Problem regarding the exception handling

Assignment Help Basic Computer Science
Reference no: EM13829431

Problem:

Exception Handling

First, create three exception classes named NumberHighException, NumberLowException, and NumberNegativeException. Both NumberHighException and NumberLowException should be directly subclassed from the Exception class, but NumberNegativeException should be subclassed from NumberLowException. You can use the BadDataException class that was defined in this module as the model for your exception classes.

Next create a class called Verify that will be used to validate that a number is within a specified range. It should have one constructor that has two int parameters. The first parameter is the minimum number in the range, and the second parameter is the maximum number in the range.

In addition to the constructor, the Verify class should have one method that is named validate. The validate method should have a single parameter of data type int. The parameter contains the number that is being validated. If the value of the parameter is less than zero, the method should throw a NumberNegativeException. If the value is less than the minimum value of the range, it should throw a NumberLowException. If the value is greater than the maximum value of the range, it should throw a NumberHighException. If the value is within the specified range, no exception should be thrown.

Once all of these classes are created, create the driver class called Program5. The driver class should instantiate a Verify object with a range of 10 to 100. It should then do the following:

  • Prompt the user to input a number within the specified range.
  • Use a Scanner to read the user input as an int. You can ensure that an int was entered because the nextInt method throws an InputMismatchException if any non-digits are entered.
  • Call the validate method to validate that the number is within the range.
  • Print an appropriate error message if the value is not within the range, or print the value if it is within the range.

You may use any Java IDE you choose to develop your source code, compile and link your code, and execute your program (jGRASP is recommended). Or you may use the Windows Command Prompt.

Summary

This question is from Computer Science and it explains about writing a program in Java upon Exception handling which comprises negative number exception, high number exception, low number exception, input mismatch exception, etc.

Reference no: EM13829431

Questions Cloud

Implement elementary mathematical operators-complex number : This question considers implementation of elementary mathematical operations on complex numbers in C++ programming language. The code should allow user to enter the real and imaginary parts of two complex numbers, choose an operation (either addit..
Make monthly payments : Suppose you are considering buying a new car. You are going to make monthly payments (at the end of each month) on a loan of $33,000 for five years. If the annual percentage rate is 7.5% what is your monthly payment? Based on your payment, what is th..
Compare real life families and families depicted on movies : The question in Sociology and the question explain about comparing real life families and families depicted on TV shows or movies. The major difference between the two has been highlighted in the answer.
What annual interest rate-future with quarterly compouding : What annual interest rate do you need for an investment to be worth $10,207.73 seven years in the future with quarterly compouding if you deposit $6,500 today?
Problem regarding the exception handling : First, create three exception classes named NumberHighException, NumberLowException, and NumberNegativeException. Both NumberHighException and NumberLowException should be directly subclassed from the Exception class
How does conflict affect an organization : How would you define conflict? Is conflict always bad? How does conflict affect an organization? What conflict resolution strategies exist for organizational leaders? In what situations may these strategies be used
Annual rate of return with semi-annual compounding : How many years will it take for a investment to be worth $8,023.53 in the future, with a deposit today of $5,000 at a 6% annual rate of return with semi-annual compounding?
Concept of required return on proposed capital investments : Explain the theory behind the concept of "required return" on proposed capital investments.
The foregoing transactions using accounting equation : Here is a list of transactions for a newly-formed corporation that provides professional tax services: Organized the business as a professional corporation, investing $28,000 cash in the business and issuing 1,000 shares of no-par common stock. Recei..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identify the security advantages of cloud-based solutions

A.Identify the security advantages of cloud-based solutions. B.Identify the security disadvantages if cloud-based solutions.

  Evaluate for risk management purposes

Choose three information assets that a typical organization has and evaluate for risk management purposes which vulnerability should be evaluated for additional controls first?

  What is a copy constructor

What is a copy constructor? When would you use a copy constructor? Can you give an example?

  Information of all the processes pointed by init

Print some information of all the processes pointed by init_task, something similiar to "ps -ef", including UID, PID, PPID, thread name, etc.

  Specifically, for the session long project for this module

Specifically, for the Session Long Project for this Module, you are to review the Mitnick Security Consulting website [available at http://mitnicksecurity.com/]. Kevin Mitnick was for a number of years one of the most successful bad-guy hackers in th..

  Explain findings-conducting internet search for for cde file

Network asminisrator mentions that other "CDE" files have been sent through the FTP server to another site. Explain your findings after conducting the internet search for "CDE" files.

  What are some presentation-tools options available

What are some presentation-tools options available in the market place? Pick 3 and research them. What are the advantages and disadvantages

  Detailed security requirements for inclusion in an rfp

Document 20 detailed security requirements for inclusion in an RFP. These requirements should focus specifically on security of the logon process (authentication) of users into a networked application.

  Poductive discussion on your findings related to the human

At the next meeting, you and the team had a very productive discussion on your findings related to the human resource planning and related team management processes. Everyone feels that it is time to present your findings to Sam and Gloria.

  Computer crime essay

Identify and discuss the steps necessary to make electronic evidence admissible in court.

  Create a base class

Create 2-3 instances of each of your classes, and call each of your methods.

  Most important benefit of virtualization

Green computing is the study and practice of ecofriendly computing resources. Green computing is often seen where huge data centers apply server virtualization to reduce the number of servers that would otherwise have to be installed. Determine wh..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd