Answer: Circle class representing circle objects which have a radius, center x, and center y. It included overlaps and draw methods. Then, we wrote a Colorfulcircle class which included a Color property and overrode the draw method of Circle. For this assignment, you are asked to create a ColorfulBouncing circle class. Begin with the versions of Circle and ColorfulCircle uploaded to Canvas ColorfulBouncingCircle should extend ColorfulCircle, Unlike the other Circle classes, it will include a velocity for the x and y axes. The constructor for ColorfulBouncingCircle includes these parameters: public colorfulBouncingcircle (double radius, double centerx, double center Color color, double xVelocity, double yvelocity) Note that we are treating x as increasing to the right and y as increasing down, as with Java's graphics coordinates system. This was also seen with Circle's draw method. ColorfulBouncingCircles will bounce around in a playing field which the tester will provide. The Colorful Bouncinesicle class should have a public static method to set the playing field width and height: public static void setPlayingFieldsize (double newwidth, double newHeight) ColorfulBouncingCircle will also include a method which should alter its center and center with each time tick (similar to a metronome's noise guiding a musician to play a song). The circle's x position should be altered according to x velocity and y position according to y velocity. However, before changing the positions, check if the center position would, after moving, be either less than 0 or greater than the playing field dimensions. If so, instead of changing the center position, alter the velocity. If the ball hits the top or bottom, the sign of its vertical velocity should be flipped: if it hits the left or right, its horizontal velocity sign should be flipped. If it hits a corner, both should be. Notice that velocity may be positive or negativel The tick method which will be called by the tester is defined in this way:
public void tick() Finally, we should override the overlaps method to make balls bounce away from each other. You should call the super method to see if your circle overlaps another circle. If so, alter this circle's velocity according to its center relative to the other circle. If this circle" is above or below the "other circle," flip the sign of "this circle's" vertical velocity. If it's to the left or right, flip the horizontal velocity As before, both may be flipped. This is NOT the same as a true elastic collision, but it should be simpler for you to implement. The sign flipping will sometimes cause the balls to "vibrate" when caught between each other. Please review the velocity changing rules carefully; they are easy to get wrong!! To review: Write the ColorfulBouncineCircle class, where you should write the constructor setPlayingfield Size, and tick methods, and override the overlaps method, each according to the above descriptions. You should not have to write any code which draws; instead, a test program will be provided which will animate ColorfulBouncingCircles based on your implementation. For every time tick, the test program will compare every circle against every other circle using the overlaps method. The test program will ask you to press Enter in the console to launch the automated tests which will assign a tentative score based on your implementation. DO NOT ALTER the Circle OR Colorful Circle files!!
Explanation:
When using IPsec, how can you ensure that each computer uses its own private key pair?
Answer:
By using digital certificates.
Explanation: Digital certificate are used for the following:
1) Digital certificates are used in public key cryptography functions; they are most commonly used for initializing secure SSL connections between web browsers and web servers.
2) Digital certificates can also be used for sharing keys to be used for public key encryption and authentication of digital signatures.
9) If you are working on the part of 5-15 minutes, time-stamping (every 30 seconds) should start at: a) [00:05:00] b) [00:00:00] c) [00:00:30] d) [00:05:00] e) [00:00:00]
Answer:
a) [00:05:00]
Explanation:
Timestamps are markers in a transcript which are used to represent when an event took place. Timestamps are in the format [HH:MM:SS] where HH is used to represent hour, MM to represent the minute and SS to represent the seconds. They are different types of timestamping such as:
i) Periodic time stamps: Occurs at a consistent frequency
ii) Paragraph time stamping: At the beginning of paragraphs
iii) Sentence time stamp: at the beginning of sentence
iv) Speaker time stamp: at change of speaker.
Since a part of 5-15 minutes with time-stamping (every 30 seconds), The time stamping should start at 5 minute [00:05:00] and end at [00:15:00]. This is a periodic time stamp since it occurs every 30 seconds, this means the next time stamp would be [00:05:30] and this continues until 15 minute [00:15:00]
Based on the information given, the time stamping will be A. [00:05:00]
It should be noted that timestamps simply mean the markers that we in a transcript that are used to represent when an event took place.
They are typically in the format [HH:MM:SS]. Therefore, if you are working on the part of 5-15 minutes, time-stamping (every 30 seconds) should start at 00:05:00.
Learn more about time on:
https://brainly.com/question/4931057
Using C++, complete function PrintPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 2, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bagOunces followed by "seconds". End with a newline. Example output for ounces = 7:42 seconds1 #include 2 using namespace std; 34 void PrintPopcornTime(int bagOunces) { 56 /* Your solution goes here */ 78 } 9 int main() { 10 int userOunces; cin >> userOunces; 11 PrintPopcornTime12 13 return 0; 14 }
Answer:
#include <iostream>
using namespace std;
void PrintPopcornTime(int bagOunces) {
if(bagOunces < 2)
cout << "Too small" << endl;
else if(bagOunces > 10)
cout << "Too large" << endl;
else
cout << 6 * bagOunces <<" seconds" << endl;
}
int main()
{
int userOunces;
cin >> userOunces;
PrintPopcornTime(userOunces);
return 0;
}
Explanation:
Inside the function PrintPopcornTime, check the parameter bagOunces using if structure. Depending on the value of bagOunces, print the required information.
Inside the main, ask the user for the userOunces. Call the PrintPopcornTime function with the userOunces.
Namecoin is an alternative blockchain technology that is used to implement decentralized version of Routing Banking System.A. TrueB. False
Answer:
False
Explanation:
Namecoin is a type of crypto currency which was originally pronged from Bitcoin software. It is coded in the fashion of Bitcoin with the same algorithm as well. Hence it is not a blockchain technology that is used to implement decentralized version of Routing Banking System. Namecoin can store data within its own blockchain transaction database.
katie typed a paper using microsoft word. microsoft word is a type of
Answer:
Word Processor
Explanation:
it is called word processor
If your computer won't connect to the internet, which of these is most likely to be the problem?
RAM
ROM
ONIC
O USB
Answer:
nic is the answer... .. .
Consider the following Python program. fin = open('words.txt') for line in fin: word = line.strip() print(word) What is word?
a. A file object
b. A list of characters
c. A list of words
d. A string that may have a newline
e. A string with no newline
Answer:
(c) A list of words
Explanation:
First let's format the code properly
fin = open('words.txt')
for line in fin:
word = line.strip()
print(word)
Second, let's explain each line of the code
Line 1:
The open() function is a built-in function that takes in, as argument, the name of a file, and returns a file object that can be used to read the file.
In this case, the name of the file is words.txt. Therefore, the variable fin is a file object which contains the content of the file - words.txt
Line 2:
The for loop is used to read in each line of the content of the file object (fin).
Line 3:
Each line of the contents is stripped to remove any trailing and leading white spaces by calling on the strip() function. The result of the strip is stored in the variable word.
Line 4:
The content of word at each of the cycles of the loop is printed to the console.
Therefore, the overall output of the program is a list of words where each word represents a line in the target file (words.txt)
The program is an illustration of string manipulations.
word represents (e) A string with no newline
The program is given as:
fin = open('words.txt')
for line in fin:
word = line.strip()
print(word)
On line 3 of the program, the variable word contains the value of the string line, after the new lines and trailing spaces have been removed from the variable line.
This means that: variable word is a string with no newline
Read more about similar programs at:
https://brainly.com/question/7238365
A _________ level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced. studylib
Answer:
Moderate.
Explanation:
A breach of security can be defined as any incident which results in an unauthorized access or privileges to a network, computer, software application, classified informations or data and services. There are three (3) levels of impact on an individual or organization when there's a breach of security; low, moderate and high.
A moderate level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced. It causes a serious adverse effect on individuals, employees or organizational assets and operations.
However, in order to prevent a breach of security, it is advisable to use the following programs: firewall, demilitarized zone (DMZ), Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) etc.
What is the output of the following code?
int main() {
int x = 10; int y = 30;
if (x < 0) {
y = 0;
}
else if (x < 10) {
y = 10;
}
else {
y = 20;
}
cout << y;
return 0;
}
Select one:
a. 0
b. 10
c. 20
d. 300
Answer:
c. 20
Explanation:
The program works as following:
x is initialized to 10
y is initialized to 30
if (x < 0) statement checks if the value of x is less than 0. This condition evaluates to false because x=10 so 10 is greater than 0. So the statement inside the body of this if condition will not execute. Hence the program control moves to the else if part:
else if (x < 10) statement checks if the value of x is less than 10. This condition evaluates to false because x=10 so x is equal to 10 and not less than 10. So the program control moves to the else part and the statement in else part executes:
else {
y = 20;
}
This statement in else part assigns the value 20 to y
Then the program control moves to the following statement:
cout << y;
This statement prints the value of y. As the else part assigns 20 to y so the output is:
20
Components that enhance the computing experience, such as computer keyboards, speakers, and webcams, are known as
Answer:
- Peripheral devices
Explanation:
Peripheral devices are defined as computer devices which are not the element of the essential/basic computer function. These devices can be internal as well as external and are primarily connected to the computer for entering or getting information from the computer. For example, the keyboards or mouse functions to enter data into the computer for processing and receiving information while the output devices like speakers, projectors, printers, etc. are used to get the information out of the computer.
An organization is trying to decide which type of access control is most appropriate for the network. The current access control approach is too complex and requires significant overhead Management would like to simplify the access control and provide user with the ability to determine what permissions should be applied to files, document, and directories. The access control method that BEST satisfies these objectives is:________
A. Rule-based access control
B. Role-based access control
C. Mandatory access control
D. Discretionary access control
Answer: D.) Discretionary access control
Explanation: Access control modes provides networks with a security system used for moderating, risk prevention and privacy maintainance of data and computing systems. Several access control modes exists depending on the degree of control required. In the discretionary access control approach, users are afforded the freedom and flexibility of making choices regarding permissions granted to programs. Hence, in this mode, permission are user-defined and as such sets privileges based on how the user deems fit.
With _____, devices embedded in accessories, clothing, or the users body and connect to the internet of things to process and store data.
Answer:
Wearables
Explanation:
Wearables is a term that describes some certain forms of electronic devices that are embedded in accessories, clothing, or the user's body and connect to the internet of things to process and store data. For example fitness tracker, body-mounted sensor, etc. It is sometimes referred to as Wearable Technology
Hence, the correct answer to this question is simply termed WEARABLES.
What is the fastest way to move data over long distances using the internet, for instance across countries or continents to your Amazon S3 bucket?
Answer:
Assuming you are using the AWS CLI to upload data to s3, there are two optimizations to increase the speed:
1) Parallel chunked uploading, which uploads your (large) file in chunks in parallel.
2) use Amazon S3 Transfer Acceleration
This will upload your file to a nearby CloudFront instance
You can enable this in your CLI configuration file, named config in the .aws folder. Add the following lines:
s3 =
max_concurrent_requests = 20
max_queue_size = 10000
multipart_threshold = 64MB
multipart_chunksize = 16MB
max_bandwidth = 100MB/s
use_accelerate_endpoint = true
addressing_style = path
Write an expression to print each price in stock prices.
Sample output with inputs:
34.62
76.30
85.05
# NOTE: The following statement converts the input into a list container 2 stock_prices - input().split() 5 4 for "solution goes here": print('s', price) Run TL
Answer:
The program written in python is as follows
prices = "34.62 76.30 85.05"
stock_prices = prices.split()
for price in stock_prices:
print('s', price)
Explanation:
This line initialized the input prices using a string variable named prices
prices = "34.62 76.30 85.05"
This line converts prices to list
stock_prices = prices.split()
The following iteration prints each element of the list
for price in stock_prices:
print('s', price)
Your team will write a function that reverses a C-string, to practice using pointers. You must use pointers and C-strings for this lab, not string objects. Your program should ask for the user's input, as "Enter the original string: " Then, it should print out the reversed string to the console.
Answer:
Here is the C++ program:
#include <iostream> //to use input output functions
#include<string.h> // to manipulate strings
using namespace std; //to identify objects like cin cout
void ReverseString(char* original_str){ // function that reverses a C-string
char* ptr1 = original_str; // pointer that points to the start of C-string
char* ptr2 = original_str; // pointer that points to the start of C-string initially
for (int i = 0; i < strlen(original_str)- 1; i++) {//iterates through the length of the C-string
ptr2++;} //moves ptr2 to the end of the C-string
while(ptr1 < ptr2) {// swaps each character of C-string using pointers
char temp = *ptr1; //declares a temp variable to hold character that *ptr1 points to
*ptr1 = *ptr2;
*ptr2 = temp;
ptr1++; //increments ptr1 moving it forward
ptr2--; }} //decrements ptr2 moving it backwards
int main(){ //start of main() function
char input_str[]=""; /// declare a C-string
cout<<"Enter original string: "; //prompts user to enter a string
cin>>input_str; // reads that C-string from user
ReverseString(input_str); //calls function to revserse the input string
cout<<"\nReversed string: "<<input_str;} // displays the reversed string
Explanation:
The program has a function ReverseString that takes a C-style string as parameter and reverses the string using pointers.
The ptr1 and ptr2 are pointers that initially point to the beginning of original string.
for (int i = 0; i < strlen(original_str)- 1; i++) this statement has a for loop that iterates through the original string and moves the ptr2 to point at the end or last character of the C-string. strlen() method is used to get the length of the C-string. At each iteration ptr2 moves one time forward until the last character of the C-string is reached.
while(ptr1 < ptr2) statement has a while loop that works as follows:
checks if ptr1 is less than ptr2. This evaluate to true because the index of first character that ptr1 points to is 0 and last character is 5 so 0<5. Hence the statements inside while loop execute which swaps the character of C-string from beginning and end index using ptr1 and ptr2. a temp variable is declated to hold character that *ptr1 points to.
For example
original_string = "xyz" Then temp = *ptr1; stores the character that *ptr1 points to i.e. 'x'
*ptr1 = *ptr2; This statement assigns the character that *ptr2 points to the *ptr1. Basically these pointers are used as indices to the C-string. So this means that the *ptr1 now stores the last character of the C-string that is pointed to by *ptr2. So *ptr1 = 'z'
*ptr2 = temp; This statement assigns the character that temp stores to the *ptr2. We know that temp contains the first character i.e 'x'. So *ptr2 = 'x'
ptr1++; The ptr1 is incremented to 1. This means it moves one position ahead and now points to the second character of the C-string.
ptr2--; The ptr2 is decremented to 1. This means it moves one position backwards and now points to the second character of the C-string.
Now the while loop breaks because ptr1 < ptr2 condition evaluates to false.
So the original string is reversed using pointers. Hence the output is:
zyx
screenshot of the program along with its output is attached.
Many clustering algorithms that automatically determine the number of clusters claim that this is an advantage. List two situations in which this is not the case
Answer:
The list of those two situations is given below.
Explanation:
Case 1:
Yet another condition for manual cluster formation that wasn't an improvement would be whenever the number of observations measured is higher than even the machine can accommodate.
Case 2:
The second scenario which isn't an improvement whenever the original data is recognized for automated cluster analysis, and therefore also implementing the algorithms doesn't generate any extra details.
I’m having issues with My app Mobile legends bang bang it keeps saying now reconnecting and keeps failing how do you fix The issue
What is an electric spike? an event in which electricity coming into a device exceeds 120 volts for three or more nanoseconds an event in which electricity coming into a device exceeds 120 volts for one or two nanoseconds an event in which electricity coming into a device exceeds 140 volts for five nanoseconds an event in which electricity coming into a device exceeds 140 volts for six nanoseconds
Explanation:
Our technological world has become deeply dependent upon the continuous availability of electrical power. In most countries, commercial power is made available via nationwide grids, interconnecting numerous generating stations to the loads. The grid must supply basic national needs of residential, lighting, heating, refrigeration, air conditioning, and transportation as well as critical supply to governmental, industrial, financial, commercial, medical and communications communities. Commercial power literally enables today’s modern world to function at its busy pace. Sophisticated technology has reached deeply into our homes and careers, and with the advent of e-commerce is continually changing the way we interact with the rest of the world. Intelligent technology demands power that is free of interruption or disturbance. The consequences of large-scale power incidents are well documented. A recent study in the USA has shown that industrial and digital business firms are losing $45.7 billion per year due to power interruptions.1 Across all business sectors, an estimated $104 billion to $164 billion is lost due to interruptions with another $15 billion to $24 billion due to all other power quality problems. In industrial automatic processing, whole production lines can go out of control, creating hazardous situations for onsite personnel and expensive material waste. Loss of processing in a large financial corporation can cost thousands of unrecoverable dollars per minute of downtime, as well as many hours of recovery time to follow. Program and data corruption caused by a power interruption can create problems for software recovery operations that may take weeks to resolve. Many power problems originate in the commercial power grid, which, with its thousands of miles of transmission lines, is subject to weather conditions such as hurricanes, lightning storms, snow, ice, and flooding along with equipment failure, traffic accidents and major switching operations. Also, power problems affecting today’s technological equipment are often generated locally within a facility from any number of situations, such as local construction, heavy startup loads, faulty distribution components, and even typical background electrical noise
Hey There!!~ I think the best answer is A). An event in which electricity coming into a device exceeds 120 volts for three or more nanoseconds an event in. Because, An unexpected increase in the amplitude of a signal that lasts for two or less nanoseconds anything more is considered a surge. If not properly protected, a power spike can cause damage to any electrical component, including a computer. And, All electrical devices, including your computer, should have a surge protector to help prevent them from becoming damaged when an electrical surge occurs.
Hope This Helps....!!~
What is FCC Part 15, Subpart C Section 15.203, and how does it affect outdoor bridging with WiFi?
Answer: provided in the explanation section
Explanation:
FCC is the abbreviation for The Federal Communications Commission (United States Federal Communication Commission). It is, as a rule, an administrative area. It is a free Federal administrative office of the United States government dependable straightforwardly to Congress, built up by the Communications Act and made by resolution to manage interstate and worldwide interchanges by radio, TV, wire, satellite, and link. It includes an investigation on pending changes in the remote world.
FCC certainly has consequences for the present status of 5 GHz Bridging Spectrum. As far as possible one of the U-NII groups which can be utilized outside with the 5.725-5.825 band which is perfect fitting open air tasks. The 2.4 GHz ISM band might be utilized outside where the yield power at the purposeful radiator can't surpass 1 watt. In the United States, the FCC manages the frequencies utilized, the yield power levels, and the open air utilization restrictions.
There is an effect of the FCC 5 GHz U-NII report and a request on Wi-Fi Networks. FCC's activities are to change some specialized principles for the 5 GHz U-NII groups. The specialized change that is affirmed is - U-NII 1 band (5.150 - 5.250 GHz) indoor activity limitation being evacuated permitting utilization of the band for open air hotspots, WISPs, and scaffold joins. There will be a development of open hotspots profiting by this change. The FCC considers 11 channels under the Operating Frequencies.
The FCC has characterized UNII-2 and UNII-3 groups, the two of which had four channels. The channels were divided 20 MHz separated with a RF range data transmission of 20 MHz giving non-covering channels utilizing 20 MHz channel width.
The UNII-2 band was assigned additionally for open air tasks and allowed outside recieving wires. The UNII-3 band was proposed for open air connect items and allowed outer radio wires, however the UNII-3 band is likewise utilized for outside 802.11a/n/air conditioning WLANs.
FCC (America) underpins Operating Frequency Range for 802.11b and 802.11g on Center Frequency: 2412, 2417, 2422, 2427, 2432, 2437, 2442, 2447, 2452, 2457, 2462. FCC has delivered an amendment to the guidelines covering the 5 GHz 802.11a channel utilization. This correction has included 11 extra channels, carrying the accessible channel's ability to 23 channels.
As far as possible your complete force yield by utilizing a sliding scale when you set up a significant distance Wi-Fi connect. The scale really begins at 30 dBm of enhancement power utilizing a 6 dBi directional reception apparatus. For each 1 dBm drop in enhancement power, there would be an expansion in the intensity of directional radio wire by 3 dBi. The FCC permits this sliding scale since when you utilize a bigger highlight point radio wire, your shaft example will cover less territory and cause less impedance for other people.
It is vital to research each of the services you plan to disable before implementing any change, especially on critical machines such as the:
The available options are:
A. Servers in the test environment.
B. Domain controller and other infrastructure servers.
3. Desktops that have previously been attacked.
4. Desktops are used by upper-level management.
Answer:
Domain controller and other infrastructure servers
Explanation:
A domain controller is a critical machine or server in a network operation on Microsoft Servers. It serves as the authorization point in which security authentication can be granted, such as managing users' account data, security policy, and all other vital information well arranged and secured.
Hence, considering the available options, the right answer is "Domain controller and other infrastructure servers."
would 2 bits be enough to create a special code for each english vowel
what is a computer based system that allows people to communicate simoltaneously from differetn locations
Answer:
Electronic conferencing
Explanation:
Electronic conferencing is a form of a computer-based system that allows people to communicate simultaneously from different locations, with the aid of the Internet, which can be done through telephones, emails, or video chats. It is a commonly known Virtual Meeting.
Hence, the right answer, based on the definition or description given in the question is ELECTRONIC CONFERENCING
how much memory will be occupied by black and white image
Answer:
37 percent
hope it helps u
(HELP ASAP) Jenae is helping her dad create a blog for his garden club. Which tool will she use?
Web browser
JavaScript
CSS
Text editor
What will allow you to purchase software without receiving full rights to the program?
Answer:
i need free points cus i have zero sry
Explanation:
Answer: an end user license agreement or (EULA)
Explanation:
Confidentiality, integrity, and availability (C-I-A) are large components of access control. Integrity is __________.
Options:
(a) ensuring that a system is accessible when needed
(b) defining risk associated with a subject accessing an object
(c) ensuring that a system is not changed by a subject that is not authorized to do so
(d) ensuring that the right information is seen only by subjects that are authorized to see it
Answer:
(c) Ensuring that a system is not changed by a subject that is not authorized to do so.
Explanation:
Access control simply means controlling who accesses a particular data by putting necessary measures in place. The vital components of access control are explained briefly as follows:
Confidentiality: This refers to ensuring that sensitive information are getting to the right people and the right people only. Confidentiality ensures that data or information are getting to those that they are intended. Examples of sensitive information that require confidentiality are
i. Credit card details
ii. Passwords
Integrity: This refers to ensuring that the quality, consistency, accuracy and trustworthiness of an information does not change throughout its time.
It makes sure that data remains the same over a long period of time and in the event that it will be changed, it is not changed by unauthorized subject.
Availability: Just as the name implies, ensures that the data or information is available any time it is needed.
What is the minimum number of locations a sequential search algorithm will have to examine when looking for a particular value in an array of 100 elements
Answer:
O( n ) of the 100 element array, where "n" is the item location index.
Explanation:
From the meaning of the word "sequential", the definition of this algorithm should be defined. Sequential donotes a continuously increasing value or event, like numbers, increasing by one in an arithmetic progression.
A list in programming is a mutable data structure that holds data in indexed locations, which can be accessed linearly or randomly. To sequentially access a location in a list, the algorithm starts from the first item and searches to the required indexed location of the search, the big-O notation is O( n ), where n is the index location of the item searched.
Write a program in JAVA to perform the following operator based task: Ask the user to choose the following option first: If User Enter 1 - Addition If User Enter 2 - Subtraction If User Enter 3 - Division If User Enter 4 - Multiplication If User Enter 5 - Average Ask the user to enter the 2 numbers in a variable for first and second(first and second are variable names) for the first 4 options mentioned above and print the result. Ask the user to enter two more numbers as first and second 2 for calculating the average as soon as the user chooses an option 5. In the end, if the answer of any operation is Negative print a statement saying "Oops option X(1/2/3/4/5/) is returning the negative number" NOTE: At a time users can perform one action at a time.
Answer:
Here is the JAVA program:
import java.util.Scanner;
public class Operations{
public static void main(String[] args) {
Scanner input= new Scanner(System.in);
float first,second;
System.out.println("Enter first number:");
first = input.nextFloat();
System.out.println("Enter second number:");
second = input.nextFloat();
System.out.println("Enter 1 for Addition, 2 for Subtraction 3 for Multiplication, 4 for Division and 5 for Average:");
int choice;
choice = input.nextInt();
switch (choice){
case 1: //calls add method to perform addition
System.out.println("Addition result = " + add(first,second));
break;
case 2: //calls sub method to perform subtraction
System.out.println("Subtraction result = " + sub(first,second));
break;
case 3: //calls mul method to perform multiplication
System.out.println("Multiplication result = " +mul(first,second));
break;
case 4: //calls div method to perform division
System.out.println("Division result = " +div(first,second));
break;
case 5: //calls average method to compute average
System.out.println("Average = " +average(first,second));
break;
default: //if user enters anything other than the provided options
System.out.println("Invalid Option"); }}
public static float add(float first, float second) {
float result = first + second;
if(result<0)
{System.out.println("Oops option 1 is returning a negative number that is: "); }
return result; }
public static float sub(float first, float second) {
float result = first - second;
if(result<0){System.out.println("Oops option 2 is returning negative number that is: ");}
return result; }
public static float mul(float first, float second) {
float result = first*second;
if(result<0)
{System.out.println("Oops option 3 is returning negative number that is: ");}
return result; }
public static float div(float first, float second){
if(second==0)
{System.out.println("Division by 0");}
float result = first/second;
if(result<0){System.out.println("Oops option 4 is returning negative number that is: ");}
return result; }
public static float average (float first,float second) {
Scanner inp= new Scanner(System.in);
float first2,second2;
System.out.println("Enter two more numbers:");
System.out.println("Enter first number:");
first2 = inp.nextInt();
System.out.println("Enter second number:");
second2 = inp.nextInt();
float result;
float sum = first+second+first2+second2;
result = sum/4;
if(result<0)
{System.out.println("Oops option 5 is returning negative number that is: ");}
return result; }}
Explanation:
The above program first prompts the user to enter two numbers. Here the data type of two number is float in order to accept floating numbers. The switch statement contains cases which execute according to the choice of user. The choice available to user is: 1,2,3,4 and 5
If the user selects 1 then the case 1 executes which calls the method add. The method add takes two numbers as parameters, adds the two numbers and returns the result of the addition. This result is displayed on output screen. However if the result of addition is a negative number then the message: "Oops option 1 is returning the negative number that is:" is displayed on the screen along with the negative answer of that addition.
If the user selects 2 then the case 2 executes which calls the method sub. The method works same as add but instead of addition, sub method takes two numbers as parameters, subtracts them and returns the result of the subtraction.
If the user selects 3 then the case 3 executes which calls the method mul. The method mul takes two numbers as parameters, multiplies them and returns the result of the multiplication.
If the user selects 4 then the case 4 executes which calls the method div. The method div takes two numbers as parameters and checks if the denominator i.e. second number is 0. If its 0 then Division by 0 message is displayed along with result i.e. infinity. If second number is not 0 then method divides the numbers and returns the result of the division.
If the user selects 5 then the case 5 executes which calls the method average. The average method then asks the user to enter two more numbers first2 and second2 and takes the sum of all four numbers i.e. first, second, first2 and second2. Then the result of sum is divided by 4 to compute average. The method returns the average of these four numbers.
To what do the concepts of a paradigm shift, Moore's Law and the technology adoption life cycle refer?
Teachers can organize the classroom environment to facilitate activities and to prevent problems. True Or False
Answer:
True
Explanation:
It is possible to organize a classroom environment to promote social interaction and minimize potential points of stress