I want to know how can I fix this program so it can work properly....can someone run it and give me the fixed version but do not the entire program bear with this one please and thanks in advance!!!!!
import java.util.Scanner;
public class ifPractice
{
public static void main(String[] args)
{
Scanner KB = new Scanner(System.in);
{
double option;
double option02;
double stu_gradeTest01;
double stu_gradeTest02;
double stu_gradeTest03;
double final_grade;
{
System.out.println("Enter #1 to see what test to grade first, #2
for student's average, #3 " +
"to see what is the final grade for the student: ");
option = KB.nextDouble();
if(option == 1)
{
System.out.println("Let's see which exam to grade
first....");
System.out.println("Now please choose #4 for first exam; #5 for
second exam; #6 for final exam: ");
option02 = KB.nextDouble();
if(option02 == 4)
{
System.out.println("Grade exam one: ");
stu_gradeTest01 = KB.nextDouble();
System.out.println("The first exam: " + stu_gradeTest01);
}
else if(option02 == 5)
{
System.out.println("Grade exam two: ");
stu_gradeTest02 = KB.nextDouble();
System.out.println("The second exam: " + stu_gradeTest02);
}
else if(option02 == 6)
{
System.out.println("Grade exam three: ");
stu_gradeTest03 = KB.nextDouble();
System.out.println("The third exam: " + stu_gradeTest03);
}
else
System.out.println("Invalid entry.... program in lockdown until
further notice....");
}
else if(option == 2)
{
System.out.println("These are all of the grades: ");
stu_gradeTest01 = KB.nextDouble();
stu_gradeTest02 = KB.nextDouble();
stu_gradeTest03 = KB.nextDouble();
final_grade = (stu_gradeTest01 + stu_gradeTest02 +
stu_gradeTest03)/3.0;
System.out.println("The final grade is: " + final_grade);
}
else
System.out.println("Invalid entry...llocking system
down....");
}
else if(option == 3)
{
System.out.println("The final grade the student got was: ");
final_grade = KB.nextDouble();
if(final_grade >= 90)
{
System.out.print("A");
final_grade = KB.nextDouble();
}
else if(final_grade >= 80 )
{
System.out.print("B");
final_grade = KB.nextDouble();
}
else if(final_grade >= 70)
{
System.out.print("C");
final_grade = KB.nextDouble();
}
else if(final_grade <= 65)
{
System.out.println("Your are failing");
final_grade = KB.nextDouble();
}
else if(final_grade >= 64)
{
System.out.println("F");
final_grade = KB.nextDouble();
}
else
{
System.out.println("Invalid enry.....lllocking down....");
}
}
else
System.out.println("Invalid entry");
}
}
}
In: Computer Science
Complete the "Reducing pops and clicks" step-by-step found in Lesson 5 from the textbook “Adobe Audition CC Classroom in a Book.” After performing all the steps (1-9), save the file with the file name MajorPopsFix.wav and submit it.
In: Computer Science
Nice shirt! In Java, write a program that uses a function that takes in the user's name and prints out compliments directed to them. The program should provide a sentinel value by asking if they've had enough compliments and will continue until they type "yes". Include 3 different compliments pulled at random and BE SURE TO USE A FUNCTION/METHOD to take in the user's name.
Sample output:
Enter your name: John Smith
John Smith, you have a great smile!
Would you like another compliment? [yes/no] yes
John Smith, you are tall and handsome!
Would you like another compliment? [yes/no] yes
John Smith, you are a quick learner!
Would you like another compliment? [yes/no] no
Have a nice day!
In: Computer Science
Instructions
Submission Guidelines
This assignment may be submitted for full credit until Friday, October 4th at 11:59pm. Late submissions will be accepted for one week past the regular submission deadline but will receive a 20pt penalty. Submit your work as a single HTML file. It is strongly recommended to submit your assignment early, in case problems arise with the submission process.
Assignment
For this assignment, you will write a timer application in HTML and JavaScript.
Your HTML document should contain the following elements/features:
Evaluation
Your assignment will be graded according to whether all the required elements are present and in the correct formats and all required functionalities are operable.
In: Computer Science
In: Computer Science
Javascript:
Create a loop that counts from 1 to 20. // If the current number is even, add it to this empty array: var myArray = []; // If the current number is odd, log an odd number warning to // the console. // However, if the number equals 19, set a debug breakpoint. // After the loop completes, print the array to the console.
var myArray = [];
for (var i = 1; i <= 20; i++) {
if (i % 2 === 1) {
console.warn("odd number");
} else {
myArray.push(i);
}
if (i === 19) {
console.debug();
}
}
console.log(myArray);
The code is not printing to my screen. help please
In: Computer Science
I wanted c++ program for the question
Problem 6 - Weighted Graph
In the vertex and edge structure defined below
Vertex Edge
Vertex
SFO 2702 BOS
SFO 1846 ORD
ORD 867
BOS
ORD 742
JFK
JFK 189
BOS
SFO 1464 DFW
DFW 802
ORD
DFW 1123 MIA
MIA 1092 JFK
MIA 1258 BOS
SFO 339
LAX
LAX 1235 DFW
LAX 2342 MIA
a) Find the shortest distance between
ORD and LAX.
b) Find the shortest distance between
JFK and SFO.
c) Find the minimum spanning tree.
In: Computer Science
For the problem below, please estimate the worst-case Running Time for a random array of size n, and prove that it is indeed ( ). Please show all your work. Just stating something like "since 2 Binary Search runs in ( ) time, our algorithm has the same runtime estimate" is not enough. A rigorous explanation is expected.
import java.util.*;
public class Main
{
static int binarySearch(int arr[], int l, int r, int x)
{
if (r >= l) {
int mid = l + (r - l) / 2;
// If the element is present at the middle itself
if (arr[mid] == x)
return mid;
// If element is smaller than mid, then it can only
// be present in left subarray
if (arr[mid] > x)
{ int rr= binarySearch(arr, l, mid - 1, x);
if(rr==-1)//modified
{
return binarySearch(arr, mid + 1, r, x);
}
return rr;
}
// Else the element can only be present in right
// subarray
int k =binarySearch(arr, mid + 1, r, x);
//modified part
if(k==-1)
{
return binarySearch(arr, l, mid - 1, x);
}
return k;
}
// We reach here when element is not present in array
return -1;
}
public static int FindIndex(int[] arr, int x)
{
if(arr.length==0)return -1;//if array is empty
return binarySearch(arr,0,arr.length-1,x);
}
public static void main(String[] args) {
int a[] = {3, 17, 28, 935, 1011, -10, 0, 2}
;//declaring array
int r = FindIndex(a,935);
System.out.println("index of
935:"+r);
r = FindIndex(a,-10);
System.out.println("index of
-10:"+r);
r = FindIndex(a,0);
System.out.println("index of
0:"+r);
r = FindIndex(a,1);
System.out.println("index of
1:"+r);
r = FindIndex(a,3);
System.out.println("index of
3:"+r);
r = FindIndex(a,2);
System.out.println("index of
2:"+r);
r = FindIndex(a,17);
System.out.println("index of
17:"+r);
}
}
In: Computer Science
How many types of errors can occur during the execution of a program? Discuss the circumstance when these types of errors can occur. Support your argument with examples.
In: Computer Science
A professor claimed that wire-based secure communication can be made secure using a continuum, grounded shield around the hot wire carrying the signal. He claimed that, if Eve drills a hole into the shield to probe the hot wire, Alice and Bob could detect the change of the shield resistance and uncover the eavesdropping. Consider tamper resistance. Is such secure communication unconditionally secure?
In: Computer Science
Create a python graphics of a smiley face that includes hair and eyebrows.
must start with : from graphics import * or import graphics
code must include these dimensions:
Head: Circle(Point(400,400), 200)
R Eye: Circle(Point(350,350), 20)
L Eye: Circle(Point(450,350), 20)
Mouth1: Oval(Point(300,500),Point(500,400))
Mouth2: Oval(Point(315,475), Point(485,375))
In: Computer Science
For an assignment you wrote the method sortByLargestDepth in the class QuakeSortInPlace to sort earthquakes by their depth from largest depth to smallest depth using the selection sort algorithm. Modify this method to do exactly 50 passes and then modify testSort to run this method on the file earthQuakeDataDec6sample2.atom. The file may not be completely sorted as there are more than 50 quakes in the file. After running your program of 50 Selection sort passes on this file, what is the depth of the last earthquake in the ArrayList?
In: Computer Science
Quiz
Question 1 (1 point)
What characteristic of WLAN makes it vulnerable to a different set of attacks from wired LANs?
Question 1 options:
|
WLAN often is connected to a wired LAN |
|
|
It's difficult to effectively contain the radio signals. |
|
|
WLAN is very difficult to setup and manage |
|
|
None of above |
Question 2 (1 point)
Which of the following can be categorized an integrity attack to a WLAN?
Question 2 options:
|
War driving |
|
|
Denial of service |
|
|
802.11 Frame Injection |
|
|
Radio frequency jamming |
Question 3 (1 point)
Which of following is (are) vulnerability (ies) of Bluetooth technology?
Question 3 options:
|
Encryption key length is negotiable |
|
|
No user authentication exists |
|
|
End-to-end security isn't performed |
|
|
All of above |
Question 4 (1 point)
Which of following is (are) the problem(s) of WEP?
Question 4 options:
|
Use 40 or 104 bits keys that are static and common to all users |
|
|
The encryption algorithm RC4 used in WEP is flawed |
|
|
The IV is 24bits which is too short |
|
|
All of above |
Question 5 (1 point)
In Bluetooth ________, the authentication and encryption are completely bypassed.
Question 5 options:
|
security mode 1 |
|
|
security mode 2 |
|
|
security mode 3 |
|
|
security mode 4 |
Question 6 (1 point)
VLAN creates LAN workgroups that are independent of physical locations.
Question 6 options:
|
True |
|
|
False |
Question 7 (1 point)
Which of the following is(are) common goal(s) of wireless security policy?
Question 7 options:
|
Identify required security practices and measures |
|
|
Dictate acceptable behavior and enforcement |
|
|
Serving as a vehicel for achieving consensus |
|
|
All of above |
Question 8 (1 point)
Which of the following is the most effective way to protect your wireless network
Question 8 options:
|
SSID cloaking |
|
|
MAC filitering |
|
|
Reducing the AP power level |
|
|
Using WPA2 security standard |
Question 9 (1 point)
____________ outlines the security concepts that are important to the company for managers and technical custodians.
Question 9 options:
|
Governing policy |
|
|
End-user policy |
|
|
Technical policy |
|
|
None of above |
Question 10 (1 point)
Which of following statement about VPN is FALSE?
Question 10 options:
|
It extends a private network across a public network. |
|
|
It can authenticate user |
|
|
It protects the data being transmitted using encryption |
|
|
VPN is very easy to deploy and manage |
In: Computer Science
C++
Write a program to declare an array of double of size 25, ask
the user to input all array elements from the keyboard, then write
a function named out_of_order that will test this array for the
condition a[0] >= a[1] >= a[2] >= ... > a[24]
The function returns a -1 if the elements are not out of order,
otherwise it returns the index of the first element that is out of
order. Explain what you do to avoid out of bounds array access.
In: Computer Science
Hello, I am using BASH. I need to write a conditional statement using grep. I want the computer to echo true if it detects any numerical character in the first line of StrepList.txt. However, the computer tells me that "grep: [0-9]: No such file or directory"
if (head -n 1 StrepList.txt | grep -o [0-9] -eq TRUE);then
echo "Contains numbers"
else
echo "No numbers"
fi
In: Computer Science