Answer:
The program equivalent in C++ is:
#include <cstdio>
#include <cstdlib>
#define SIZE 5
using namespace std;
int main(int argc, char *argv[]) {
int numerator = 25;
int denominator = 10;
FILE * inPut = fopen(argv[1], "r");
FILE * outPut = fopen(argv[2], "w");
float result = (float)numerator/denominator;
fprintf(outPut,"Result is %.2f\n", result);
float arr[SIZE];
for(int i = 0; i < SIZE; i++) {
fscanf(inPut, "%f", &arr[i]);
fprintf(outPut, "%7.4f\n", arr[i]);
}
return 0;
}
Explanation:
See attachment for explanation.
Each line were numbered with equivalent line number in the C program
Online Privacy
1.)Explain why is online privacy a controversial topic?
2.)Explain why this issue is applicable to you and your peers.
3.)Explain why this issue is a federal issue and not a state or local issue.
Answer:
Yes
Explanation:
Online privacy is a controversial topic due to the fact that it's a very hard thing to navigate. Some websites use cookies that are used to store your data so in a way there taking your privacy away which is controversial because of the way they use the information. Some websites store it for use of ads while others sell it. This issue is applicable to me and my peers because of the way we use technology. It can be used to steal my information about where I live and what I look up online. Also, the information stored could have my credit or debit card credentials. This issue should be a federal and nationwide issue because this is an everyday occurrence and leaves tons of people in crushing debt every year.
Write code that prints: Ready! numVal ... 2 1 Start! Your code should contain a for loop. Print a newline after each number and after each line of text Ex: numVal
Answer:
Written in Python
numVal = int(input("Input: "))
for i in range(numVal,0,-1):
print(i)
print("Ready!")
Explanation:
This line prompts user for numVal
numVal = int(input("Input: "))
This line iterates from numVal to 1
for i in range(numVal,0,-1):
This line prints digits in descending order
print(i)
This line prints the string "Ready!"
print("Ready!")
3.What are the pros and cons of using a linked implementation of a sparse matrix, as opposed to an array-based implementation
Answer:
speed and storage
Explanation:
The pros and cons of both are mainly in regards to speed and storage. Due to linked lists elements being connected to one another it requires that each previous element be accessed in order to arrive at a specific element. This makes it much slower than an array-based implementation where any element can be quickly accessed easily due to it having a specific location. This brings us to the other aspect which is memory. Since Arrays are saved as a single block, where each element has a specific location this takes much more space in the RAM as opposed to a linked implementation which is stored randomly and as indexes of the array itself.
Array Implementation:
Pros: Much Faster and Easier to target a specific elementCons: Much More Space neededLinked Implementation
Pros: Less overall space neededCons: Much slower speed.How has the rise of mobile development and devices impacted the IT industry, IT professionals, and software development
Answer:
Throughout the interpretation section elsewhere here, the explanation of the problem is summarized.
Explanation:
The growth of smartphone production and smartphone apps and services, as well as the production of smartphones, has had a positive influence on the IT industry, IT practitioners, as well as the development of the technology. As normal, the primary focus is on smartphone apps instead of just desktop software. As we recognize, with innovative features, phone applications, and smartphones are all made, built, modernized every day, and always incorporated with either the latest technology.This has now resulted in far more jobs and employment for the IT sector, and therefore new clients for service-based businesses. It provided various-skilling the application production industry for IT experts including learning how to work on emerging technology. The demand for software production and software growth is evolving at a greater speed than it's ever been, so the increase of smartphone production and smartphones has had a very beneficial effect on perhaps the IT sector, IT practitioners, and business development.What is his resolution amount
A have a string, called "joshs_diary", that is huge (there was a lot of drama in middle school). But I don't want every one to know that this string is my diary. However, I also don't want to make copies of it (because my computer doesn't have enough memory). Which of the following lines will let me access this string via a new name, but without making any copies?
a. std::string book = joshs_diary;
b. std::string & book = joshs_diary; const
c. std::string * book = &joshs_diary;
d. std::string book(joshs_diary);
e. const std::string & book = joshs_diary;
f. const std::string * const book = &joshs_diary;
g. std::string * book = &joshs_diary;
Answer:
C and G
Explanation:
In C language, the asterisks, ' * ', and the ampersand, ' & ', are used to create pointers and references to pointers respectively. The asterisks are used with unique identifiers to declare a pointer to a variable location in memory, while the ampersand is always placed before a variable name as an r_value to the pointer declared.
In Microsoft windows which of the following typically happens by default when I file is double clicked
Answer:
when a file is double clicked it opens so you can see the file.
Explanation:
To use cout statements you must include the __________ file in your program.
Answer:
To use cout statements, you must include the iostream file in your program.
Secondary sources
information gathered from primary sources.
Answer:
The answer is interpret Proof is down below
Explanation:
Here is the proooooooffffffff i made a 90 but this one was right
Secondary sources interpret information gathered from primary sources.
What are Secondary sources of information?A secondary source is known to be made up of discussion that is often based on a primary information source.
Hence, the feature of secondary sources are known to give some kind of interpretation to all the information that has been gathered from other primary sources.
Learn more about Secondary sources from
https://brainly.com/question/896456
#SPJ2
how many basic element makes up a computer system
Answer:
4
Explanation:
Input/output, datapath, control, and memory
There wrong its C bold it.
:)))))
A CPU with a quad-core microprocessor runs _____ times as fast as a computer with a single-core processor.
two
three
four
eight
Answer:
four
Explanation:
quad means four so it runs four times faster
Suppose one machine, A, executes a program with an average CPI of 1.9. Suppose another machine, B (with the same instruction set and an enhanced compiler), executes the same program with 20% less instructions and with a CPI of 1.1 at 800MHz. In order for the two machines to have the same performance, what does the clock rate of the first machine need to be
Answer:
the clock rate of the first machine need to be 1.7 GHz
Explanation:
Given:
CPI of A = 1.9
CPI of B = 1.1
machine, B executes the same program with 20% less instructions and with a CPI of 1.1 at 800MHz
To find:
In order for the two machines to have the same performance, what does the clock rate of the first machine need to be
Solution:
CPU execution time = Instruction Count * Cycles per Instruction/ clock rate
CPU execution time = (IC * CPI) / clock rate
(IC * CPI) (A) / clock rate(A) = (IC * CPI)B / clock rate(B)
(IC * 1.9) (A) / clock rate(A) = (IC * (1.1 * (1.0 - 0.20)))(B) / 800 * 10⁶ (B)
Notice that 0.20 is basically from 20% less instructions
(IC * 1.9) / clock rate = (IC * (1.1 * (1.0 - 0.20))) / 800 * 10⁶
(IC * 1.9) / clock rate = (IC*(1.1 * ( 0.8))/800 * 10⁶
(IC * 1.9) / clock rate = (IC * 0.88) / 800 * 10⁶
clock rate (A) = (IC * 1.9) / (IC * 0.88) / 800 * 10⁶
clock rate (A) = (IC * 1.9) (800 * 10⁶) / (IC * 0.88)
clock rate (A) = 1.9(800)(1000000) / 0.88
clock rate (A) = (1.9)(800000000) / 0.88
clock rate (A) = 1520000000 / 0.88
clock rate (A) = 1727272727.272727
clock rate (A) = 1.7 GHz
Write a program that reads in 15 numbers in sorted order from the user (i.e. the user enters them in order) and stores them in a 1D array of size 15. Next, prompt the user for a number to search for in the array (i.e. the "target"). Then, print the array. Next, search the array using a linear search – printing out each of
Corrected Question
Write a program that reads in 15 numbers in sorted order from the user (i.e. the user enters them in order) and stores them in a 1D array of size 15. Next, prompt the user for a number to search for in the array (i.e. the "target"). Then, print the array. Next, search the array using a linear search – find the target element and printing out the target and its index as well as the entire array
Answer:
The solution is given in the explanation section
See detailed explanation of each step given as comments
Explanation:
import java.util.*;
class Main {
public static void main(String[] args) {
//Create the array of 15 elements
int [] array = new int [15];
//Create an object of the scanner class to receive user input
Scanner in = new Scanner(System.in);
//Prompt user to enter the values in sorted order
//Using a for loop
for (int i =0; i<array.length; i++){
System.out.println("Enter the next element: In SORTED order please!");
array[i] = in.nextInt();
}
System.out.println("All Fifteen element have been entered");
// Ask the user for an element to be searched for
//A target element
System.out.println("Which element do you want to search for in the array");
//Create the target element
int target = in.nextInt();
//Use a for loop to sequentially check each element in the array
for(int i = 0; i<array.length; i++){
if(array[i]==target){
System.out.println(target+" is found at index "+i +" of the array");
}
}
// Printout the entire array
System.out.println(Arrays.toString(array));
}
}
How does asymmetric encryption work?
A.
It uses only one key to encrypt and decrypt a message.
B.
A private key is used to encrypt the message and the public key is used to decrypt the message.
C.
Either the public key or the private key can be used to encrypt and decrypt a message.
D.
Public key is used to encrypt the message and private key is used to decrypt the message.
Answer:
i choose choice D
Explanation:
reason as to my answer public keys are simply input keys used to encrypt data into either a computer or any electrical device as private keys are out put used to either erase or edit
Create a TeeShirt class for Toby’s Tee Shirt Company. Fields include:
orderNumber - of type int size - of type String color - of type String price - of type double Create set methods for the order number, size, and color and get methods for all four fields. The price is determined by the size: $22.99 for XXL or XXXL, and $19.99 for all other sizes. Create a subclass named CustomTee that descends from TeeShirt and includes a field named slogan (of type String) to hold the slogan requested for the shirt, and include get and set methods for this field.
Answer:
Here is the TeeShirt class:
public class TeeShirt{ //class name
private int orderNumber; // private member variable of type int of class TeeShirt to store the order number
private String size; // to store the size of tshirt
private String color; // to store the color of shirt
private double price; // to store the price of shirt
public void setOrderNumber(int num){ //mutator method to set the order number
orderNumber = num; }
public void setColor(String color){ //mutator method to set the color
this.color = color; }
public void setSize(String sz){ //mutator method to set the shirt size
size = sz;
if(size.equals("XXXL") || size.equals("XXL")){ //if shirt size is XXL or XXXL
price = 22.99; // set the price to 22.99 if shirt size is XXL or XXXL
}else{ //for all other sizes of shirt
price = 19.99; } } //sets the price to 19.99 for other sizes
public int getOrderNumber(){ //accessor method to get the order number stored in orderNumber field
return orderNumber; } //returns the current orderNumber
public String getSize(){ //accessor method to get the size stored in size field
return size; } //returns the current size
public String getColor(){ //accessor method to get the color stored in color field
return color; } //returns the current color
public double getPrice(){ //accessor method to get the price stored in price field
return price; } } //returns the current price
Explanation:
Here is the sub class CustomTee:
public class CustomTee extends TeeShirt { //class CustomTee that inherits from class TeeShirt
private String slogan; //private member variable of type String of class CustomTee to store slogan
public void setSlogan(String slgn) { //mutator method to set the slogan
slogan = slgn; }
public String getSlogan() { //accessor method to get the slogan stored in slogan field
return slogan;} } //returns the current slogan
Here is DemoTees.java
import java.util.*;
public class DemoTees{ //class name
public static void main(String[] args) { //start of main method
TeeShirt tee1 = new TeeShirt(); //creates object of class TeeShirt named tee1
TeeShirt tee2 = new TeeShirt(); //creates object of class TeeShirt named tee2
CustomTee tee3 = new CustomTee(); //creates object of class CustomTee named tee3
CustomTee tee4 = new CustomTee(); //creates object of class CustomTee named tee4
tee1.setOrderNumber(100); //calls setOrderNumber method of class TeeShirt using object tee1 to set orderNumber to 100
tee1.setSize("XXL"); //calls setSize method of class TeeShirt using object tee1 to set size to XXL
tee1.setColor("blue"); //calls setColor method of class TeeShirt using object tee1 to set color to blue
tee2.setOrderNumber(101); //calls setOrderNumber method of class TeeShirt using object tee2 to set orderNumber to 101
tee2.setSize("S"); //calls setSize method of class TeeShirt using object tee2 to set size to S
tee2.setColor("gray"); //calls setColor method of class TeeShirt using object tee2 to set color to gray
tee3.setOrderNumber(102); //calls setOrderNumber method of class TeeShirt using object tee3 of class CustomTee to set orderNumber to 102
tee3.setSize("L"); //calls setSize method of class TeeShirt using object tee3 to set size to L
tee3.setColor("red"); //calls setColor method of class TeeShirt using object tee3 to set color to red
tee3.setSlogan("Born to have fun"); //calls setSlogan method of class CustomTee using tee3 object to set the slogan to Born to have fun
tee4.setOrderNumber(104); //calls setOrderNumber method of class TeeShirt using object tee4 of class CustomTee to set orderNumber to 104
tee4.setSize("XXXL"); //calls setSize method to set size to XXXL
tee4.setColor("black"); //calls setColor method to set color to black
tee4.setSlogan("Wilson for Mayor"); //calls setSlogan method to set the slogan to Wilson for Mayor
display(tee1); //calls this method passing object tee1
display(tee2); //calls this method passing object tee2
displayCustomData(tee3); //calls this method passing object tee3
displayCustomData(tee4); } //calls this method passing object tee4
public static void display(TeeShirt tee) { //method display that takes object of TeeShirt as parameter
System.out.println("Order #" + tee.getOrderNumber()); //displays the value of orderNumber by calling getOrderNumber method using object tee
System.out.println(" Description: " + tee.getSize() + " " + tee.getColor()); //displays the values of size and color by calling methods getSize and getColor using object tee
System.out.println(" Price: $" + tee.getPrice()); } //displays the value of price by calling getPrice method using object tee
public static void displayCustomData(CustomTee tee) { //method displayCustomData that takes object of CustomTee as parameter
display(tee); //displays the orderNumber size color and price by calling display method and passing object tee to it
System.out.println(" Slogan: " + tee.getSlogan()); } } //displays the value of slogan by calling getSlogan method using object tee
In this exercise we have to use the knowledge in computational language in JAVA to write the following code:
We have the code can be found in the attached image.
So in an easier way we have that the code is
public class TeeShirt{
private int orderNumber;
private String size;
private String color;
private double price;
public void setOrderNumber(int num){
orderNumber = num; }
public void setColor(String color){
this.color = color; }
public void setSize(String sz){
size = sz;
if(size.equals("XXXL") || size.equals("XXL")){
price = 22.99;
}else{
price = 19.99; } }
public int getOrderNumber(){
return orderNumber; }
public String getSize(){
return size; }
public String getColor(){
return color; }
public double getPrice(){
return price; } }
public class CustomTee extends TeeShirt {
private String slogan;
public void setSlogan(String slgn) {
slogan = slgn; }
public String getSlogan() {
return slogan;} }
import java.util.*;
public class DemoTees{
public static void main(String[] args) {
TeeShirt tee1 = new TeeShirt();
TeeShirt tee2 = new TeeShirt();
CustomTee tee3 = new CustomTee();
CustomTee tee4 = new CustomTee();
tee1.setOrderNumber(100);
tee1.setSize("XXL");
tee1.setColor("blue");
tee2.setOrderNumber(101);
tee2.setSize("S");
tee2.setColor("gray");
tee3.setOrderNumber(102);
tee3.setSize("L");
tee3.setColor("red");
tee3.setSlogan("Born to have fun");
tee4.setOrderNumber(104);
tee4.setSize("XXXL");
tee4.setColor("black");
tee4.setSlogan("Wilson for Mayor");
display(tee1);
display(tee2);
displayCustomData(tee3);
displayCustomData(tee4); }
public static void display(TeeShirt tee) {
System.out.println("Order #" + tee.getOrderNumber());
System.out.println(" Description: " + tee.getSize() + " " + tee.getColor());
System.out.println(" Price: $" + tee.getPrice()); }
public static void displayCustomData(CustomTee tee) {
display(tee);
System.out.println(" Slogan: " + tee.getSlogan()); } }
See more about JAVA at brainly.com/question/18502436
Plz answer me will mark as brainliest
Jason works as a financial investment advisor. He collects financial data from clients, processes the data online to calculate the risks associated with future investment decisions, and offers his clients real-time information immediately. Which type of data processing is Jason following in the transaction processing system?
A.
online decision support system
B.
online transaction processing
C.
online office support processing
D.
online batch processing
E.
online executive processing
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is an online decision support system. Because the decision support systems process the data, evaluate and predict the decision, and helps the decision-makers, and offer real-time information immediately in making the decision in an organization. So the correct answer to this question is the decision supports system.
Why other options are not correct
Because the transaction processing system can only process the transaction and have not the capability to make the decision for the future. Office support processing system support office work, while the batch processing system process the task into the batch without user involvement. however, online executive processing does not make decisions and offer timely information to decision-makers in an organization.
Answer: the answer is A.
Explanation: He has to listen to what the people tell him and think about the information he has and make a choice on what to reply with.
A____server translates back and forth between domain names and IP addresses.
O wWeb
O email
O mesh
O DNS
Answer:
DNS
Explanation:
Hope this helps
Jake or Peggy Zale must fix quickly the fax.
Answer:
Sentence: Jack or Peggy Zale must fix quickly the fax.
Correct: Either Jack or Peggy Zale must quickly fix the fax.
There are 2 errors in these sentence construction. In stating two persons as an option we must use the word "either" to indicate that you only have two choose from the two of them. The word "
Explanation:
The correct sentence would be "either Jake or Peggy Zale must quickly fix the fax".
In the question construction, there is a conjunction and misarrangement error.
In conclusion, the word " "either Jake or Peggy Zale must quickly fix the fax" is correct
Read more about conjunction
brainly.com/question/8094735
If the propagation delay through a full-adder (FA) is 150 nsec, what is the total propagation delay in nsec of an 8-bit ripple-carry adder
Answer:
270 nsec
Explanation:
Ripple-carry adder is a combination of multiple full-adders. It is relatively slow as each full-adder waits for the output of a previous full-adder for its input.
Formula to calculate the delay of a ripple-carry adder is;
= 2( n + 1 ) x D
delay in a full-adder = 150 nsec.
number of full-adders = number of ripple-carry bits = 8
= 2 ( 8 + 1 ) x 150
= 18 x 150
= 270 nsec
what is scientific and
Answer:
And what??????????????
The Beaufort Wind Scale is used to characterize the strength of winds. The scale uses integer values and goes from a force of 0, which is no wind, up to 12, which is a hurricane. The following script first generates a random force value. Then, it prints a message regarding what type of wind that force represents, using a switch statement. If random number generated is 0, then print "there is no wind", if 1 to 6 then print "this is a breeze", if 7 to 9 "this is a gale", if 10 to 11 print "this is a storm", if 12 print "this is a hurricane!". (Hint: use range or multiple values in case statements like case {1,2,3,4,5,6})
Required:
Re-write this switch statement as one nested if-else statement that accomplishes exactly the same thing. You may use else and/or elseif clauses.
ranforce = randi([0, 12]);
switch ranforce
case 0
disp('There is no wind')
case {1,2,3,4,5,6}
disp('There is a breeze')
case {7,8,9}
disp('This is a gale')
case {10,11}
disp('It is a storm')
case 12
disp('Hello, Hurricane!')
end
Answer:
The equivalent if statements is:
ranforce = randi([0, 12]);
if (ranforce == 0)
disp('There is no wind')
else if(ranforce>0 && ranforce <7)
disp('There is a breeze')
else if(ranforce>6 && ranforce <10)
disp('This is a gale')
else if(ranforce>9 && ranforce <12)
disp('It is a storm')
else if(ranforce==12)
disp('Hello, Hurricane!')
end
Explanation:
The solution is straight forward.
All you need to do is to replace the case statements with corresponding if or else if statements as shown in the answer section
Read the following code:
x = 1
while(x < 26)
print(x)
x = x + 1
There is an error in the while loop. What should be fixed?
1. Add a colon to the end of the statement
2. Begin the statement with the keyword count
3. Change the parentheses around the test condition to quotation marks
4. Use quotation marks around the relational operator
This is python code.
In python, you are supposed to put a colon at the end of while loops. This code does not have a colon after the while loop, therefore, you need to add a colon to the end of the statement.
The error to be fixed in the while loop is to add a colon at the end of the while statements.
x = 1
while (x<26)
print(x)
x = x + 1
This is the right code;
x = 1
while(x < 26):
print(x)
x = x + 1
The actual code , the while statement is missing a colon at the end of it.
The code is written in python. In python while or for loops statements always ends with a colon.
In the error code, there was no colon at the end of the while loop.
The right codes which I have written will print the value 1 to 25.
learn more on python loop here: https://brainly.com/question/19129298?referrer=searchResults
A country, called Simpleland, has a language with a small vocabulary of just “the”, “on”, “and”, “go”, “round”, “bus”, and “wheels”. For a word count vector with indices ordered as the words appear above, what is the word count vector for a document that simply says “the wheels on the bus go round and round.”
Please enter the vector of counts as follows: If the counts were ["the"=1, “on”=3, "and"=2, "go"=1, "round"=2, "bus"=1, "wheels"=1], enter 1321211.
1 point
Answer:
umm that is a todler song
Explanation:
umm that is a todler song that they sing to them when there crying
A country, called Simpleland, has a language with a small vocabulary of just “the”, “on”, “and”, “go”, “round”, “bus”, and “wheels”. As per the given scenario, the vector of counts will be 2111211. The correct option is C.
What are the ways to count items in a vector?C++ has a built-in function that counts the length of the vector. Size is the function's name ().
It returns the size or total number of elements of the vector that was utilized to create it. There is no need for debate.
The number of observations (rows) includes deleted observations as well. In an SAS data collection, there can be a maximum of 2 63-1 observations, or roughly 9.2 quintillion observations. For the majority of users, going above that limit is quite rare.
The vector of counts in the above scenario will be 2111211.
Thus, the correct option is C.
For more details regarding programming, visit:
https://brainly.com/question/11023419
#SPJ2
In a system where Round Robin is used for CPU scheduling, the following is TRUE when a process cannot finish its computation during its current time quantum? The process will terminate itself. The process will be terminated by the operating system. The process's state will be changed from running to blocked. None of the mentioned.
Answer:
B. The process will be terminated by the operating system.
Explanation:
When Round Robin is used for CPU scheduling, a time scheduler which is a component of the operating system is used in regulating the operation. A time limit is set for each of the processes to be run.
So, when a process fails to complete running before its time elapses, the time scheduler would log it off and return it to the queue. This queue is in a circular form and gives each of the processes a chance to run its course.
Based on the information given regarding CPU scheduling, the correct option is C. The process's state will be changed from running to blocked.
It should be noted that in a system where Round Robin is used for CPU scheduling, when a process cannot finish its computation during its current time quantum, the process's state will be changed from running to blocked.
It should be noted that a prices transition to a blocked state occurs when it's waiting for some events like a particular resource becoming available.
Learn more about CPU scheduling on:
https://brainly.com/question/19999569
A pedometer treats walking 2,000 steps as walking 1 mile. Write a program whose input is the number of steps, and whose output is the miles walked. If the input is 5345, the output is 2.6725.
In python:
print(steps_walked / 2000)
My Mac is stuck on this screen? How to fix?
Answer:
Press and hold the power button for up to 10 seconds, until your Mac turns off. If that doesn't work, try using a cellular device to contact Apple Support.
Explanation:
If that also doesn't work try click the following keys altogether:
(press Command-Control-Eject on your keyboard)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
This makes the laptop (macOS) instruct to restart immediately.
Hopefully this helps! If you need any additional help, feel free and don't hesitate to comment here or private message me!. Have a nice day/night! :))))
Another Tip:
(Press the shift, control, and option keys at the same time. While you are pressing those keys, also hold the power button along with that.)
(For at least 10 seconds)
Write a program that simulates flipping a coin to make decisions. The input is how many decisions are needed, and the output is either heads or tails. Assume the input is a value greater than 0.
Answer:
import random
decisions = int(input("How many decisions: "))
for i in range(decisions):
number = random.randint(0, 1)
if number == 0:
print("heads")
else:
print("tails")
Explanation:
*The code is in Python.
import the random to be able to generate random numbers
Ask the user to enter the number of decisions
Create a for loop that iterates number of decisions times. For each round; generate a number between 0 and 1 using the randint() method. Check the number. If it is equal to 0, print "heads". Otherwise, print "tails"
1 megabyte is equal to 1024 gigabyte. True/False
Answer:
false
Explanation:
1 MB = 0.001 GB
Given four values representing counts of quarters, dimes, nickels and pennies, output the total amount as dollars and cents. Output each floating-point value with two digits after the decimal point, which can be achieved as follows: System.out.printf("Amount: $%.2f\n", dollars); Ex: If the input is: 4 3 2 1 where 4 is the number of quarters, 3 is the number of dimes, 2 is the number of nickels, and 1 is the number of pennies, the output is: Amount: $1.41 For simplicity, assume input is non-negative.
LAB ACTIVITY 2.32.1: LAB: Convert to dollars 0/10 LabProgram.java Load default template. 1 import java.util.Scanner; 2 3 public class LabProgram 4 public static void main(String[] args) { 5 Scanner scnr = new Scanner(System.in); 6 7 /* Type your code here. */|| 8 9) Develop mode Submit mode Run your program as often as you'd like, before submitting for grading. Below, type any needed input values in the first box, then click Run program and observe the program's output in the second box Enter program input (optional) If your code requires input values, provide them here. Run program Input (from above) 1 LabProgram.java (Your program) Output (shown below) Program output displayed here
Answer:
The corrected program is:
import java.util.Scanner;
public class LabProgram{
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
int qtr, dime, nickel, penny;
double dollars;
System.out.print("Quarters: ");
qtr =scnr.nextInt();
System.out.print("Dimes: ");
dime = scnr.nextInt();
System.out.print("Nickel: ");
nickel = scnr.nextInt();
System.out.print("Penny: ");
penny = scnr.nextInt();
dollars = qtr * 0.25 + dime * 0.1 + nickel * 0.05 + penny * 0.01;
System.out.printf("Amount: $%.2f\n", dollars);
System.out.print((dollars * 100)+" cents");
}
}
Explanation:
I've added the full program as an attachment where I used comments as explanation