting of an error in the passing of parameters; a method passes or returns an unexpected value such as a negative price, is usually found in Integration testing.

Integration testing can be defined as a phase in software applications testing, which typically involves the process of testing the interface between two software module combined as a group.

The main purpose of an integration testing is to determine the correctness of this interface and expose any fault existing between integrated modules.

"An internal system behind a firewall needs to be configured for remote access. How should Network Address Translation be configured?"

Answers

Answer:

The appropriate answer will be "Port forwarding ".

Explanation:

Port forwarding seems to be a network security strategy whereby a gateway or equivalent system communicates all intercepting communication/traffic from a specific address to some of the same port on just about any interior single node.This allows the connection of an entity in this context device that is connected to an inner reference node/port usually connecting to Internet infrastructure as well as an internal private local area network.

A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication. Group of answer choices

Answers

Answer:

Hi there. A tech savvy here, the answer to your question is certificate authority.

Cheers,

Heyy28

Which of the following is true about STEM education? STEM education is focused on understanding rather than applying scientific concepts. STEM students are told to focus on a subject area and work within a certain specific field. STEM students are encouraged to blend and expand their knowledge of all four subject areas. STEM education prepares students to work in science- and math-related jobs.

Answers

Answer:

C). STEM students are encouraged to blend and expand their knowledge of all four subject areas.

Explanation:

STEM education is characterized as a learning and development approach that focuses upon an amalgamation of four subject areas including science(S), technology(T), engineering(E), and Mathematics(M). Thus, each letter stands for a subject domain and this integration of four subjects primarily aims to 'blend and expand the knowledge of the students in these areas' integratively. It helps in developing and sustaining the interests of young learners through this integrated approach which also assists them with unique opportunities. Thus, option C is the correct answer.

The answer is:

D) STEM students are encouraged to blend and expand their knowledge of all four subject areas.

While the Tor network does provide a level of anonymity, the user never knows what other computers the request will go through; data sent and received can be captured by any of these computers.

a. True
b. False

Answers

Answer:

The answer is "Option a"

Explanation:

The Tor is the free web browser, that encrypts your request but it's also slow to allow you to access every site, and it can't be a cause of legal problems. It aims to cover up the identity, information, and internet activity via the secession of classification and routing from monitoring as well as traffic analysis, that's why it is known as the onion mapping execution.  

It encodes and rebounds communication systems by the supernatural power of a relay system controlled by volunteer staff worldwide.  These internet activities couldn't be traced back to you via the Tor Network. Its browser wasn’t fully safe, therefore. There are some faults in the system, that's why it can be captured by other systems.

Identify the CTSO that is most appropriate for each example. FEA or FCCLA

Fritz wants to prepare for a career as a High School Teacher

Mina wants to become an Elementary School Teacher

Rob wants to prepare to become a strong member of his family

Sara wants to become a leader in her community

Answers

Answer:

Fritz wants to prepare for a career as a High School Teacher :Fea

Mina wants to become an Elementary School Teacher  :FEA

Rob wants to prepare to become a strong member of his family :FCCLA

Sara wants to become a leader in her community :FCCLA

Explain:

Answer:

FEA

FEA

FCCLA

FCCLA

Explanation:

Just did on edge

Which of these causes the most collisions?
carrying alcohol on board a vessel
failing to keep a proper lookout
jumping the wake of other vessels
displaying navigation lights incorrectly

Answers

Answer:

The answer is "failing to keep a proper lookout".

Explanation:

The theory of collision, especially concerning gas were used to forecast the chemical reaction. It is based on the idea which atoms or molecules of interacting organisms should be mixed or collided. In this question the key cause of collision would be a proper viewpoint is not established, that's why other given choices were wrong.

The __________ process is designed to find and document vulnerabilities that may be present because there are misconfigured systems in use within the organization. a. ISP b. PSV c. SVP d. ASP

Answers

Answer:

Isp

Explanation:

An Internet service provider is an organisation that provides services for accessing,

using, or participating in the Internet. Internet service providers can be organised in

various forms

The platform security validation (PSV) procedure is made to identify and record vulnerabilities that can exist as a result of incorrectly configured systems being used by the company. Thus, option B is correct.

What PSV process is designed to find and document?

The preparedness and review domain's major objective is to maintain the information security program's intended functionality and ongoing improvement.

An organization that offers services for utilizing, accessing, or engaging on the Internet is known as an Internet service provider. There are several ways that internet service providers might be organized.

Therefore, The PSV process is designed to find and document vulnerabilities that may be present because there are misconfigured systems in use within the organization.

Learn more about PSV here:

https://brainly.com/question/22444527

#SPJ5

place the steps in order to keep a graphic from spilling over into the next page and to include the text it is assciated with.
highlight the text.
open the paragraph dialogue box,
select keep with text.
select the line and page break, click OK.

Answers

Answer:

1.highlight text and the graphic

2.open the paragraph dialog box

3.select the line and page breaks tab

4.select keep with text

5.click ok

Explanation:

Answer:

Highlight the text and the graphic

Open the paragraph dialogue box

Select the line and page breaks tab

Select keep with test

Click ok

Explanation:

Which of the following options allow you to access a computer remotely? Check all that apply.

Answers

What are the options?

Which of the following statements are true about the Internet?
1 - The Internet connects devices and networks all over the world
II - The Internet helps people collaborate to solve problems
III - The Internet helps people communicate
IV - There are no negative consequences of the Internet, it is purely positive

Answers

1, 2, and 3 are true

Use the drop-down menus to explain how Angelina
should complete this process.
What is her next step?
What should she do next?
What should she do last?

Answers

Answer: what is her next step: click page number

What should she do next: click current position

What should she do last: click plain number 1

Explanation:

Answer:

A, C, B

Explanation:

The rubric given to them by their teacher requires that
the lines be double spaced.
Arrange the steps below to outline what Maia needs to
do to accomplish this task.

Click the space required.

Click the Line and Paragraph Spacing option.

Navigate to the Paragraph command group.

Answers

Answer:

Click the space required.

✔ 3

Click the Line and Paragraph Spacing option.

✔ 2

Navigate to the Paragraph command group.

✔ 1

Explanation:

how does AI use data

Answers

Answer:

works by combining large amounts of data. interative process and intelligent algorithms.

Explanation:

what is the types of the structured programming

Answers

Answer:

I guess 1 3 4 options are true.....

I think 1,3,4 is true thank me tomorrow

A ________ uses multiple systems to attack one or more victim systems or websites with the intent of denying service to legitimate users wishing to log on or utilize the attacked server.

Answers

Answer: Botnet

Explanation:

Given an array, x of references to objects that implement the Comparable interface, two int variables k and j that contain valid indices to x, write some statements that exchange (or swap) the contents of the elements referenced by the integers.

Answers

Answer:

Following are the code to this question:

Comparable t; //defining interface variable t

t = x[k]; //use t variable that holds array value

x[k] = x[j]; //use array to store x[j] value

x[j] = t;//use x[j] to assign value in the t

Explanation:

In the given question it is already defined " x" is an array that is the reference object, that defines the Comparable interface "t", and in the next line, two integer variable "k and j"  is defined, that swap the values.  

In the above code, the Comparable interface "t" is defined, which uses the t variable to store array x[k] value, and x[k] stores the x[j] value, and x[j] stores t value, and perform the swapping.

What do we call the time it takes for all of the sub-pixels on the panel to go from pure black to pure white and black again

Answers

Answer:

response rate

Explanation:

The term being described in the question is known as the response rate. In other words, this is the amount of time it takes for your monitor to shift from one color to another. This is data tends to be measured in milliseconds with the average response times of typical LCD monitors being ten milliseconds (10ms) and the fastest response times of higher-end displays being as fast as one millisecond (1ms)

Define stubs for the functions get_user_num() and compute_avg(). Each stub should print "FIXME: Finish function_name()" followed by a newline, and should return -1. Each stub must also contain the function's parameters.

Answers

Answer:

Following are the code to this question:

def get_user_num():#defining a method

   return -1#return value -1

def compute_avg(n1, n2):#defining method compute_avg that accepts two parameters  

   return -1#return value -1

user_num1 = user_num2= get_user_num()#defining user_num1 and user_num2 variable that calls method get_user_num

avg_result = compute_avg(user_num1, user_num2)#defining avg_result that calls compute_avg method and store its value

print('The average value is:', avg_result)#use print method to call avg_result

Output:

The average value is: -1

Explanation:

In the given python code,  two methods "get_user_num and compute_avg" is defined, in which the second method "compute_avg" accepts two parameters that are "n1 and n2", and both methods will return its value, that is "-1".

In the next step, "user_num1 and user_num2" is defined, that calls method "get_user_num" and stores its value, and the variable avg_result is defined, which calls the "compute_avg" method and stores its value and use the print method is defined, that calls its value.

What is the name of the technology that integrates vast data bases with georeferenced data in order to design, plan, and manage urban environments

Answers

Answer:

"Geographic information systems " is the right answer.

Explanation:

This is indeed a computer-based method for observing and analyzing current events that are happening on the planet. GIS could enhance teaching and learning begin to understand geographical trends and regularities by relaying completely unconnected information.It represent an experimental field and while the GIS supplier government offers us modern, improved, and quicker technical resources for the computer hardware.
Other Questions
In what way are maps andglobes similar? chika left his house by 7.05pm and returned by 1.00pm. How long did he spend outside his house Figure out the pattern, fill inthe blank If an object on a horizontal frictionless surface is attached to a spring, displaced, and then released, it will oscillate. If it is displaced a distance 0.110 m from its equilibrium position and released with zero initial speed. Then after a time 0.815 s its displacement is found to be a distance 0.110 m on the opposite side, and it has passed the equilibrium position once during this interval.Find (a) the amplitude; (b) the period; (c) the frequency. please help! really needing help solve the problem Vas a comprar unos zapatos nuevos para la entrevista? S, ____ estoy comprandoA:LaB:Los C: LoD: Las Find the APR or stated rate in each of the following cases and show calculations:1. 10.6%-EAR , compounded semiannually2. 11.5% EAR, compounded monthly3. 9.2% EAR, compounded weekly4. 12.9% EAR, compounded Infinite Pina Company sold 196 color laser copiers on July 10, 2017, for $3,670 apiece, together with a 1-year warranty. Maintenance on each copier during the warranty period is estimated to be $319. Prepare entries to record the sale of the copiers, the related warranty costs, and any accrual on December 31, 2017. Actual warranty costs (inventory) incurred in 2017 were $17,370. Roger bowled 7 games last weekend. His scores are 155, 165, 138, 172, 127, 193 , 142. What is the RANGE of Roger's scores? Cadavieco Detailing's cost formula for its materials and supplies is $1,990 per month plus $4 per vehicle. For the month of November, the company planned for activity of 94 vehicles, but the actual level of activity was 54 vehicles. The actual materials and supplies for the month was $2,250. The materials and supplies in the planning budget for November would be closest to: What does permeable mean Who was one of New Jerseys proprietors Tamara wants to be the servant leader of her group of franchise operators. Tamara should therefore:_______a. Work on a large number of problems facing the operators. b. Listen carefully to the cocerns of the franchise operators. c. Treat the operators as servants in a nice way. d. Threat the operators as servants in a mean way, An air-conditioning repair department manager has compiled data on the primary reason for 41 service calls for the previous week, as shown in the table.JobNumber Problem/Customer Type JobNumber Problem/Customer Type JobNumber Problem/Customer Type301 O/C 315 W/C 329 F/R302 W/C 316 F/R 330 N/C303 N/R 317 F/R 331 F/C304 W/C 318 W/R 332 O/C305 W/C 319 F/R 333 N/R306 F/R 320 F/R 334 W/C307 N/R 321 F/C 335 F/C308 F/R 322 O/C 336 W/R309 O/C 323 W/C 337 O/R310 O/C 324 F/R 338 W/C311 O/C 325 O/R 339 O/R312 N/R 326 W/R 340 N/R313 F/C 327 N/R 341 F/R314 O/C 328 F/R Key: Problem type: Customer type:N = Noisy C = Commercial customerF = Equipment failure R = Residential customerW = Runs warm O = Odor b. Select a appropriate Pareto diagram for the Residential customers.ReferenceseBook & ResourcesMultiple ChoiceDifficulty: 2 MediumProblem 9-2 Part bLearning Objective: 09-13 Describe and use various quality tools.7.value:8.00 pointsRequired informationProblem 9-2 Part cc. Select a appropriate Pareto diagram for the Commercial customers. How did Bartolom de las Casas draw distinctions between the Spanish people and the American Indians? What are the substantial thoughts of preliminary and introduction of College life orientation? A vertical shelving unit consists of five equal-sized square shelves arranged in a column to form a rectangle. The total area of all five shelves is 500 square inches. What is the length, in inches, of the shelving unit? The Lewiston Company accrues $100 for one days wage expense at 12/31/22. The 1/2/23 reversing entry is not made. These wages plus wages of two days in the new year are paid on 1/2/23. Total cash paid is $300. The following journal entry is made on 1/2/23: Wage Expense $300 Cash $300 Indicate the errors for 12/31/23 Retained Earnings and 2023 Wage Expense, respectively: Question 2 (1 point)SavedA year ago, Rebecca purchased 100 shares of Havad stock for $20 per share.Yesterday, she placed a limit order to sell her stock at a price of $33 per share beforethe market opened. The stock's price opened at $23 and slowly increased to $26 inthe middle of the day, before declining to $22 by the end of the day. The stock didnot pay any dividends over the period in which Rebecca held it. Given Rebecca'sinitial investment of $ 20 per share, her return is What is 2x 2 + 2x - 12 = ?