Questions
I want to know how can I fix this program so it can work properly....can someone...

I want to know how can I fix this program so it can work properly....can someone run it and give me the fixed version but do not the entire program bear with this one please and thanks in advance!!!!!

import java.util.Scanner;

public class ifPractice
{
public static void main(String[] args)
{
Scanner KB = new Scanner(System.in);
{
double option;
double option02;
double stu_gradeTest01;
double stu_gradeTest02;
double stu_gradeTest03;
double final_grade;
{
System.out.println("Enter #1 to see what test to grade first, #2 for student's average, #3 " +
"to see what is the final grade for the student: ");
option = KB.nextDouble();

if(option == 1)
{
System.out.println("Let's see which exam to grade first....");
System.out.println("Now please choose #4 for first exam; #5 for second exam; #6 for final exam: ");
option02 = KB.nextDouble();
if(option02 == 4)
{
System.out.println("Grade exam one: ");
stu_gradeTest01 = KB.nextDouble();
System.out.println("The first exam: " + stu_gradeTest01);
}
else if(option02 == 5)
{
System.out.println("Grade exam two: ");
stu_gradeTest02 = KB.nextDouble();
System.out.println("The second exam: " + stu_gradeTest02);
}
else if(option02 == 6)
{
System.out.println("Grade exam three: ");
stu_gradeTest03 = KB.nextDouble();
System.out.println("The third exam: " + stu_gradeTest03);
}
else
System.out.println("Invalid entry.... program in lockdown until further notice....");
}
  


  
else if(option == 2)
{
System.out.println("These are all of the grades: ");
stu_gradeTest01 = KB.nextDouble();
stu_gradeTest02 = KB.nextDouble();
stu_gradeTest03 = KB.nextDouble();
final_grade = (stu_gradeTest01 + stu_gradeTest02 + stu_gradeTest03)/3.0;
System.out.println("The final grade is: " + final_grade);
}
else
System.out.println("Invalid entry...llocking system down....");
}


  

  
else if(option == 3)
{
System.out.println("The final grade the student got was: ");
final_grade = KB.nextDouble();
if(final_grade >= 90)
{
System.out.print("A");
final_grade = KB.nextDouble();
}
else if(final_grade >= 80 )
{
System.out.print("B");
final_grade = KB.nextDouble();
}
else if(final_grade >= 70)
{
System.out.print("C");
final_grade = KB.nextDouble();
}
else if(final_grade <= 65)
{
System.out.println("Your are failing");
final_grade = KB.nextDouble();
}
else if(final_grade >= 64)
{
System.out.println("F");
final_grade = KB.nextDouble();
}
else
{
System.out.println("Invalid enry.....lllocking down....");
}
}
else
System.out.println("Invalid entry");
}
}
}




  
  
  
  


  
  

In: Computer Science

Complete the "Reducing pops and clicks" step-by-step found in Lesson 5 from the textbook “Adobe Audition...

Complete the "Reducing pops and clicks" step-by-step found in Lesson 5 from the textbook “Adobe Audition CC Classroom in a Book.” After performing all the steps (1-9), save the file with the file name MajorPopsFix.wav and submit it.

In: Computer Science

Nice shirt! In Java, write a program that uses a function that takes in the user's...

Nice shirt! In Java, write a program that uses a function that takes in the user's name and prints out compliments directed to them. The program should provide a sentinel value by asking if they've had enough compliments and will continue until they type "yes". Include 3 different compliments pulled at random and BE SURE TO USE A FUNCTION/METHOD to take in the user's name.

Sample output:

Enter your name: John Smith

John Smith, you have a great smile!

Would you like another compliment? [yes/no] yes

John Smith, you are tall and handsome!

Would you like another compliment? [yes/no] yes

John Smith, you are a quick learner!

Would you like another compliment? [yes/no] no

Have a nice day!

In: Computer Science

Instructions Submission Guidelines This assignment may be submitted for full credit until Friday, October 4th at...

Instructions

Submission Guidelines

This assignment may be submitted for full credit until Friday, October 4th at 11:59pm. Late submissions will be accepted for one week past the regular submission deadline but will receive a 20pt penalty. Submit your work as a single HTML file. It is strongly recommended to submit your assignment early, in case problems arise with the submission process.

Assignment

For this assignment, you will write a timer application in HTML and JavaScript.

Your HTML document should contain the following elements/features:

  1. HTML tags:
    1. An <input> tag labeled "Timer Duration" with the initial value 0
    2. A <button> tag labeled "Start"
  2. Script: When the user presses the button (1b), a function will begin that does the following:
    1. Reads the value from the input field (1a)
    2. Removes the <input> and <button> tags (1a & 1b)
    3. Creates a new <p> tag, initialized to show the input value
    4. Starts a timer that ticks down to zero. For every second that elapses, the paragraph tag (2c) will show the updated timer value (i.e., one less)
    5. When the timer reaches zero, the countdown will stop and the paragraph tag (2c) will be removed and be replaced by a <button> tag labeled "New Timer"
    6. When the <button> tag (2e) is pressed, it will be removed and the <input> and <button> tags (1a, 1b) will be recreated with their original formats

Evaluation

Your assignment will be graded according to whether all the required elements are present and in the correct formats and all required functionalities are operable.

In: Computer Science

what would you do if you forget your password for Access database

what would you do if you forget your password for Access database

In: Computer Science

Javascript: Create a loop that counts from 1 to 20. // If the current number is...

Javascript:

Create a loop that counts from 1 to 20. 
// If the current number is even, add it to this empty array:
var myArray = [];
// If the current number is odd, log an odd number warning to 
// the console.
// However, if the number equals 19, set a debug breakpoint.
// After the loop completes, print the array to the console.
var myArray = [];
for (var i = 1; i <= 20; i++) {
    if (i % 2 === 1) {
        console.warn("odd number");
    } else {
        myArray.push(i);
    }
    if (i === 19) {
        console.debug();
    }
}
console.log(myArray);

The code is not printing to my screen. help please

In: Computer Science

I wanted c++ program for the question Problem 6 - Weighted Graph In the vertex and...

I wanted c++ program for the question

Problem 6 - Weighted Graph
In the vertex and edge structure defined below
Vertex        Edge   Vertex
SFO        2702   BOS
SFO        1846   ORD
ORD         867   BOS
ORD         742   JFK
JFK         189   BOS
SFO        1464   DFW
DFW         802   ORD
DFW        1123   MIA
MIA        1092   JFK
MIA        1258   BOS
SFO         339   LAX
LAX        1235   DFW
LAX        2342   MIA

a) Find the shortest distance between
ORD and LAX.

b) Find the shortest distance between
JFK and SFO.

c) Find the minimum spanning tree.

In: Computer Science

For the problem below, please estimate the worst-case Running Time for a random array of size...

For the problem below, please estimate the worst-case Running Time for a random array of size n, and prove that it is indeed ( ). Please show all your work. Just stating something like "since 2 Binary Search runs in ( ) time, our algorithm has the same runtime estimate" is not enough. A rigorous explanation is expected.

import java.util.*;
public class Main
{
static int binarySearch(int arr[], int l, int r, int x)
{
if (r >= l) {
int mid = l + (r - l) / 2;
  
// If the element is present at the middle itself
if (arr[mid] == x)
return mid;
  
// If element is smaller than mid, then it can only
// be present in left subarray
if (arr[mid] > x)
{ int rr= binarySearch(arr, l, mid - 1, x);
if(rr==-1)//modified
{
return binarySearch(arr, mid + 1, r, x);
}
return rr;
}
// Else the element can only be present in right
// subarray
int k =binarySearch(arr, mid + 1, r, x);
//modified part
if(k==-1)
{
return binarySearch(arr, l, mid - 1, x);
}
return k;
}
  
// We reach here when element is not present in array
return -1;
}
  
public static int FindIndex(int[] arr, int x)
{
if(arr.length==0)return -1;//if array is empty
return binarySearch(arr,0,arr.length-1,x);
  
}
   public static void main(String[] args) {
   int a[] = {3, 17, 28, 935, 1011, -10, 0, 2} ;//declaring array
   int r = FindIndex(a,935);
       System.out.println("index of 935:"+r);
       r = FindIndex(a,-10);
       System.out.println("index of -10:"+r);
      
       r = FindIndex(a,0);
       System.out.println("index of 0:"+r);
      
       r = FindIndex(a,1);
       System.out.println("index of 1:"+r);
      
       r = FindIndex(a,3);
       System.out.println("index of 3:"+r);
      
       r = FindIndex(a,2);
       System.out.println("index of 2:"+r);
      
       r = FindIndex(a,17);
       System.out.println("index of 17:"+r);
   }
}

In: Computer Science

How many types of errors can occur during the execution of a program? Discuss the circumstance...

How many types of errors can occur during the execution of a program? Discuss the circumstance when these types of errors can occur. Support your argument with examples.

In: Computer Science

A professor claimed that wire-based secure communication can be made secure using a continuum, grounded shield...

A professor claimed that wire-based secure communication can be made secure using a continuum, grounded shield around the hot wire carrying the signal. He claimed that, if Eve drills a hole into the shield to probe the hot wire, Alice and Bob could detect the change of the shield resistance and uncover the eavesdropping. Consider tamper resistance. Is such secure communication unconditionally secure?

In: Computer Science

Create a python graphics of a smiley face that includes hair and eyebrows. must start with...

Create a python graphics of a smiley face that includes hair and eyebrows.

must start with : from graphics import * or import graphics

code must include these dimensions:

Head: Circle(Point(400,400), 200)

R Eye: Circle(Point(350,350), 20)

L Eye: Circle(Point(450,350), 20)

Mouth1: Oval(Point(300,500),Point(500,400))

Mouth2: Oval(Point(315,475), Point(485,375))

In: Computer Science

For an assignment you wrote the method sortByLargestDepth in the class QuakeSortInPlace to sort earthquakes by...

For an assignment you wrote the method sortByLargestDepth in the class QuakeSortInPlace to sort earthquakes by their depth from largest depth to smallest depth using the selection sort algorithm. Modify this method to do exactly 50 passes and then modify testSort to run this method on the file earthQuakeDataDec6sample2.atom. The file may not be completely sorted as there are more than 50 quakes in the file. After running your program of 50 Selection sort passes on this file, what is the depth of the last earthquake in the ArrayList?

In: Computer Science

Quiz Question 1 (1 point) What characteristic of WLAN makes it vulnerable to a different set...

Quiz

Question 1 (1 point)

What characteristic of WLAN makes it vulnerable to a different set of attacks from wired LANs?

Question 1 options:

WLAN often is connected to a wired LAN

It's difficult to effectively contain the radio signals.

WLAN is very difficult to setup and manage

None of above

Question 2 (1 point)

Which of the following can be categorized an integrity attack to a WLAN?

Question 2 options:

War driving

Denial of service

802.11 Frame Injection

Radio frequency jamming

Question 3 (1 point)

Which of following is (are) vulnerability (ies) of Bluetooth technology?

Question 3 options:

Encryption key length is negotiable

No user authentication exists

End-to-end security isn't performed

All of above

Question 4 (1 point)

Which of following is (are) the problem(s) of WEP?

Question 4 options:

Use 40 or 104 bits keys that are static and common to all users

The encryption algorithm RC4 used in WEP is flawed

The IV is 24bits which is too short

All of above

Question 5 (1 point)

In Bluetooth ________, the authentication and encryption are completely bypassed.

Question 5 options:

security mode 1

security mode 2

security mode 3

security mode 4

Question 6 (1 point)

VLAN creates LAN workgroups that are independent of physical locations.

Question 6 options:

True

False

Question 7 (1 point)

Which of the following is(are) common goal(s) of wireless security policy?

Question 7 options:

Identify required security practices and measures

Dictate acceptable behavior and enforcement

Serving as a vehicel for achieving consensus

All of above

Question 8 (1 point)

Which of the following is the most effective way to protect your wireless network

Question 8 options:

SSID cloaking

MAC filitering

Reducing the AP power level

Using WPA2 security standard

Question 9 (1 point)

____________ outlines the security concepts that are important to the company for managers and technical custodians.

Question 9 options:

Governing policy

End-user policy

Technical policy

None of above

Question 10 (1 point)

Which of following statement about VPN is FALSE?

Question 10 options:

It extends a private network across a public network.

It can authenticate user

It protects the data being transmitted using encryption

VPN is very easy to deploy and manage

In: Computer Science

C++ Write a program to declare an array of double of size 25, ask the user...

C++

Write a program to declare an array of double of size 25, ask the user to input all array elements from the keyboard, then write a function named out_of_order that will test this array for the condition a[0] >= a[1] >= a[2] >= ... > a[24]

The function returns a -1 if the elements are not out of order, otherwise it returns the index of the first element that is out of order. Explain what you do to avoid out of bounds array access.

In: Computer Science

Hello, I am using BASH. I need to write a conditional statement using grep. I want...

Hello, I am using BASH. I need to write a conditional statement using grep. I want the computer to echo true if it detects any numerical character in the first line of StrepList.txt. However, the computer tells me that "grep: [0-9]: No such file or directory"

if (head -n 1 StrepList.txt | grep -o [0-9] -eq TRUE);then

echo "Contains numbers"

else

echo "No numbers"

fi

In: Computer Science