6) Create a java program The number of calories burned per hour during
bicycling, jogging, and swimming are 200, 475, and
275, respectively. A person loses 1 pound of weight for
each 3500 calories burned. Create a Java application that
allows the user to enter the number of hours spent in
each activity and then calculates the number of pounds
Lost

Answers

Answer 1

Answer: With the criteria you have listed, here's the code.

import java.util.Scanner;

public class CaloricExpenditure {

 public static void main(String[] args) {

   Scanner scan = new Scanner(System.in);

   System.out.print("Enter the number of hours spent bicycling: ");

   int hoursBicycling = scan.nextInt();

   System.out.print("Enter the number of hours spent jogging: ");

   int hoursJogging = scan.nextInt();

   System.out.print("Enter the number of hours spent swimming: ");

   int hoursSwimming = scan.nextInt();

   int totalCalories = (hoursBicycling * 200) + (hoursJogging * 475) + (hoursSwimming * 275);

   double poundsLost = totalCalories / 3500.0;

   System.out.println("You have burned a total of " + totalCalories + " calories.");

   System.out.println("This means you have lost " + poundsLost + " pounds.");

 }

}

Explanation:

The Scanner class is used in this software to ask the user to enter how many hours they spent doing each activity. The total amount of calories burned is then determined by dividing the caloric expenditure of each activity by the quantity of time spent engaging in that activity. The total amount of calories burned is then divided by 3500 to determine the number of pounds lost. The user sees the outcome in the console.


Related Questions

Suppose x, y, and z are int variables and ch is a char variable. Consider the following input: (2) 78 86 18 #42 & What value (if any) is assigned to x, y, z, and ch after each of the following statements executes?

Answers

Here's the value of x, y, z, and ch after each of the following statements execute:

X will be assigned the value 2.Y will be assigned the value 78.Z will be assigned the value 86.

The "value of a variable" refers to the data stored in the memory location that has been assigned a specific name (the variable). In programming, a variable is a storage location for a value. When you assign a value to a variable, that value is stored in memory, and you can access it later by referring to the variable name.

To find the value of variable you can determine it by coding that is shown below.

ch = 42;

Ch will be assigned the ASCII value of the character '*', which is 42.

x = &ch;

X will be assigned the memory address of the ch variable.

y = *x;

Y will be assigned the value stored at the memory address stored in x, which is 42.

z = &y;

z will be assigned the memory address of the y variable.

x = *z;

Learn more about variable: https://brainly.com/question/30365768

#SPJ4

write an algorithm to find odd integers between 1 and 49​

Answers

Answer: Algorithm of this program is very easy − START Step 1 → Take integer variable A Step 2 → Assign value to the variable Step 3 → Perform A modulo 2 and check result if output is 0 Step 4 → If true print A is even Step 5 → If false print A is odd STOP. Output.

global trade with 7.7 billion potential customers is attractive, but the threats to trading globally include which of the following? (check all that apply)

Answers

Global trade with 7.7 billion potential customers is attractive, but the threats to trading globally include terrorism, income inequality.

What is a Global trade?

A Global trade has been also known as the globalization in the business sphere. A globalization has been refers to how trade and the technology have made the world into a more connected and interdependent place.

It captures the scope of economic & social changes that have come about as a result as well.The G20 stands for Group of 20 which includes the Finance Minister and the Central Bank Governors of 19 countries.

Therefore, Global trade with 7.7 billion potential customers is attractive, but the threats to trading globally include terrorism, income inequality.

Learn more about Global trade on:

https://brainly.com/question/784919

#SPJ1

Answer:

rouge states

terrorism

income inequality

Explanation:

A 25. 0 g bolt made of an alloy absorbed 250 j of heat as its temperature changed from 25. 0 degrees celsius to 78. 0 degrees celsius. What is the specific heat of the alloy?.

Answers

The specific heat of the alloy is 0.34 J/g°C, calculated by Q = m * C * ΔT with Q=250 J, m=25.0 g, ΔT=53.0°C.

The specific heat capacity (C) of a material is defined as the amount of heat required to raise the temperature of one gram of the material by one degree Celsius. Therefore, we can calculate the specific heat of the alloy using the following formula:

Q = m * C * ΔT

where Q is the amount of heat absorbed by the bolt, m is the mass of the bolt in grams, ΔT is the change in temperature in degrees Celsius (ΔT = final temperature - initial temperature), and C is the specific heat capacity of the alloy.

When we enter the specified values into the formula, we obtain:

[tex]250 J = 25.0 g * C * (78.0\°C - 25.0\°C)[/tex]

Simplifying the expression, we get:

C =[tex]250 J / (25.0 g * (78.0\°C - 25.0\°C))[/tex]

C = 0.34 J/g°C

Therefore, the specific heat of the alloy is 0.34 J/g°C.

To calculate the specific heat capacity of the alloy, we can use the formula Q = m * C * ΔT, where Q is the heat absorbed by the bolt, m is the mass of the bolt, and ΔT is the change in temperature. This formula can be solved using basic physics principles, but it can also be easily computed using a scientific calculator or a spreadsheet software. In this case, the specific heat of the alloy was found to be 0.34 J/g°C, which is a measure of the amount of heat required to raise the temperature of one gram of the alloy by one degree Celsius. This information can be useful in determining the thermal properties of the alloy and in designing systems that rely on its heat transfer characteristics.

Learn more about scientific calculator here:

https://brainly.com/question/30339982

#SPJ4

________ is the proper filename for the file that contains targets, dependencies and rules which are used to define how your source code should be built into a binary executable.
A) gcc
B) compiler
C) Makefile
D) make

Answers

Makefile is the proper filename for the file that contains targets, dependencies and rules which are used to define how your source code should be built into a binary executable. Hence  option C is correct.

What is the file about?

A "Makefile" is a file that contains instructions on how to build a binary executable from source code. The instructions include targets, dependencies, and rules that define how the source code should be built.

Therefore, The "make" command reads the Makefile and builds the executable based on the information specified in the file. "make" is a tool that automatically builds executable programs and libraries from source code by reading files called Makefiles which specify how the files should be built.

Learn more about filename from

https://brainly.com/question/26960102
#SPJ1

What does the number 16 mean in this code? How do you know?

Answers

Without seeing the actual code you are referring to, it is difficult to provide a specific answer. However, in general, the number 16 can have different meanings in different contexts within a code.

For example, in hexadecimal notation (base 16), the number 16 represents the decimal value of 22. In binary notation (base 2), 16 is represented as 10000.

What is coding?

Coding, also known as programming, is the process of designing, writing, testing, and maintaining computer programs. It involves using a programming language, such as Python, Java, or C++, to create instructions that a computer can understand and execute.

The purpose of coding is to create software applications, websites, mobile apps, and other types of computer programs that can perform specific tasks or solve problems.

In some programming languages or systems, the number 16 may be used to represent a specific value or constant. For instance, in ASCII code, the decimal value of 16 is used to represent the "Data Link Escape" character, which is a control character used to indicate the start of a data packet in a communication protocol.

In short, the meaning of the number 16 in a code depends on the context in which it is used. Without additional information, it is impossible to determine the exact meaning of the number.

learn about programming here https://brainly.com/question/23275071

#SPJ1

A user reports that her system is running slow when saving files. You determine that you will need to upgrade her hard disk. You identify the components that are required and schedule the repair for later that afternoon.Which of the following steps have you forgotten in your troubleshooting process?

Answers

A step you have forgotten in your troubleshooting process is performing a backup.

What is Data Backup

Data backup is the process of making copies of files/data as an effort to prevent data damage or loss. Apart from that, backing up also serves to prepare a secure system so that lost data can later be recovered. The backup process is carried out before data damage or loss occurs due to human error or other problems.

Performing a backup may not always be able to fully restore all data and system settings, for example, such as on the database server, directory server, and so on because some additional recovery efforts are needed. But at least, data backup is a preventive effort that can be done to reduce the impact of data damage.

Learn more about backup at https://brainly.com/question/29590057

#SPJ4

a school has following rules for grading system: a. below 25 - f b. 25 to 45 - e c. 46 to 50 - d d. 51 to 60 - c e. 61 to 80 - b f. above 80 - a which of the following is an correct implementation if only whole numbers (integers) are allowed?

Answers

score = input("Enter your score")

score = int(score)

if score < 25:  

  print("F")

elif score >= 25 and score < 45:  

  print("E")

elif score >= 45 and score < 50:  

  print("D")

elif score >= 50 and score < 60:  

  print("C")

elif score >= 60 and score < 80:  

  print("B")

else:  

  print("A")

In order to create a hard copy (printed copy) of the electronic data being printed, a computer transfers data to a computer printer. For instance, you may write your resume in a word processor, print copies of it, and mail them to various employers.

Here you can learn more about print in the link brainly.com/question/27646993

#SPJ4

What are two advantages of using fiber optic cables compared with copper cables?

Answers

Fiber optic cables offer several advantages over copper cables:

Higher bandwidth.Immunity to electromagnetic interference (EMI).Longer distances.Improved security.

These advantages make fiber optic cables a popular choice for high-speed data networks, telecommunications, and other applications where fast, reliable, and secure data transmission is critical.

Once you've found the download option, click on it and choose where you want to save the flipbook on your computer. The file may be saved as a PDF, ePUB, or other format, depending on the software used to create the flipbook.

Learn more about fiber optic cables: https://brainly.com/question/29588379

#SPJ4

Dag each task to the appropriate column based on whether it is a task that embedded computers do or do not perform.DO : ___DO NOT : ___Task1. Remotely turn on a fan found in your grandmother's attic 2. Monitor engine emission in a car3. Manages financial transaction at an ATM 4. Reduce energy consumption in home appliances 5. Automate security so you can lock an

Answers

DO NOT

Remotely turn on a fan found in your grandmother's atticReduce energy consumption in home appliancesAutomate security so you can lock an

DO:

Monitor engine emission in a carManages financial transactions at an ATM

Automating security refers to using technology to monitor, control, and secure physical and digital environments. It involves implementing various automated systems that enable organizations and individuals to protect their assets, data, and privacy by minimizing the risk of unauthorized access, theft, or damage.

In the physical domain, automated security systems can include biometric scanners, motion detectors, and surveillance cameras. These systems can be integrated with alarm systems that trigger alerts to security personnel or law enforcement agencies in case of a breach.

In the digital domain, automated security systems can include firewalls, intrusion detection systems, and antivirus software. These systems can monitor network traffic and detect and block malicious activities such as hacking attempts or malware infections.

Overall, automating security can improve the efficiency and effectiveness of security operations by reducing the need for manual intervention and increasing the speed of response to security threats.

You can learn more about Automating security here brainly.com/question/13148756

#SPJ4

100 POINTS

PYTHON PROGRAMMING I:

TURTLE GRAPHICS PROJECT


For this project you are going to create a program that draws at least 5 flowers. Each flower must have at least 5 flower petals, and can be of any shape, size or color, but each flower petal must be distinguishable from the other. See fig. 1 below. Only one of the flowers may be centered on the canvas. The rest of the flowers can be placed visibly anywhere on the canvas. See fig. 2 Each flower must use a different shape and color scheme.

Answers


For this project, you will need to use the Turtle Graphics library in Python. This library allows you to draw shapes and objects on the screen using commands.

To start, you will need to import the Turtle library. You can do this by typing the following code into your Python program:

import turtle

Next, you will need to create a turtle object. This will be the object that you will use to draw your flowers. You can do this by typing the following code into your program:

flower_turtle = turtle.Turtle()

Now that you have your turtle object, you can start drawing your flowers. To draw a flower, you will need to use the turtle's methods to draw the petals. For example, you can use the turtle's forward() method to draw a line, and the turtle's left() or right() methods to turn the turtle.

To draw a flower with 5 petals, you can use a for loop to repeat the drawing of the petals. For example, you can use the following code to draw a flower with 5 petals:

for i in range(5):
flower_turtle.forward(50)
flower_turtle.left(72)

You can also use the turtle's color() method to change the color of the petals. For example, you can use the following code to draw a flower with 5 red petals:

for i in range(5):
flower_turtle.color("red")
flower_turtle.forward(50)
flower_turtle.left(72)

Once you have drawn your first flower, you can repeat the process to draw more flowers. You can also use the turtle's penup() and pendown() methods to move the turtle without drawing a line.

Once you have finished drawing your flowers, you can use the turtle's done() method to close the window.

Good luck with your project!

cyb 210 network configuration scavenger hunt template reminder: make sure that you are going into the devices and using the command line to find your objectives, not just hovering over the devices with your mouse.

Answers

The purpose of the CYB 210 Network Configuration Search is to find network configuration information using devices and the command line instead of hovering over devices with the mouse.

A deeper understanding of network configuration and components is critical for effective network management and troubleshooting. The command line interface provides a direct and efficient way to access this information. Using the command line to access configuration information gives you access to detailed network information that may not be available through the GUI. This includes information about network interfaces, routing tables, and other system settings. By focusing on using the command line to achieve scavenging goals, people develop skills to access and interpret network configuration information and gain a better understanding of network components and how they interact.

Learn more about Network Configuration here:

https://brainly.com/question/29989077

#SPJ4

A programming languages can be broken down into four structural layers. Identify these layers. (Check all that applies.)SyntacticContextualSemantics

Answers

A programming language can be broken down into structural layers - Syntax, Semantic, and Contextual.

What is the difference between Syntax and Semantics?

Syntax: It's the set of guidelines for constructing any statement in a computer language like C or C++.

It has nothing to do with how the statement is meant to be taken.

If a statement abides by all the requirements, it is syntactically valid.

It has to do with linguistic structure and grammar.

Semantics: This term describes the significance attached to a statement in a computer language.

The statement's meaning determines how easily the program may be interpreted.

Runtime error handling takes place.

To know more about Syntax and Semantics, Check out:

https://brainly.com/question/13438145

#SPJ4

.

consider the following data field and incomplete method, partialSum, which is intended to return an integer array sum such that for all i, sum[i] is equal to arr[0] + arr[1] + ... + arr[i]. For instance, if arr contains the values {1, 4, 1, 3}, the array sum will contain the values {1, 5, 6, 9}. Which of the following is true about the two implementations of missing code on line 9 that are proposed?Pilihan jawabana. Both implementations work as intended and are equally fast.b.Both implementations work as intended, but implementation 1 is faster than implementation 2.c. Both implementations work as intended, but implementation 2 is faster than implementation 1.d. Implementation 1 does not work as intended, because it will cause an ArrayIndexOutOfBoundsException.e. Implementation 2 does not work as intended, because it will cause an ArrayIndexOutOfBoundsException.

Answers

One of the most frequent failures in Java is the ArrayIndexOutOfBoundsException. When a program tries to access an erroneous array index—one that is less than 0 or equal to or more than the array's length—it encounters this error. Thus, option D is correct.

What is the Array Index Out Of Bounds?

This error message typically indicates that your RAM is full. Make sure that the amount of your personalized content and DLCs does not exceed the amount of RAM that is accessible.

When an element at an index outside the array's bounds is attempted to be accessed by a program, an array index out of bounds exception is raised.

This often happens when a program attempts to reach an element at an index that is either larger than or equal to the length of the array, or less than 0.

Therefore, Implementation 1 will result in an ArrayIndexOutOfBoundsException, so it does not function as intended.

Learn more about Array Index here:

https://brainly.com/question/14158148

#SPJ4

true or false Hand tools are powered instruments, which can be very hazardous when improperly used due to their power source.

Answers

It's False. Hand tools are not powered instruments.

They are manual tools that require physical effort to operate, such as hammers, screwdrivers, pliers, wrenches, etc. Hand tools are generally considered to be less hazardous than powered instruments, such as power drills or saws, because they do not rely on a power source to operate.

However, hand tools can still be hazardous when used improperly or if they are damaged or worn. For example, a damaged screwdriver can break and cause injury, or a sharp tool can cause cuts if used carelessly.

It is important to follow proper safety guidelines when using hand tools, such as wearing protective gear, checking the condition of the tool before use, and using the tool in a manner consistent with its intended purpose.

Learn more about hand tool: https://brainly.com/question/18041186

#SPJ4

Write in DQLfor every project located in 'stafford', list the project number, the controlling department number, and the department manager's last name, address, and birth date.

Answers

This query selects the project number, controlling department number, manager last name, address and birth date from the project table where the location is 'stafford'.

Code:

SELECT project_number, controlling_dept_number, manager_last_name, address, birth_date FROM project WHERE location = 'stafford'

This query will select all the relevant information from the project table where the location is 'stafford'. The returned information includes the project number, controlling department number, manager last name, address and birth date. This data can then be used to analyze the projects located in Stafford and their associated departments.

Learn more about coding: https://brainly.com/question/16397886

#SPJ4

you work as a network administrator and are responsible for configuring network firewalls, routers and switches. you have configured rules between the user and server vlans. you received a request from your development team to create a new rule that allows port tcp 1433 to the database server. based on the port number, which database is installed on the server.

Answers

The correct answer is As a network administrator, you are in charge of setting up network switches, routers, and firewalls. You've set up rules for communication between the user and.

What purposes serve network switches? A network switch enables communication between two or more IT devices. Switches can be connected to other switches, routers, and firewalls in addition to end devices like PCs and printers, all of which can connect to other devices. Between a router and a switch, there are differences. The primary function of a router is to simultaneously establish connections between distinct networks. It also functions at the network layer. The primary function of a switch is to connect multiple devices simultaneously. The modem is often placed first in a home setup, followed by a router, and then an Ethernet switch. The main operational premise is as follows: the modem communicates with users

To learn more about network switches click on the link below:

brainly.com/question/14748148

#SPJ4

What switch can you use with the "killall" command to kill a process group instead of just a process

Answers

To kill a process group, instead of just a process, you can use the "--group" or "-g" switch with the "killall" command.

The process group is a collection of one or more processes that are created together and share the same process ID. When a process group is killed, all the processes in the group will be terminated, as opposed to killing just a single process, which would only terminate that process.

Note that using the "killall" command with the "--group" switch requires root privileges, as it can potentially terminate multiple processes at once. It is recommended to use this command with caution and only when necessary.

Learn more about commands: https://brainly.com/question/27936993

#SPJ4

what will happen if i put different ram with different speed but with same DDR3 in a same laptop?

Answers

Answer:

If you put different RAM with different speeds but with the same DDR3 in a laptop, the RAM will likely run at the speed of the slowest module. This is because the system will automatically adjust the speed of the faster RAM module to match the slower one.

For example, if you have a 4GB DDR3 RAM module running at 1600MHz and add another 4GB DDR3 RAM module running at 1333MHz, the system will adjust the speed of the faster module to match the slower one, and both modules will run at 1333MHz.

In some cases, mixing RAM modules with different speeds and timings can cause stability issues, such as crashes or system errors. Therefore, it is generally recommended to use RAM modules with matching speeds and timings to ensure optimal performance and stability. If you must mix RAM modules, it is recommended to use modules with the same speed and timings for best results.

Explanation:

You have just installed a new USB card reader into Wenders computer every time you perform a certain action using the card reader, you get your message that you’ve never seen before. What should you do first?
a.Replace the card read with a new one
b.Install the device on another computer
c.Uninstall the device, then reinstall it
d.Check the manufacturers website for more information about the error

Answers

Answer:

Check the manufacturers website for more information about the error

Which of the following statements about the Dynamic Host Configuration Protocol (DHCP) are true?A workstation must request addressing information from a DHCP server.It can deliver a DNS server address in addition to the host IP address.ExplanationDHCP servers deliver IP addresses as well as other host configuration information to network hosts. DHCP can be configured to assign any available address to a host, or it can assign a specific address to a specific host. DHCP clients, typically workstations, must send a request to a DHCP server before it will send IP addressing information to them.

Answers

The  statements about the Dynamic Host Configuration Protocol (DHCP) that are true are:

A) The statement "A workstation must request addressing information from a DHCP server" is true.

B) The statement "It can deliver a DNS server address in addition to the host IP address" is also true.

What is Dynamic Host Configuration?

Dynamic Host Configuration Protocol (DHCP) is a network protocol used to assign IP addresses and other configuration information to network hosts.

In summary, DHCP is a powerful and convenient tool for configuring IP addressing and other network settings for hosts on a network. The DHCP protocol helps ensure that all hosts on a network have valid IP addresses and other required configuration information, making it easier to manage and maintain large networks.

Learn more about Configuration from

https://brainly.com/question/14234787
#SPJ1

In what types of situations are restraining orders helpful?

A) The bully has already repeatedly attacked the victim, and there is plenty of evidence to convict the bully.
B) The bully has broken the law, but there is no enough evidence to convict him or her of a crime of any kind.
C) The bully has not yet broken the law, and there is little reason to think that he or she will eventually do something illegal.
D) The bully has not yet broken the law, but there is reason to believe he or she will if steps are not taken.

Answers

Answer:

A, D

Explanation:

Answer A) Yes! Since the victim can easily give evidence to stop the attacker, they should definitely take out restraining orders.

Answer B) No. However, you should keep an eye on the attacker.

Answer C) No. If the attacker is not suspicious at all, you should just drop it.

Answer D) Yes! You should go ahead and send in evidence. Since there is reason to believe the attacker will break the law, you should report them to make sure nothing out of control happens.

Xan wants to change the number format in a PivotTable as well a PivotChart. To do so, she can right-click on a cell in the value field in the pivot table, then click Value Field Settings, and then the Number Format button in the popup menu, then select the formatting that she wants in the Format Cells dialog box and finally click OK.

Answers

Yes, the steps written are true if Xan wants to change the number format in a PivotTable as well as a PivotChart.

What is a PivotTable?

An effective tool for calculating, condensing, and analyzing data that enables you to spot comparisons, patterns, and trends in your data is the pivotTable. Depending on the platform you use to run Excel, pivot tables behave a little bit differently. An interactive technique to quickly summarize vast volumes of data is with a pivot table. A PivotTable can be used to thoroughly evaluate numerical data and provide unexpected answers regarding your data. The built-in program tool PivotChart in Excel allows you to condense specific rows and columns of data in a spreadsheet. A PivotTable's or any other tabular data visual representation aids in the summary and analysis of the datasets, patterns, and trends.

To know more about PivotTable, check out:

https://brainly.com/question/27945029

#SPJ4

T/FA solution to providing a sense of control to users is to expand the control panel model whereby users specify personal preferences and system parameters.

Answers

The statement solution to providing a sense of control to users is to expand the control panel model whereby users specify personal preferences and system parameters is true.

Since Windows 1.0,[1] the Control Panel has been a part of Microsoft Windows. Subsequent updates have added new applets. With Windows 95, the Control Panel is implemented as a unique folder, meaning that it doesn't actually exist and consists only of shortcuts to different applets like Add or Remove Programs and Internet Options. These applets are kept in.cpl files on a physical level.

For instance, the SYSTEM32 folder houses the Add or Remove Programs applet under the name appwiz.cpl. The Control Panel home screen in Windows XP has been modified to display a categorised navigation structure akin to browsing a website. By selecting an option that appears on either the left side, users can change between this Category View and the grid-based Classic View.

To know more about control panel model here

https://brainly.com/question/30417140

#SPJ4

is it true or false that, It is a best practice to store composite attributes in a single column so the users of the database don't forget about all the component parts of the composite attribute.

Answers

It is a best practice to store composite attributes in a single column so the users of the database.

The statement is False.

It is not a best practice to store composite attributes in a single column. Doing so can make it difficult to query the data and to enforce data integrity constraints. Instead, it is typically better to store each component of a composite attribute in a separate column in the database. This makes it easier to work with the data, to query it, and to enforce constraints.

When you store composite attributes in a single column, the data is stored as a single string, which can be difficult to work with.

For example, if you store a person's full name as a single string in a single column, you may have to write complex string manipulations to extract the first name, last name, or middle initial.

Additionally, storing composite attributes in a single column can make it difficult to enforce data constraints, such as ensuring that a person's first name is not too long or that a person's last name is not a number.

On the other hand, when you store each component of a composite attribute in a separate column, you can more easily work with the data and enforce constraints. For example, you can store a person's first name in one column, last name in another column, and middle initial in a third column.

Learn more about composite attribute:

brainly.com/question/30256045

#SPJ4

Select the feature in Windows Server 2016 that has the ability to support resource records of a type unknown to the DNS server on Windows Server 2016.
a. advanced record support
b. primary record support
c. unknown record support
d. secondary record support

Answers

On Windows Server 2016, there is a feature known as "unknown record support" that allows for resource records of a type the DNS server is unaware of to be supported.

Which DNS security feature in Windows Server 2016 can be set up to permit source port randomization for DNS queries?

When a DNS server executes DNS queries, source port randomization is made possible by the security feature of the DNS socket pool.

Which DNS resource record type is employed to provide the IP address for the email server for a zone?

Name Server records (NS Record) specify that a DNS Zone, like "example.com," is assigned to a particular Authoritative Name Server and indicate the name server's address.

To know more about DNS server  visit :-

https://brainly.com/question/13852466

#SPJ4

Suppose we add $100 to a checking account in year 1, $200 in year 2, $300 in year 3, and so on. The account earns no interest. After how many years will the balance reach a given target? Modify the program below to produce the answer.
Complete the following file:
Investment.java
import java.util.Scanner;
/**
This program computes the time required to double an investment.
*/
public class Investment
{
public static void main(String[] args)
{
double balance = 0;
int year = . . .;
Scanner in = new Scanner(System.in);
System.out.print("Target: ");
double target = in.nextDouble();
// Add $100 in year 1, $200 in year 2, ..., until the
// target has been reached
while (. . .)
{
year++;
. . .
balance = balance + amount;
}
System.out.println("Year: " + year);
System.out.println("Balance: " + balance);
}
}

Answers

The code is mentioned below.

What do you understand by programming?

It involves specifying a series of instructions for a computer to perform, using a programming language. The end goal of programming is to create software programs that automate tasks and solve problems for users.

Programming is a crucial part of the software development process, and it requires a combination of technical and creative skills. Programmers must have a strong understanding of algorithms, data structures, and computer systems, as well as the ability to think logically and solve problems. Additionally, they must be able to communicate their ideas effectively and collaborate with others to deliver high-quality software.

import java.util.Scanner;

/**

This program computes the time required to reach a target in a checking account

that starts with a balance of $0 and adds $100, $200, $300, etc. each year.

*/

public class Investment {

 public static void main(String[] args) {

   double balance = 0;

   int year = 0;

   Scanner in = new Scanner(System.in);

   System.out.print("Target: ");

   double target = in.nextDouble();

   // Add $100 in year 1, $200 in year 2, ..., until the

   // target has been reached

   while (balance < target) {

     year++;

     int amount = 100 * year;

     balance = balance + amount;

   }

   System.out.println("Year: " + year);

   System.out.println("Balance: " + balance);

 }

}

To know more about code visit:

https://brainly.com/question/29775307

#SPJ4

A month later into your work, you were conducting your weekly PC maintenance; you discovered that most of the laptops fell victim to the “Blue Screen of Death” errors. Apply your operating systems knowledge, to explain to the IT manager what could have caused this and what should be done to resolve the problem.

Answers

The "Blue Screen of Death" (BSOD) error is a critical system error that occurs when the operating system encounters a problem it cannot recover from. This can be caused by various factors such as a hardware malfunction, outdated drivers, malware or viruses, or conflicting software.

To resolve the problem, the following steps should be taken:

Check for hardware issues: It is important to ensure that all the hardware components are working correctly, including the hard drive, RAM, and graphics card.

Update drivers: Outdated or incorrect drivers can cause BSOD errors, so it is important to update all drivers to the latest version.

Scan for malware or viruses: Malware and viruses can cause serious system errors, so it is essential to perform a thorough scan of the system using anti-malware software.

Remove conflicting software: If any new software has been installed recently, it is possible that it may be conflicting with other software on the system. Uninstalling the conflicting software should resolve the issue.

Perform a system restore: If the above steps do not resolve the problem, a system restore to a previous point in time can help fix the issue.

In conclusion, the BSOD error can have various causes, but with the proper steps, it can be resolved. The IT manager should take a systematic approach to identifying the root cause of the problem and take the necessary steps to resolve it.

Answer:

70% of BSOD crashes are caused by third-party device drivers*. It seems likely that the computers affected took a bad driver update which is causing the crashes.

*Microsoft Windows internals: Microsoft Windows server 2003, Windows XP, and Windows 2000" by Russinovich, Mark E; Solomon, David A.

Find the floating point representation of 1/7. also include the binary representation for q and c.

Answers

The floating point representation of 1/7 in base 2 is 0.000110011001100110011001100110011 with q = -4 and c = 1/7 = 0.000110011001100110011001100110011.

What is the difference between the mantissa and the exponent in a floating point representation?

The mantissa, also known as the significand, represents the large digits of a number in a floating factor illustration. It represents the fractional a part of the wide variety and stages from 1 to much less than 2 in base 2. However, the exponent represents the magnitude of the variety inside the floating factor representation via transferring the decimal factor to the left or right. The exponent is a strength of 2 and shows the location of the decimal factor when it comes to the great digits in the mantissa. Collectively, the mantissa and exponent form a entire floating factor representation of various.

To know more about Mantissa visit: https://brainly.com/question/14789577

#SPJ4

true/false. copyright and trademark protection, protection of trade secrets select answer to both ideas and their expression.

Answers

Trade secrets are protected by intellectual property (IP) rights that can be licensed or sold.

What do trade secrets, copyrights, and trademarks mean?

Software that is an original work of authorship is protected by copyrights. Trademarks, such as a company logo, are words, symbols, or other designs that distinguish the source of goods. Trade secrets, which are pieces of confidential knowledge that offer its owner a competitive edge.

Does trade secret protection under copyright and trademark laws not include both ideas and their expression?

Contrary to copyright and trademark protection, trade secret protection encompasses: Trade secret protection covers both ideas and how they are expressed. This tort arises when a business manufactures, utilizes, or markets another's patented design, item, or method without the consent of the patent owner.

To know more about trademark copyright visit:

https://brainly.com/question/29994515

#SPJ4

Other Questions
Carlan grew up in a conservative culture with strict ideas about deference and hierarchy. When he was hired at his current company, he was uncomfortable with how casually even low-level employees communicated with the company's executives. Carlan had to work hard to reduce the formality of his communication style, but he did so to align with the company's values.Which principle of verbal communication is Carlan attentive to here? PLEASE HELP ITS TIMED!!! Whats the correct answer answer asap for brain list Which of the following is TRUE?a. Observational measures of well-being are now the most widely used assessment tool in most studies of happiness and life satisfaction.b. Unlike those in the United States, people in other Western industrialized nations report low levels of happiness (an average of 2 on a scale from 1 to 10).c. Most people in the United States report "above average" levels of happiness.d. Self-reports of subjective well-being change significantly over time. How do i do this?!?!?!! Please help! Dnde se puede encontrar la lectura inferencial? the expected number of each phenotype out of the 900 total offspring, and enter the values in the data table. 63=9k;6,7,8 with one is. it or am I doing this wrong mixing sand and gravel and knitting yarn into a scarf Read this excerpt from the dissenting opinion of Justice Louis Brandeis in New State Ice Co. v. Liebmann, and select the passage that characterizes how the federal system allows flexibility in dealing with local and regional issues."To stay experimentation in things social and economic is a grave responsibility. Denial of the right to experiment may be fraught with serious consequences to the nation. It is one of the happy incidents of the federal system that a single courageous state may, if its citizens choose, serve as a laboratory; and try novel social and economic experiments without risk to the rest of the country." the nurse is educating the parents of a 4-year-old boy with strabismus. teaching for the parents would include the: 1. abel, inc. just paid a dividend of $3 per share and you think they will continue to pay $3 per year indefinitely. if the appropriate discount rate is 10%, how much should the price of a share be? Which of the following descriptions accurately characterize immigration between 1860 and 1900?- America's prosperity and the prospect of political and religious freedom drew immigrants to the United States.- By 1900, the percentage of residents in major cities who were foreign-born had significantly increased.- Afraid that Americans would lose their jobs due to increased competition, fast-growing industries never encouraged immigration.- New immigrants were generally pessimistic about coming to America due to the lack of opportunities in the wake of the Civil War. A 1825 kg plane in a shallow dive accelerates at 7.6 m/s^2. What is the drag force on the plane if the forward force of gravity and thrust add up to 15,000 Newtons? What is the measure of the angle formed by Main Street and Park Street? a hallway display of energy is constructed in which several people pull on a rope that lifts a block 1.20 m. the display indicates that 0.95 j of work is done. what is the mass of the block? how, specifically, can customers evaluate the search qualities, experience qualities, and credence qualities of mbsc? one way the nurse remembers research information is with acronyms. which acronym represents the main sections of a research report in the correct order? a debt instrument indicating that a corporation has borrowed a certain amount of money and promises to repay it in the future under clearly defined terms is called a(n) the highlighted structure is an important clinical marker. what is its significance? matches up with the aorta