Language: JAVA Can someone please tell me what the problem to my "main" class is?

I included the errors I received when trying to compile as well as the "Student" class which is used to answer the problem.

Here's the expected output:
Bob : 1234
Sue : 5678
Pat : 2468
Then it accepts user input: Chris

Then it outputs the updated objects:
Bob : 1234
Sue : 5678
Pat : 2468
Chris
Bob : 1234
Sue : 5678
Chris : 2468

Language: JAVA Can Someone Please Tell Me What The Problem To My "main" Class Is? I Included The Errors
Language: JAVA Can Someone Please Tell Me What The Problem To My "main" Class Is? I Included The Errors
Language: JAVA Can Someone Please Tell Me What The Problem To My "main" Class Is? I Included The Errors

Answers

Answer 1

Answer:

please find the attachment of the correct code:

Output:

Bob : 1234

sue : 5678

pat : 2468

please enter a name to replace with pat:  

Chris

Bob : 1234

sue : 5678

Chris : 2468

Explanation:

In this code, when we create the class object, that is "stu1, stu2, and stu3" and call the parameterized constructor bypassing the "string and integer" value and print the object value you forget to call the "tostring" method because it is the only method which returns both "string and integer" value.  

Language: JAVA Can Someone Please Tell Me What The Problem To My "main" Class Is? I Included The Errors
Language: JAVA Can Someone Please Tell Me What The Problem To My "main" Class Is? I Included The Errors
Language: JAVA Can Someone Please Tell Me What The Problem To My "main" Class Is? I Included The Errors

Related Questions

Technician A says that if a fuse blows it is good practice to replace it with a larger fuse to try to stop it from blowing. Technician B says that fuses can be tested quickly with a test light. Who is correct?

Answers

B is correct your welcome

(minimum 4 sentences) What is cyber security and why is it important

Answers

Answer:

A cyber security that is used for people being rude and disrespectful online.A cyber security is also used so that none of your personal information gets out.It is important to have  cyber security because it keeps all your personal data safe.Cyber security is good to have if you have a job that has information about other people saved.

Explanation:

What is it called when you want to see database records in a certain order?

Answers

It’ll be a data sheet view

For some reason, Danica's classmate George could not find the registered symbol in the symbol gallery. He is selling
products that a popular baking company donated to him for the school fair. Danica tells George that he can access
the symbol using keystroke codes.
Which keystroke code does George need to use to add the registered symbol beside the company's name?
O Alt + 0174
O Ctrl + 0174
* Enter + 0174
O Windows + 0174
Intro
Done

Answers

Answer alt +0174

Explanation:

Answer:a

Explanation:

what is Doppler shift

Answers

Answer:

When a body that is emitting radiation has a non-zero radial velocity relative to an observer, the wavelength of the emission will be shortened or lengthened, depending upon whether the body is moving towards or away from an observer. This change in observed wavelength, or frequency, is known as the Doppler shift.

Which of the following is a tool HR managers can use to improve commincations between workers of different generations in the same workplace? A)recruitment pools B)l-9 forms C) mentoring programs D)work/life balance

Answers

Answer:

Mentor Programs

Explanation:

This is because it is talking about different ages which is a mentor type thing

Answer: mentoring programs

Explanation:

A p e x

Which is a characteristic of an effective problem statement? It is based on research. It contains outside information. It contains technical language. It is reviewed by competitors.

Answers

Answer:

It is based on research

Explanation:

An effective problem statement is a term often used in research operation to describe a statement that practically deals with the current issue that needs to be solved, situations or circumstances that require enhancement, or a drawback that must be solved, which demands critical insight and conscious analysis.

There are various characteristics of Effective problem statement, some of which are:

1. It should focus on the need for solving the problem

2. The ways in which the problem will be solved should be stated in a precise and concise manner

3. It should be based on the main objective of the statement.

Hence, in this case, the correct answer is "It is based on research."

Answer:

A

Explanation:

Correct on Edge 2021:)

Your welcome

How can you troubleshoot Internet access problems?

Answers

Answer:

Check the network icon (or wireless connection settings) to see if you have Internet access. ...

Check for changes to proxy settings.

Check the network cables if your computer is wired to the router.

Reset your router.

Check your firewall or security software.

Hopefully this helps.

Answer:

Delete items from the cache, check your Internet connection, and try using a different browser.

Explanation:

Edge lesson

What should you remember about typography while creating your résumé?
It is advisable to avoid using [blank] font when creating your résumé. To facilitate readability, your font should not be smaller than [blank]
points.

Answers

Answer:

Your font should not be smaller than 0.5

Explanation:

What does "Forward" in emails do?​

Answers

Basically just want to make your your email is easy

10 points
What is wrong with the following code:
(don't say syntax error, what is the wrong)
>>> print 'Hello world!'
File " primt 'Hello world!'
SyntaxError: invalid syntax

Answers

Answer:

Primt

Explanation:

Which of these graphic elements combine text, illustrations, and color? Word Art Smart Art Clip Art none of the above

Answers

Answer:

I believe it's Word Art

Explanation:

Which tasks can be completed using the Chart Tools Design tab? Check all that apply.
O add a title to a chart
o change the way a chart looks
change the position of the chart
add a chart to a Word document
change the type of an existing chart

Answers

Answer:

add a title to a chart

change the way a chart looks

change the type of existing chart

Explanation:

i just took it ! remember to stream fine line by harry styles, walls by louis tomlinson , hs1 by harry styles, lp1 by liam payne, mind of mine by zayn , icarus falls by zayn , flicker by niall horan, heartbreak weather by niall horan, up all night by one direction, take me home by one direction, midnight memories by one direction, four by one direction , and made in the am by one direction . :)

Answer:

add a title to a chart

change the way a chart looks

change the type of existing chart

Explanation:

took it on edu 100%

Which of the following are characteristics of the Boolean data type? Check all that apply
It holds infinite values.
It uses operators such as AND, OR, and NOT
It holds a TRUE or FALSE value.
It is named after a nineteenth-century mathematician and logician
Help I’m timed !!

Answers

Answer:

It uses operators such as AND, OR, and NOT.

It holds a TRUE or FALSE value.

It is named after a nineteenth-century mathematician and logician

Explanation: Just did it on edg

Answer:

It uses operators such as AND, OR, and NOT.

It holds a TRUE or FALSE value.

It is named after a nineteenth-century mathematician and logician

Explanation:

Got it correct on edge

What are some cowboy ethics??

Answers

Answer:

giv meh a min plsssss

Explanation:

PLZ HELP 50 points. 4. How did Debevec and his team keep Emily from looking like a plaster mannequin?

Answers

Answer: Debevec and his team kept Emily from looking like a plastic mannequin by capturing her in a wide variety of facial expressions, and simulating the facial muscle movements in the animation software.

Explanation:

What is the purpose of the Chart feature in Word?
O A chart can be used to draw and format a Word table.
O A chart can be used to paste information from a graph.
O Information can be typed into a chart to create a graph.
O Information can be typed into a chart to insert a Word table.

Answers

Answer:

Its the third option.

Explanation:

Answer: its c Information can be typed into a chart to create a graph

Explanation:

Describe the five steps of the process of assessing personal strengths and weaknesses

Answers

•Ask others for input. ...
•Revisit past feedback. ...
•“Hire” yourself. ...
•Revisit your strength list.

You have been using an app on your mobile device for a 30-day trial period. Now that the 30 days have expired, the app is requesting that you to pay to continue accessing your data. What are your next steps? What steps could you have taken to preserve your data before the trial period expired?

Answers

Answer: Is there anyone choices A,B,C or D?

IF theres not. the answer is you could have canceled your trial early. Screenshots

not much i can help without choices

What is the act of working with someone to produce or create something?

A. Collaboration
B. Decision-making
C. Non-verbal communication
D. Problem solving

Answers

Answer:

A

Explanation:

Answer: A

Explanation:

Pleaseee answer number 9 I’m having trouble ❤️

Answers

Answer:

I think it is C but sorry if it wrong

Answer: A

Explination:

the font size sets the size of text​

Answers

Answer:

Yup thats correct

Explanation:

what tool should you use to look for information on a network?
A. A social network
B. A magnifying glass
C. A search engine
D. A consumer report

Answers

The answer is C. a search engine

When you add a zero to the right of a decimal number, it multiplies its value by 10 (For example, "15" becomes "150"). What similar result happens to the value of a binary number when you add a zero on the right? (For example, "11" would become "110").

Answers

Putting a 0 on the right side of a binary number it multiplies it by 2.

Hope this helps ʕ•ᴥ•ʔ

When you you add zero to the right hand side of a binary number such as 11, This binary number is going to become twice its value.

All the number that were 1 are now two times of what they were. We would have a solution like this:

(11)₂ = (1x2)¹ + (1x2)⁰

= 2 + 1

= 3

(110)₂ = (1x2)² + (1x2)¹ + (0x2)⁰

= 1x4 + 1x2 + 0x1

= 4+2+0

= 6

In conclusion, adding 0 to the right hand side of a binary number increases the number by 2. From  the solution above, we can see 11 = 3, but after 0 was added, 110 = 6

Read more at https://brainly.com/question/14789125?referrer=searchResults

Write the name of the tab, the command group, and the icon that you need to use to justify
text in a Word document.
Tab:
Command group:
Icon:

Answers

Answer:

Tab: Home Tab

Command Group: Paragraph

Icon: Justify Icon

The icon has no name; rather it is represented by 4 horizontal lines that are aligned on both edges

Explanation:

To answer this question, I'll make use of the following attachment

Where

1- represents the home tab

2 - represents the paragraph

3 - represents the justify icon

Answer:

Tab: Home Tab

Command Group: Paragraph

Icon: Justify Icon

Explanation:

is montior a visual display unit?​

Answers

Yes, definitely.
Thank you!

Should the use of hacktivists by a country against enemy organizations be considered an act of war? Why or why not? How about the use of cyberterrorists?

Answers

Explanation:

Hacktivist comes from the combination of two words --- "Hack" and " Activism" .

Hacktivist perform hacktivism that means they make use of technology and knowledge to support as well as promote the political agenda and any kind of change in the social event.

Cyberterrorism, on the other hand uses internet and technology and conduct terrorism and other anti national activities like to coerce the societies or the governments in pursuit of their goals which are  religious, ideological or political.

While Hacktivism is used for a political cause, and is done in a peaceful manner; whereas cyber terrorism tries to grab the attention of the public through their aggressive ways, specifically by putting fear among the public.

But there is no instance of any person of getting killed by a cyber-attack or cyber terrorism. The larger damage is however done by those viruses or malware which gets into other persons computers or enemy organization computer system and weakens them and steals information and data. They damage and harm the economy in a larger scale.

When Chinese government first introduced the Trojan virus on the computer systems of their opponents abroad, is that can be called as Hacktivism? In  essence, this act may be called as cyber terrorism and not hacktivism. Because the Chinese Government intend to cause major economic damage and harm to their opponents or enemy organization by targeting the software giants in the West.

These companies crashed and and many left jobless and unemployment, they caused economic problems and damage to the technologies.  However, the Chinese Government's perspective on this is that they addresses such a thing as hacktivism as it advocates the state censorship by filtering the politically or the socially-unacceptable ideas in their e-mail.

Thus, the answer is relative as to whose perspective we are looking. Either we are taking the perspective of the Chinese government or that of the enemy organization which is affected by the act of the state censorship and targeting the Western software giants.

Cyberterrorism will somehow become a serious threat to the society when people adept at hacking will sympathize and also align with terrorists activities and cause. It has become appealing since some of computer programs have the features that are easily exploited and conducive for committing cyber terrorism.

What products can be benefited from cyber security?

Answers

Computers. It protects the system from viruses worms and spyware

Which is most likely to cause confusion, hinder thinking, and prevent quick access to resources in a study
environment?
O phones
O clutter
O noise
O laptops

Answers

Answer:

B. Clutter

Explanation:

I just looked it up on quizlet and quizlet is always right. Helps me on test and everything. But it distracts you unlike phone and laptop because you can not ignore clutter like you can with other things, because clutter makes you confused and wonder what is going on.

IP is an unreliable, connectionless protocol, as it does not establish a session to send its packets.
A.True
B. False

Answers

Answer:

a. true

Explanation:

IP is a unreliable protocol because it does not guarantee the delivery of a datagram to its destination. The reliability must be provided by the upper layer protocols like TCP. IP does not support flow control, retransmission, acknowledgement and error recovery.

Other Questions
- A group of tissues in an organism that perform a specific function is called? You pay $30 each month for satellite TV, plus $2.50 for every movie you purchase. Write and solve an equation to find the number of movies purchased during a month with a total bill of $45. What is it in an equation and how many movies do you purchase. Im on a timed thing so please be speedy Which of the following were true about American Indian slavery in the West in the time before the arrival of white settlers? Check all of the boxes that apply.American Indians of the West held many enslaved Africans.American Indians of the West traded in enslaved American Indians.Strong tribes in the region captured and traded weaker American Indians to the Spanish.American Indians of the West held enslaved whites.American Indians of the West strongly opposed the practice of slavery. 6Following an inelastic collision, what can kinetic energy be converted into? Check all that apply.heatimpulsemomentumpotential energysoundMark this and returnSave and ExitNextSubmit Can someone please check this chart I made for me? The number 8 in binary isO 1001O 1000011001111010Previous Last year, Sams swimming pool cleaning had a gross profit of $105,355 and net income of $72,010. Calculate sams operating expenses for last year.A.3,335B.33,345C.17,734D.177,345 Where in real life do you work with radical expressions and functions? Give an example of your own. How do children learn languages?what happens to the brain because of this? Why are distant galaxies moving away from our galaxy more quickly than nearby galaxies are? What is the mass of the cubeDensity is 40 g/cm3Length of the side= 2 cm If f(2) = 12 and f '(x) 3 for 2 x 5, how small can f(5) possibly be? WILL GIVE BRAINLIEST!! Before beowulf fights grendel, what is the political relationship between Hrothgar and Beowulf? once mountains have been formed what is the biggest force acting on them What are the correct answers for this? Using information and facts that you learned in this unit to support your answer, write a paragraph (100-200 words) answering this question: How did trade affect early human societies? i need the answer ASAP LIKE IN 1 TO 2 MINUTES Chloroplasts contain chlorophyll. What color does chlorophyll make chloroplast Which of these statements best describes how the setting establishes conflict and advances the plot of the story? Answer choices for the above question A. The geographic distance between the capital and the town emphasizes the oppression of a government that is out of touch with its people. B. The small size of the town helps highlight a close-knit community of villagers who rely on each other in times of need. C. The hot climate contributes to an unsettling, uncomfortable mood, and causes the soldiers to feel irritable. D. The vivid description of the tax-collectors elaborate home reveals how wealthy and uncaring he is. Which of these objects could be falling with constant acceleration? what is 63,120,000 written in scientific notation