Describe invoking methods in java, JAVA Programming

Assignment Help:

Describe Invoking Methods in java?

class Car {

String licensePlate = ""; // e.g. "New York 543 A23"
double speed = 0.0; // in kilometers per hour
double maxSpeed = 123.45; // in kilometers per hour

// accelerate to maximum speed
// put the pedal to the metal
void floorIt() {
this.speed = this.maxSpeed;
}

}
Outside the Car class, you call the floorIt() method just like you reference fields, by using the name of the object you need to accelerate to maximum and the . separator as elaborates below
class CarTest3 {

public static void main(String args[]) {

Car c = new Car();

c.licensePlate = "New York A45 636";
c.maxSpeed = 123.45;

System.out.println(c.licensePlate + " is moving at " + c.speed +
" kilometers per hour.");

c.floorIt();

System.out.println(c.licensePlate + " is moving at " + c.speed +
" kilometers per hour.");

}
}
The output is:
New York A45 636 is moving at 0.0 kilometers per hour.
New York A45 636 is moving at 123.45 kilometers per hour.

The floorIt() method is fully enclosed inside the Car class. Every method in a Java program must belong to a class. Unlike C++ programs, Java programs cannot have techniques hanging around in global space in which does everything you forgot to do inside your classes. 


Related Discussions:- Describe invoking methods in java

Program, Decode the Code Smugglers are becoming very smart day by day. Now ...

Decode the Code Smugglers are becoming very smart day by day. Now they have developed a new technique of sending their messages from one smuggler to another. In their new techn

Inheritance, Inheritance - is the inclusion of state and behavior of a ba...

Inheritance - is the inclusion of state and behavior of a base class in a derived class so that they are accessible in that derived class. The key benefit of Inheritance is that

Authentication -security component, Authentication is basically an identifi...

Authentication is basically an identification step. Functionality used for J2EE security: Principal : An entity that may be authenticated and identified. Principal n

Difference between durable and non-durable subscriptions, Point-To-Point (P...

Point-To-Point (PTP). This model permits exchanging messages via queues formed for some purposes. A client can send and receive messages from one or various queues. PTP model is ea

What is prototype, Prototype is having multiple instances or having clone.

Prototype is having multiple instances or having clone.

Overloaded Methods, QUESTION 3: Overloaded methods Write the overloaded me...

QUESTION 3: Overloaded methods Write the overloaded method named average () for each of the following problems: a) The first method receives THREE (3) integer values and returns

Jumps in loops, explain jumps in loops and explain labelled loops

explain jumps in loops and explain labelled loops

Homework, Pick your favorite geometry formula (e.g., area of a square, peri...

Pick your favorite geometry formula (e.g., area of a square, perimeter of a triangle …) and implement it in Java. Demonstrate your code compiles and runs without issue (You can use

Inheritance, Draw an inheritance hierarchy to represent a shoe object. The...

Draw an inheritance hierarchy to represent a shoe object. The base class should have derived classes of Dress Shoes, Tennis Shoes and Boots.

Networking, which concept is used to connect the networking in java

which concept is used to connect the networking in java

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd