subject

Agent Phil Coulson developed this program to register Avengers in S. H.I. E.L. D's database using cutting-edge programming language - Java. Complete the Avengers Registry class. Ex. if input is Steven Rogers Captain America 105 4 Then output should be: Name: Steven Rogers, Age: 105, Alias: Captain America, Security Clearance Level: 4 2892227722684 3z0y7 LAB ACTIVITY 11.6.1: miniLab: Avengers Initiative 0/10 Current file: Avengers Registry. java Load default template... 1 import java. util. Scanner; 2 Current file Avengers Registry. java Load de 1 import java. util. Scanner; 2 3 public class Avengers Registry { 4 5 6 7 8 public static Avenger createAvenger (Scanner scnr){ String name; int age; String alias, int clearance; 9 10 Avenger avenger = new Avenger(); name = scnr. nextLine(); alias = scnr. nextLine(); age = scnr. nextInt(); clearance = sonr. nextInt(); // your code here 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 return avenger; } public static void main(String[] args) { Scanner scnr = new Scanner(System. in); // your code here } File is marked as read only Current file: IndividualData. java 1 public class IndividualData { 2 private String name; 3 private int age; 4 5 public void setIndividualName(String individualName) { 6 name = individualName; 7 8 9 public String getIndividualName() { 10 return name; 11 } 12 13 14 public void setIndividualAge (int inYears) { 15 age = inYears; 16 } 17 18 public int getIndividualAge() { 19 return age; 20 } 21 22 public void printDetails() { 23 System. out. print("Name: + name); 24 System. out. print(", Age: + age) 25 } 26 H File is marked as read only Current file: Avenger. java 1 public class Avenger extends IndividualData { 2. private int securityClearance; 3 private String alias; 4 5 public void setSecurityClearance(int secLevel) { 6 securityClearance = secLevel; } 8 9 public int getSecurityClearance(){ 10 return securityClearance; 11 12 13 public void setAlias (String a) { 14 15 } 16 17 public String getAlias() { 18 return alias; 19 3 20 21 } alias = a;

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 01:00
Write the command that can be used to answer the following questions. (hint: try each out on the system to check your results.) a. find all files on the system that have the word test" as part of their filename. b. search the path variable for the pathname to the awk command. c. find all files in the /usr directory and subdirectories that are larger than 50 kilobytes in size. d. find all files in the /usr directory and subdirectories that are less than 70 kilobytes in size. e. find all files in the / directory and subdirectories that are symbolic links. f. find all files in the /var directory and subdirectories that were accessed less than 60 minutes ago. g. find all files in the /var directory and subdirectories that were accessed less than six days ago. h. find all files in the /home directory and subdirectories that are empty. i. find all files in the /etc directory and subdirectories that are owned by the group bin."
Answers: 1
question
Computers and Technology, 23.06.2019 10:30
Would a ps4 wired controller work on an xbox one
Answers: 1
question
Computers and Technology, 23.06.2019 23:30
The keyboard usually has six rows of keys. which of the following is not one of the key group categories? letter keys number keys control keys graphic keys
Answers: 1
question
Computers and Technology, 24.06.2019 06:00
Hey i really need some solving this problem: 1. encrypt this binary string into cipher text: 110000. include in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x n mod (m) = y & 2. decrypt this cipher text into a binary string: 106 you.
Answers: 2
You know the right answer?
Agent Phil Coulson developed this program to register Avengers in S. H.I. E.L. D's database using cu...
Questions
question
Mathematics, 13.10.2020 14:01
question
French, 13.10.2020 14:01
question
Biology, 13.10.2020 14:01
question
Engineering, 13.10.2020 14:01