answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oliga [24]
2 years ago
6

The base class Pet has private fields petName, and petAge. The derived class Dog extends the Pet class and includes a private fi

eld for dogBreed. Complete main() to: create a generic pet and print information using printInfo(). create a Dog pet, use printInfo() to print information, and add a statement to print the dog's breed using the getBreed() method.

Computers and Technology
1 answer:
Lapatulllka [165]2 years ago
5 0

Answer:

Hello attached is the Java program written to solve the problem

The Pet.java and Dog.java files are unaltered

Explanation:

The input and output  codes are attached as well i.e the second image is the input while the third image is the output code

You might be interested in
Provide an example by creating a short story or explanation of an instance where availability would be broken.
noname [10]

Explanation:

Personal Insurance

Confidentiality in the workplace: What you need to know

When you give advice to clients or patients for a living, you'll know that protecting sensitive and personal information is crucial. But are you clear on what counts as a breach of confidence or what to do if one occurs?

From how to protect confidential information, to what breaches of confidence look like for different jobs, here's what you need to know about confidentiality in the workplace.

What is a breach of confidentiality?

In short, a confidentiality breach is the disclosure of information to someone without the consent of the person who owns it. In other words, failing to respect a person's privacy or the confidence in which they gave the information or data to you, by passing it onto someone else.

Why is confidentiality important?

Protecting confidential information is vital. If you're in a position where you have access to or are given this type of data at work, your career relies on your ability to keep patient or client confidentiality. If you don't, you could lose trust and integrity in the eyes of your existing (and potential future) clients, who could terminate your contract and take legal action against you.

Therapist/patient confidentiality

Unsurprisingly, patient confidentiality is highly important for therapists and counsellors. It forms part of the therapeutic frame of appropriate boundaries, which creates a safe space for a good working relationship to form.

Here’re some examples of ways you could unintentionally break patient/therapist confidentiality:

Sharing confidential information about a client with a family member or friend

Talking about confidential information somewhere you can be overheard

Leaving your computer containing confidential information open to others

Continuing to work with a client when there's a conflict of interests (for example, they know one of your family members or friends)

When permission to share information is given but isn't specific, this can create confusion and result in a potential breach (for example, a patient may give permission for their information to be shared with a teacher but not their GP)

7 0
1 year ago
Allows you to manually add an entry to the arp cache that resolves the ip address inetaddr to the physical address etheraddr. wh
Norma-Jean [14]
The answer in this question is that once the Adaptor or router received the destination IP address (even if we entered in the incorrect MAC address) the router or adapter would remove the IP address from the Ethernet frame and using ARP, would get the correct MAC address of the destination.
6 0
2 years ago
In public-key encryption, the two keys–one for coding and one for decoding–are known as ________.
Feliz [49]
Public key and private key  - In public key encryption, a pair of keys is used (public key and private key). The public key can be made available publicly, while the private key is only known  by the owner. The public key is used to encrypt the message, while the private key is used to decrypt the message.
5 0
2 years ago
At one college, the tuition for a full-time student is $8,000 per semester. It has been announced that the tuition will increase
inn [45]

Answer:

#include <iostream>

using namespace std;

 

int main () {

  // for loop execution

  int semester_fees=8000;

  int b=1;

  cout<<"there are 5 years or 10 semester fees breakdown is given below"<<endl;

  for( int a = 1; a <=5; a++ ) {

     semester_fees = semester_fees*1.03;

     cout<<"Semester fees for each of semester"<<b++<<"and"<<b++<<"is:$"<<semester_fees<<endl;

     

  }

 

  return 0;

}

Explanation:

code is in c++ language

Fees is incremented yearly and i have considered only two semester per year

3 0
2 years ago
A program is loaded into _________ while it is being processed on the computer and when the program is not running it is stored
erik [133]
Idkkkkkkkkkkkkkkkkkkk
4 0
2 years ago
Read 2 more answers
Other questions:
  • Steps in creating a folder
    12·1 answer
  • Which of the following statements is not true about proper tire care? a.If you see a wear bar across the width of the tread whil
    14·2 answers
  • Which of the following is true of information systems?
    15·1 answer
  • "Suppose there is a class Alarm. Alarm has two class variables, code which contains a String value representing the code that de
    10·1 answer
  • Together with some anthropologists, you’re studying a sparsely populated region of a rainforest, where 50 farmers live along a 5
    15·1 answer
  • 10. (P37) Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently lon
    12·1 answer
  • Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in
    8·1 answer
  • int decode2(int x, int y, int z); is compiled into 32bit x86 assembly code. The body of the code is as follows: NOTE: x at %ebp+
    5·1 answer
  • What is an input to the Program Increment Planning process that highlights how Product Management plans to accomplish the Vision
    15·1 answer
  • If a class has member variables that are pointers, you must ensure that you implement ____.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!