Print the content of the array

Assignment Help Basic Computer Science
Reference no: EM131910485

1. Write method print that will take a two dimensional character array as input, and print the content of the array. This two dimensional character array represents a Tic Tac Toe game. 

2. Write main method that creates several arrays and calls the print method. Below is an example of my main method:

System.out.println("First Tic Tac Toe: " );

char[][] ttt1 = {

{'X','O','X'},

{'0','O','X'},

{'X','X','O'}};

print(ttt1);

System.out.println("Second Tic Tac Toe: " );

char[][] ttt2 = {

{'O','O','X'},

{'0','O','X'},

{'X','X','O'}};

print(ttt2);

3. Create zip file that contains your Java programs. Include a screenshot of each program execution. You can either paste the screenshot into a Word document or simply paste it into the Comments field when submitting your homework. A sample screenshot of running my programs is attached below:

Reference no: EM131910485

Questions Cloud

What are the potential problems of poor database design : 1. Discuss some of the ways in which data mining can help a company generate more business.
What is the value-at-risk for portfolio : What is the Value-at-Risk (VaR) for portfolio B? How about portfolio A? What is the expected-shortfall (ES) for portfolio B? How about portfolio A?
Advantages and disadvantages of modular data centers : Compare traditional data centers to the new modular data center concept. What are the advantages and disadvantages of modular data centers?
What is the value of the sum of squares for gender : V-303-TOL1 - Applied Statistics Assignment - What is the value of the sum of squares for gender and what does this number represent
Print the content of the array : Write method print that will take a two dimensional character array as input, and print the content of the array.
Discuss the workforce planning process : Discuss the workforce planning process. After discussing each step, explain what would happen if an organization did not follow the workforce planning process.
Provide your group with a brief overview of your topic : You will provide your group with a brief overview of your topic and then highlight the most significant or interesting information from your paper.
What is the net present value of this coupon bond : What is interest rate term structure in terms of yield curve y(t)? What is the net present value (NPV) of this coupon bond?
Develop a variety of elliptic curve cryptography schemes : Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptography schemes, including key exchange, encryption, and ___________ .

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Distinguish between inheriting interface and implementation

(Inheriting Interface vs. Implementation) Distinguish between inheriting interface and inheriting implementation.

  Redundancy and data independence play

1. Differentiate the role that data redundancy and data independence play in the database management system concept. Is either of these concepts desirable for a database? Explain your decision for choosing the concept that is desirable.

  Panel''s descriptions of the three levels of evidence

For each recommendation, they ranked the evidence as level A (strongest), B, or C (weakest). Here, inscrambled order, are the panel's descriptions of the three levels of evidence.9 Which is A, which B, and which C? Explain your ranking.

  Verify that the pcm curve is correct

Compare the performance of the PCM/QPSK system with that for PCM/BPSK and for the ideal case by sketching the (S/N)out characteristic.

  More complex program that has tight coupling

In Java, coupling is how much one class knows about another. For example, having classes A, B and C where class C knows the inner elements of A and/or B. Do we think this is a good idea or not so good?

  Development of enterprise architecture-existing it resources

Discuss what concepts are important to share during this presentation in particular. Also discuss, in general, the relationship between development of enterprise architecture and existing IT resources and processes.

  Research the key terms

Research the key terms

  Advantage and disadvantage of sending large packets

Assume we have created a packet-switched internet. Using the TCP/IP protocol suite, we need to transfer a huge file. What are the advantage and disadvantage of sending large packets?

  Convert 6bd3h into its binary and decimal equivalent

Convert 6BD3H into its Binary and Decimal equivalent

  Emulate a target add instruction and a target jump-on-zero

Also sketch the particular host instructions needed to emulate a target add instruction and a target jump-on-zero instruction.

  A digital forensic investigator for a healthcare organizatio

Imagine you are a digital forensic investigator for a healthcare organization. You learn from your internal information security department that an employee has been using password-cracking software to access confidential customer insurance informati..

  Working for government more attractive to college graduates

What could public employers do to make working for government more attractive to college graduates?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd