Create a flowchart that will accept 10 whole numbers one at a time and print the highest and the lowest. Use Switch.

Answers

Answer 1

I will create a sequence of steps that would accept 10 whole numbers one at a time and print the highest and the lowest in Java:

Import javax.swing.JOptionPane;

public class loop_exer2 {

public static void main(String agrs[])

{ String input; int trial=10, sc=0, h=0, l=0, test=0;

System.out.print("Scores: ");

for (int ctr=1;ctr<=10;ctr ) {

input=JOptionPane.showInputDialog("Enter the Scores [" trial "] trials "); sc=Integer.valueOf(input); System.out.print(sc ", ");

if(test==0){h=sc;l=sc;test=1;}

if(sc>h){h=sc;}

else if(sc>h){

h=sc; {

else if(sc<1) {

l=sc;

}

JOptionPane.showMessageDialog (null, "Highest score is:" h "Lowest score is:" l);
System.out.println();

System.out.println ("Highest score is: " h);

System.out.println ( "Lowest score is: "l);

}

}

What is a Flowchart?

This refers to a diagram which is used to represent the various steps which a system uses to create a step by step solution.

From the above code, there is the command to accept whole numbers in String and then request for them one at a time and after the computation, display the highest and lowest numbers.

Read more about flowcharts here:
https://brainly.com/question/6532130


Related Questions

A file named "dogs. Txt" exists and has 60 lines of data. You open the file with the following line of code.

aFile = open("games. Txt", "W")

You write 10 lines to the file in the program. How many lines are in the file when you close your file?

Answers

The wc command can be used to determine a file's line, character, word, and byte counts. We add the -l option to wc in order to count the number of lines. This will provide the file's name and the total amount of lines.

What lines are in the file when you close your file?

This is the simplest method for counting the lines in a text file in Python. Read all lines from a file and save them in a list using the readlines() function.

The length of the list, which is simply the total number of lines in a file, may then be determined using the len() function.

To see a file's initial few lines, use the head command. The head command will only print the first 10 lines by default. The coreutils package.

Therefore, already installed on our machine, is included with the head command. Be aware that spaces, tabs, and newlines all count as additional bytes.

Learn more about file here:

https://brainly.com/question/16379582

#SPJ2

What should you do when you are working on an unclassified system and receive an email.

Answers

Answer:

Don't respond to it. Either leave it there, or just delete it. It is most likely spam or a scammer trying to get your information. Don't respond, please.

Part 1: Plan and Write the Pseudocode

Use the following guidelines to write your pseudocode for a fill-in story program.
1. Decide on a list of items the program will ask the user to input.
2. Your program should include at least four interactive prompts.
3. Input from the user should be assigned to variables and used in the story.
4. Use concatenation to join strings together in the story.
5. Print the story for the user to read.

Answers

Coding:

def main():

 name = input("Enter your name: ")

 age = input("Enter your age: ")

 color = input("Enter you favorite color: ")

 birth = input("Enter your birthday: ")

 print(name + " is "+age+" year(s) old.")

 print(name + "'s favorite color is "+color)

 print(name + " was born on "+ birth)

main()

Explanation:

Pseudocode is a generic way of writing an algorithm, using a simple language (native to whoever writes it, so that it can be understood by anyone) without the need to know the syntax of any programming language.

Imagine that a school decided to use a database to track television shows that students are watching. What would be some of the advantages and disadvantages of tracking students in this way? what is something to type? please hurry

Answers

Answer:

It would cause a discussion upon privacy and the validity of the information

There is also the variable of watching multiple tv shows consecutively on one day. Hope this helped

Explanation:

What is.the web usually called?

Answers

Answer:

the internet?

Explanation:

What is the value of sum after the code segment is executed?

Answers

Answer:

16

Explanation:

16  is the value of the sum after the code segment is executed.

What is a code segment?

An encryption method in computation is a chunk of a file or the equal area of the virtual addresses of the program that includes active instructions. It is sometimes referred to as a text or plain text.

An executable section of a memory chip designated to a certain operation is referred to as a function code segment. The implementation of Process Conferred Verification compares.

Let's follow the plan for the segment of the code that is to be executed in this particular if and else execution.

6 < 4 will be termed False

The following will take place

num3=num2=4

So,

num2 >= num 3 will be termed False

There is no other statement available

Currently, the values are

num1=6

num2= 4

num3= 10

Sum=

= 6+2+ 10

= 16

Learn more about  code segment, here:

https://brainly.com/question/30592934

#SPJ3

I need help please I just need the code to pass

Answers

Answer:

I don't know where is a code on your computer so sorry. :(

Explanation:

How has the Internet of Things affected business

Answers

Answer:

With better information about the consumers and the market, the productivity of any business can be increased notably. IoT devices can be connected to each other and controlled to improve efficiency, which in turn has direct effects on the productivity of the business. More can be done in less time.

Explanation:

Answer: Business equipment can be continually adjusted based on analysis of data

Explanation: Took the test.

how do i use marketing in my everyday life

Answers

1. Subscribe to more emails
2. Look at billboards
3. Stop muting those pesky commercials
4. Listen to music
5. Step away from your work

Which command prints partial or full environment variables?.

Answers

Answer:

printenv command

The command that prints partial or full environment variables is known as "printenv" command.

How can one print all the variables of the environment?

One can definitely print all the variables of the environment with the help of using env command. This env command is generally utilized by shell scripts in order to launch the correct interpreter but you can also use the env command to list available environment variables.

The env command if applied without any arguments and options, will print all the available environment variables. Apart from this, the env command also displays the values of environment variables specified in the context of the question.

Therefore, the "printenv" command is a type of command that prints partial or full environment variables.

To learn more about Computer commands, refer to the link:

https://brainly.com/question/25808182

#SPJ2

Your question seems incomplete. The most probable complete question is as follows:

Which command prints partial or full environment variables?

printenv.printvar.printgov.

You can tell that parseInt() is a(n) ____ method because you use it with the class name and not with an object.

Answers

Parse Int() is a(n) static method because you use it with the class name and not with an object.

Is parseInt a static method?

The term or computer language (Java - parse Int() Method) is known to be a method that is often used to get back the primitive data type of a particular String.

Conclusively, the  parse Xxx() is known to be a static method and one can use it to make or have one or more argument.

Learn more about object from

https://brainly.com/question/24445340

3. credence is a student in college.
a. what hardware tool would you suggest for his computing system? include an explanation and the cost.

b. what software program would you suggest? include an explanation and the cost.


c. what operating system might you suggest (mac, windows, ios, android, etc) and why?

Answers

Answer: Hardware info this is a free software to read your CPU RAM GPU temp and usage

i would suggets get win rar as a zip un packer and its free

Windows 10, easy to work with and its free

Explanation:

There are they mainly are the suggested the computer system are the RAM, CPU, are the add-on the cost. Adobe, was the mainly in the used are the no cost was the included. Windows 10, was the repeatedly in the used are the easy.

What is computer?

The term computer refers to the main work of the input, processing, and the output. The computer was the based on the binary language as the data was the converted to the human language. The computer was the great invention. The computer is the mostly in the used are the main purposes.

Hardware was the main tool in the computer they are the mainly in the RAM, CPU, are the usage was the add-on the cost. The best software program was the Adobe is the best software there are the no cost was the included. The Windows 10 was the easy to use and the systematically programme.

Learn more about on computer, here:

https://brainly.com/question/21080395

#SPJ5

_________ attacks include eavesdropping on network traffic between browser and server and gaining access to information on a Web site that is supposed to be restricted

Answers

Answer:

Passive attacks

Explanation:

A passive attack can listen to network traffic but does not interact with the packets.

Hope this helps :)

What is the type of data in the list [103, 405, 527, 396, 503]?

A.
Booleans
B.
strings
C.
integers
D.
alphanumeric

Answers

D. Alphanumeric.

Alphanumeric, also known as alphameric, simply refers to the type of Latin and Arabic characters representing the numbers 0 - 9, the letters A - Z (both uppercase and lowercase), and some common symbols such as @ # * and &.

Hope Helps! :)

Gabriel wants brain food for dinner the night before his final exam. What is best for him to eat? fried chicken and onion rings burgers and ice cream pizza and cookies grilled chicken and vegetables.

Answers

This is a good inquiry, especially applicable to the study of computers and technology.
It sounds like a prediction problem, in terms of measuring multiple variables calculating their betas and outputting the probability of choosing the following given we have a final the next day.

So let’s start by declaring variables for our model:

Calories: quantitative variable
Consumption time: time to eat the given food also quantitative
Cooking time: quantitative
Baking necessary: categorical 0 = no 1 = yes
Frying necessary: categorical 0 = no 1 = yes
Satisfaction brought: quantitative
Healthy: categorical 0 = no 1 = yes

Now create a data table for implementing our multinominal logistical regression function
I’ll be using 1 serving size for each measure
Fried chicken and onion rings
Cal: 320 (half chicken) + 240 (9 rings) = 560
Consumption time: 10 minutes (avg of sampling data with SD of 2.1 minutes)
Cooking time: 90 minutes + 20 minutes = 110 minutes (based on compiled recipes)
Baking: 0
Frying: 1
Satisfaction(max 10): 9 (-1 for oiliness)
Healthy: 0

Burgers and ice cream
Cal: 354 + 137(1/2 cup) = 491
Consumption time: 8 (mean with sd of 3.2)
Cooking time: 23 minutes (recipe) + 30 minutes (travel time to store and from) = 53 minutes
Baking: 0
Frying: 0
Satisfaction(max 10): 10
Healthy: 0

Pizza and cookies
Cal: 570 (2 slices) + 142 (1 cookie) = 712
Consumption time: 9 minutes (avg of sampling data with SD of 1.3 minutes)
Cooking time: 50 minutes + 72 minutes = 122 minutes (based on compiled recipes)
Baking: 1
Frying: 0
Satisfaction(max 10): 8 (not lactose intolerant friendly)
Healthy: 0

Grilled chicken and vegetables (roasted)
Cal: 162 (chicken breast) + 147 (1 cup) = 309
Consumption time: 9 minutes (avg of sampling data with SD of 1.46 minutes)
Cooking time: 30 minutes + 45 minutes = 75 minutes (based on compiled recipes)
Baking:1
Frying: 0
Satisfaction(max 10): 6 (cause chicken breast is dry and vegetables are nasty)
Healthy: 1

Now to develop our prediction model.
With training and validation data I was outputted the following beta coefficients.

X-int = 2.74
B1: -2.35 with p value of 0.002
B2: -0.72 with p value of 0.038
B3: -0.6 with p value of 0.047
B4: -1.2 with p value of 0.371
B5: -0.81 with p value of 0.016
B6: 2.91 with p value of 0.000
B7: 0.2 with p value of 0.007

Now building our prediction model we combine beta values with their coefficients then take e^x of each of the given options to find the probability of choosing each.

Answer:

Grilled Chicken and Vegetables

Explanation:

these are the two healthiest options for you body and mind


Explain the Paragraph tag and its attributes.

Answers

Answer:

Attribute Value Description

align left right center justify Obsolete Specifies the horizontal alignment of the text within a paragraph. Use the CSS text-align property instead.

How can I log Into the instagram app if this pop up appears?

Answers

Answer:

tou sex die sojdifnfidjd7dhubdud

You could try changing your password

1.5 code practice question 4

Answers

Answer:

Do you know what the question is for this?

Explanation:

Do you know What the question is?

Despite how well you might take care of your computer, problems can always arise. When troubleshooting problems you encounter, at what point should you engage a professional for assistance

Answers

You should engage a professional for assistance when you encounter internal hardware issues during troubleshooting.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output (information) that could be used by an end user.

Generally, an end user should always engage a professional for assistance when internal hardware components of a computer are faulty.

Read more on computer here: brainly.com/question/959479

A _____ monitors the characteristics of a single host and the events occurring within that host for suspicious activity.

Answers

Answer:

A host-based intrusion prevention system is a type of IDPS that monitors characteristics of a single host and the events occurring within that host for suspicious activity (NIST SP 800-94, February 2007; p.9). Page 3 National Archives and Records Administration

Explanation:

What is the relationship of temperature to density?

Answers

Answer:

Density is directly proportional to pressure and indirectly proportional to temperature. As pressure increases, with temperature constant, density increases. Conversely when temperature increases, with pressure constant, density decreases.

How does iteration help the engineering design process?

A.
It lets engineers know how to complete their experiments.

B.
It provides proof positive that an engineer’s plan will work.

C.
It encourages engineers to revisit past steps in the process.

D.
It ensures that all ideas or discoveries are communicated clearly.

Answers

The way that iteration helps the engineering process is that; C.

It encourages engineers to revisit past steps in the process.

What is the importance of the iteration process?

The engineering design process contains a series of steps that helps engineering teams in solving problems.

When we say that design process is iterative, it means that we repeat the steps as many times as required, by making improvements along the way as we learn from previous failure and uncover new design possibilities that help us to arrive at great solutions.

Read more about iteration at; https://brainly.com/question/24793921

What is meaning of lunch bar

Answers

A lunch bar is a restaurant where the public may purchase cold meals in containers, cold wrapped sandwiches, drinks, or items retrieved through coin operated compartments for consumption on or off the premises.

A Flexible Manufacturing System (FMS) is able to efficiently adapt to changing
needs.
Which of the following developments in the manufacturing industry is said to have
directly contributed to FMS technology?

Answers

Answer:

easily adapt to changes in the type and quantity of the product being manufactured

Explanation:

Determine if the given software is system software or application software.

Answers

Answer:

system software: system software maintain the system resource and give the path for application software to run

application software: application software is built for specific task

Explanation:

if you think the answer in your opinion correct then mark me as brain list

Answer:

I believe this to be the answer to the question you refer.

Explanation:

System software:

-data recovery

-macOS

Application software:

-presentation

-spreadsheet

Answers are cut short for convenience so do not worry if they are not the exact same answers from your question.

Also, if these answers do not even apply to your question then you have a different question. Good luck.

Consider the following code, which is a portion of SomeClass. The instance variable is initialized by the constructor. The method is supposed to multiply the value passed as a parameter by the instance variable and update the value of the instance variable. However, there is a problem. Re-write this code, without renaming any variable names, to resolve the problem.

private int number;

public void multiplyNumbers(int number)

{

number = number * number;

System. Out. Println("The local variable is: " + number);

System. Out. Println("The instance variable is: " + number);

}

Answers

Use the knowledge of computational language in JAVA to write a code which is a portion of SomeClass.

How to write code that uses a file?

To make it simpler the code is described as:

SomeClass

private int number;

public void subtractNumbers(int number)

{

   number = number − number;

   System.out.println("The local variable is: " + number);

   System.out.println("The instance variable is: " + number);

}

See more about Java at  brainly.com/question/2266606

Answer:

Correct code (For everyone confused):

private int number;

public void multiplyNumbers(int number) {

 this.number = this.number * number;
 System.out.println("The local variable is: " + number);
 System.out.println("The instance variable is: " + this.number);

}

Explanation:

the this. command allows the instance variable of the class to be called instead of the variable in the constructor which as shown can stay the same while still changing the instance variable of the same name. Allowing for the code to be, say if int number was 5. Then the instance variable would be, 5 + 5, which would print:

The local variable is: 5
The instance variable is: 10

Special web browsers, called _______ browsers, are designed to run on portable devices such as smartphones and tablets

Answers

Answer:

Special web browsers, called mobile browsers, are designed to run on portable devices such as smartphones and tablets

Special web browsers, called mobile browsers, are designed to run on portable devices such as smartphones and tablets.

Mobile browsers are web browsers specifically optimized and designed to operate on portable devices such as smartphones and tablets. These browsers are tailored to meet the unique requirements and constraints of mobile devices, including smaller screens, touch-based input, and limited processing power.

Mobile browsers offer a user-friendly interface that accommodates the smaller screen size of mobile devices, allowing users to navigate websites and access web content efficiently. They often incorporate features like pinch-to-zoom, gesture-based controls, and responsive design support to enhance the browsing experience on mobile devices

To learn more on Mobile browsers click:

https://brainly.com/question/19561587

#SPJ6

Question 38 of 40
What is efficiency?
A. Doing more than one task at a time
B. The activity of selecting what to do next
C. A measure of output for any given project, task, or activity
D. The ability to do something well without wasted time or effort

Answers

Answer:

The answer should be d i think.

what is meant by internet surveillance?....ONLY ANSWER IF YOU KNOW​

Answers

Answer:

As a brief definition, Internet surveillance refers to your computer and online activity, online and offline data, and Internet traffic being monitored and logged by government agencies, ISPs, and – potentially – cybercriminals.

Explanation:

can I have brainliest

Answer: I LIKE EM BIG AND JUCIY

Explanation:

difference between manual formatting and formatting in word processor​

Answers

Editing refers to making quick modification to a document using editing tools such as find and replace spelling and grammar checkers, copy and paste or undo redo features.

Formatting refers to changing the appearance of text in a document such as text formatting or page formatting or paragraph formatting.

Other Questions
A force is applied to a box to move it to the right across the kitchen floor what forces are being used? question is attached thank you so much 100-475.50 Point I is on line segment HJ. Given HJ = 15 and IJHI.10, determine the length Suppose you won 10,000,000 in the lottery.How much do you think you will have to pay in taxes?How did you determine this? A student is studying a sample of carbon dioxide gas inside a small syringe. At constant temperature the syringe has a volume of 89. 6 ml at a pressure of 3. 00 atm. When the syringed is expanded to a volume of 215 ml, what is the new pressure inside the syringe?. _____is an ancient picture writing. (A)hieroglyphic(B)Graffiti(C)An artifact(D)hydrofoil Choose the correct option.How much profit was generated by the sales ofGold Label and Black Label combined?Number Average Average Aof Price ProfitProduct Bottles (per (perbottle) bottle)Range SoldRedLabel3,000$10.00$1.12BlackLabel2,000$16.00$1.50GoldLabel1,000$17.50$2.75 The length of a rectangular parking area is two times the width. The perimeter is 90 ydFind the length and width of the parking area. Why does Hemingway end "In Another Country with the doctor placing photographs depicting restored hands by the major's machineand the narrator stating that the men are the first to use the machines?Select the two correct answers.It implies that the major continues to use the machines because it is the only hope he has left.It raises doubt about the doctor's honesty and the effectiveness of the machines.It evokes sympathy in readers about the outcome of the major's and the narrator's rehabilitation.It shows that the narrator isn't fooled by the doctor's statement that he will be able to play football again. What if the vertices of the county were (-5,8), (8,8), (8,-6), and (-5,-6)? What would the perimeter of the county be? Professor Etheridge, a faculty member at Allstate University, wants to require her students to read an article from National Geographic Magazine as part of her course. National Geographic is a well-known magazine that publishes multiple scientific articles in each issue. The article Professor Etheridge wants to use is approximately 15 pages long and is not available in the University Library. So, Professor Etheridge decides to make 20 copies of the article, enough for each one of her students, and provides the article to each student free of charge. Has Professor Etheridge violated copyright law? Why or why not? Pls answer i will mark u brainlist Identify the mistake and write down the correct answe 2/5 + 1/3 = 3/8 Find the value of x. Then , find the measure of each angle. Your uncle has asked you to tell him about educational admission so that he may assist you write a letter to him thanking him and giving him details of your plans. someone help me please HELP ME PLZZ I NEED HELP WITH THIS!!! can somone help me out what are some examples of satire in the short story Rip Van Winkle ?