Write a program that prompts the user to enter the number of
students and each student’s name and score, and finally displays
the student with the highest score and the student with the
second-highest score. Use the next() method in the Scanner class to
read a name rather using the nextLine() method.
This is my code , but i get this error Enter the number of
students: Exception in thread "main"
java.util.InputMismatchException
at java.util.Scanner.throwFor(Scanner.java:871)
at java.util.Scanner.next(Scanner.java:1494)
at java.util.Scanner.nextInt(Scanner.java:2139)
at java.util.Scanner.nextInt(Scanner.java:2095)
at Exercise05_09.main(Exercise05_09.java:16)
import java.util.Scanner;
public class Exercise05_09 {
public static void main(String[] args) {
// Create a Scanner
Scanner input = new
Scanner(System.in);
// Prompt the user to enter the
number of students
System.out.print("Enter the number
of students: ");
int numberOfStudents =
input.nextInt();
int score,
// Holds students' score
highest = 0,
// Highest
score
secondHigest =
0; // Second highest score
String name = "",
// Holds students' name
student1 = "", // Highest scoring
student name
student2 = ""; // Second highest
scoring student name
// Prompt the user to enter each
students' name and score
System.out.println("Enter each
students' name and score:");
for (int i = 0; i <
numberOfStudents; i++) {
System.out.print(
"Student: " + (i + 1) + "\n Name: ");
name =
input.next();
System.out.print(" Score: ");
score =
input.nextInt();
if (i == 0)
{
// Make the first student the highest scoring
student so far
highest = score;
student1 = name;
}
else if (i == 1
&& score > highest) {
// Second student entered scored
// higher than first student
secondHigest = highest;
highest = score;
student2 = student1;
student1 = name;
}
else if (i == 1)
{
// Second student entered scored
// lower than first student
secondHigest = score;
student2 = name;
}
else if (i >
1 && score > highest && score > secondHigest)
{
// Last student entered has the highest
score
secondHigest = highest;
student2 = student1;
highest = score;
student1 = name;
}
else if (i >
1 && score > secondHigest) {
// Last student entered has the second highest
score
student2 = name;
secondHigest = score;
}
}
// Display the student with the
hightest score
// and the student with the
second-hightest score.
System.out.println(
"Higest scoring
student: " + student1 +
"\nSecond Higest
scoring student: " + student2);
}
}
In: Computer Science
Define a Python function which finds the all of the odd numbers and the product of the odd numbers. (Use for loop and if conditions for this problem. Do not use existing codes. Use your own codes).(You need to use append function to obtain a list of odd numbers)
In: Computer Science
]write two main programs: one will add exception handling to a geometric object, and the other will create a Template function to find the max of three “entities” (either ints, floats, doubles, chars, and strings)
A trapezoid is a quadrilateral in which two opposite sides are parallel. (note: all squares, rectangles, and parallelograms are trapezoids)
Note 1: the length of Base 1 is always greater than or equal to Base 2
Note 2: To form a valid trapezoid, if must satisfy the side/length rule, namely, the sum of the lengths of Leg1,Leg2 , and Base 2 must be greater than the length of Base 1
Note 3:If a default trapezoid is created, set all the sides equal to 1 (i.e., a square, or rhombus)
The following is the UMs for a trapezoid:
Trapezoid |
-base1 : double -base2: double -leg1: double -leg2: double |
+Trapezoid() +Trapezoid (base1, base2, leg1, leg2) // setters and getters +print(void): void +toString(void) : string |
For the driver program:
Note 1: If the user creates a trapezoid that violates the side/length rule (including 0 or negative side lengths), throw an exception
Note 2: If the user sets one of the sides that violates the side/length rule, do not change the side, and throw an exception
A main drvier (main8a.cpp) :
#include <iostream> #include "trapezoid.h" using namespace std; int main() { cout << "Welcome to Lecture 16: Exceptions and Templates" << endl; cout << "The Trapezoid Program!\n"; cout << "\nTry creating t1 (no parameters, which is valid):\n"; try { Trapezoid t1; // this is valid, by design t1.print(); } catch(string errorMsg) { cout << errorMsg << endl; } cout << "\nTry creating t2(15,3,3,3) (which is invalid):\n"; try { Trapezoid t2(15,3,3,3); // this is invalid t2.print(); } catch(string errorMsg) { cout << errorMsg << endl; } cout << "\nTry creating t3(5,3,4,4) (which is valid):\n"; try { Trapezoid t3(5,3,4,4); // this is valid t3.print(); } catch(string errorMsg) { cout << errorMsg << endl; } cout << "\nTry changing base1 of default t4 to 10 (which is invalid):\n"; try { Trapezoid t4; t4.setBase1(10); // this is invalid t4.print(); } catch(string errorMsg) { cout << errorMsg << endl; } cout << "\nTry changing leg2 of t5(55,30,15,12) to 6 (which is invalid):\n"; try { Trapezoid t5(55,30,15,12); t5.setLeg2(6); // this is invalid t5.print(); } catch(string errorMsg) { cout << errorMsg << endl; } cout << "\nTry changing leg1 of default t6 to .5 (which is valid):\n"; try { Trapezoid t6; t6.setLeg1(.5); // this is valid t6.print(); } catch(string errorMsg) { cout << errorMsg << endl; } return EXIT_SUCCESS; }
In: Computer Science
Using C language:
void show_array (int data[ ], int n);
void InsertionSort (int data[ ], int n);
void SelectionSort (int data[ ], int n);
where data[] is the array and n is the size of the array.
If you implement both sort routines you will need to make a copy of the original unsorted array before using the first sort, or else the second sort will be working on a sorted version of the array.
In: Computer Science
Select a Database of your own choice and apply the
first three normalization processes. (1NF, 2NF & 3NF)
• The minimum number of records in the table must be 10
• Make sure you carry the same table from 1NF to 2NF and 3NF, do
not use separate tables from scratch for all the three forms.
• Brief explanation of the normalization processes must be
specified
In: Computer Science
ETHICS IN IT
The general moral imperatives involving individuals is to:
a. Contribute to society and human well-being.
b. Avoid harm to others.
c. Be honest and trustworthy.
d. Be fair and take action not to discriminate.
e. Honour property rights including copyrights and patent.
You are required to discuss the above general moral imperatives in
relation to
Information and Communication Technology (ICT).
In: Computer Science
Consider the following relation and convert to the normal form indicated. Make sure your Primary Key and its attribute(s) is/are underlined for full credit. Also indicate foreign keys using (FK) if any.
0NF:
ORDER[order_num, date, SSN, cust_name, phone, email, (SKU, item_name, price)]
Notes:An order has only one customer, but a customer can place many orders. Each order can have multiple items.
1NF:
2NF:
3NF:
In: Computer Science
In c++ please. Write a program that opens a specified text tile then displays a list of all the unique words found in the file. Hint: Store each word as an element of a set.
In: Computer Science
in the context of access control , explain the concepts of access control matrix, access control list ,privilege control list and capability
In: Computer Science
Must a Huffman tree be a two-tree? Explain
In: Computer Science
QUESTION 1
Which of the following will correctly change the name of the LOCATIONS table to NEW_LOCATIONS?
ALTER TABLE LOCATIONS RENAME NEW_LOCATIONS |
||
MODIFY TABLE LOCATIONS RENAME NEW_LOCATIONS |
||
RENAME LOCATIONS TO NEW_LOCATIONS |
||
None of the above, you cannot rename a table, you can only CREATE, ALTER and DROP a table. |
1 points
QUESTION 2
The data type of a column can never be changed once it has been created.
True
False
1 points
QUESTION 3
The following code creates a table named student_table with four columns: id, lname, fname, lunch_num CREATE TABLE student_table (id NUMBER(6), lname VARCHAR(20), fname VARCHAR(20), lunch_num NUMBER(4)); The lunch_num column in the above table has been marked as UNUSED. Which of the following is the best statement you can use if you wish to remove the UNUSED column from the student_table?
DROP column |
||
ALTER TABLE DELETE UNUSED COLUMNS |
||
ALTER TABLE DROP UNUSED COLUMNS |
||
ALTER TABLE DELETE ALL COLUMNS |
1 points
QUESTION 4
After issuing a SET UNUSED command on a column, another column with the same name can be added using an ALTER TABLE statement.
True
False
1 points
QUESTION 5
Comments can be added to a table by using the COMMENT ON TABLE statement. The comments being added are enclosed in:
Double quotes " " |
||
Single quotes ' ' |
||
Parentheses ( ) |
||
Brackets { } |
1 points
QUESTION 6
You can use the ALTER TABLE statement to:
Add a new column |
||
Modify an existing column |
||
Drop a column |
||
All of the above |
1 points
QUESTION 7
ALTER TABLE table_name RENAME can be used to:
Rename a row |
||
Rename a column |
||
Rename a table |
||
All of the above |
1 points
QUESTION 8
To completely get rid of a table, its contents, its structure, AND release the storage space the keyword is:
DROP |
||
DELETE |
||
TRUNCATE |
||
KILL |
1 points
QUESTION 9
When should you use the SET UNUSED command?
Never, there is no SET UNUSED command |
||
You should use it if you think the column may be needed again later |
||
You should use it when the system is being heavily used |
||
You should only use this command if you want the column to still be visible when you DESCRIBE the table |
1 points
QUESTION 10
You can use DROP COLUMN to drop all columns in a table, leaving a table structure with no columns.
True
False
In: Computer Science
In MatLab, Determine how many years it will take to accumulate at least $10,000 in
your bank account if you deposit $1000 initially and $500 at the end of
each year. The account pays 2.5% interest annually. At the end of each
year your loop should write a message to the user, for example: "After
year 1, the balance in your account is $xx,xxx.xx". Your script should
also write out the final balance after $10,000 is reached.
In: Computer Science
An employee suspects that his password has been compromised. He changed it two days ago, yet it seems someone has used it again. What might be going on?
Answer according to digital forensics
In: Computer Science
Discuss the importance of effective project management in following the workflow and achieving the specific project deliverables. Address appropriate strategies and methodologies for Software Development, or Web Design and Development. Be thorough. Take into consideration all stakeholders and identify both positive and negative potential outcomes
In: Computer Science
A cloud customer has asked you to do a forensics analysis of data stored on a CSP’s server. The customer’s attorney explains that the CSP offers little support for data acquisition and analysis but will help with data collection for a fee. The attorney asks you to prepare a memo with detailed questions of what you need to know to perform this task. She plans to use this memo to negotiate for services you’ll provide in collecting and analyzing evidence. Write a one- to two-page memo with questions to ask the CSP.
Answer according to digital forensics
In: Computer Science