Reference no: EM131249666
1. (a)Write a Java program that displays the value of (a + b) + c and a + (b + c), where a is a float variable, b is the negation of a, and c is 1.0.
(b) Using this program, determine the smallest positive integer n such that assigning a the value 10n causes the expressions (a + b) + c and a + (b + c) to have different values. Your answer should include your program's source code and the output that it produces when executed.
2. Write a single (non-nested) Java statement that displays the following message: "Your shopping cart contains 5 items" Assuming that variable n contains the number of items. If n has the value 1, the statement should display the following message instead: "Your shopping cart contains 1 item" You may not use the if statement or switch statement. Your statement must consist of a single call of System.out.println. Simplify your answer as much as possible.
3. Assume that the C array a has been declared as follows:
int a[N][N];
The following loop initializes the elements of a:
for (int i = 0; i < N; i++)
for (int j = 0; j < N; j++)
a[i][j] = i * N + j;
Rewrite this loop so that (a) it uses a single for statement and (b) it uses a pointer, not two integers, to keep track of which array element is the next to be initialized. The only variable that should appear in your code (other than a itself) is the pointer variable.
What load is shared by each material
: a copper rod of 40mm dai surroundedhighly by a cast iron tube of 80mm external dia the ends being firmly fasten together .when put of a compressionload of 30kn what load is shared by each material and also determine bar shortend.
|
Galactic element clues to our earth elements
: Use information you have learned to help you match the Galactic Element Clues to our Earth elements found in the Periodic Table below.
|
Information technology security policy framework
: Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. Additionally, there are many security frameworks that organizations commonly reference when developing t..
|
How did the leaders demonstrate flexibility and adaptability
: How did the leaders demonstrate flexibility and adaptability? Please provide examples. How did the leaders apply aspects of the path-goal theory to this situation? Provide examples. Did the leaders communicate effectively with all of the stakeholders..
|
Determine the smallest positive integer
: Using this program, determine the smallest positive integer n such that assigning a the value 10n causes the expressions (a + b) + c and a + (b + c) to have different values. Your answer should include your program's source code and the output tha..
|
Is there omission or censorship of some material
: How were the articles framed? Do youdetect different political orientations in the newspapers? Do the articles communicate any of the four "biases" that Bennettdiscusses?Is there omission or censorship of some material? Do you notice any otherimp..
|
Find a code for the source
: Using base-3 logarithms, compute the entropy of this source. - Assuming that there are three characters 0,1,2 in the code alphabet, find a code for the source that has average length equal to its base-3 entropy.
|
Why is the relational model important
: 1. Why is the relational model important? 2. Define the term entity and give an example of an entity. 4. Give an example of a relationship.
|
How black lives matter started untill the case of ferguson
: How black lives matter started untill the case of ferguson. It should have 15 citation including names and sources. The information only can be collected if the person which weote the articule is an expert or somehow is related to the movement.
|