Redisplays the menu after the user selected operation

Assignment Help Basic Computer Science
Reference no: EM131275048

I have the pseudocode of this question but Im stuck on structuring the code into Java. the question is: Design a algorithm that displays the following menu, gets the user selection, and validates the selection.

Main Menu

1. Open a new document.

2. Close the current document.

3. Print the current document.

4. Exit the program

Enter your selection

The pseudocode is: Design a algorithm that displays the following menu, gets the user selection, and validates the selection.

Main Menu

1. Open a new document.

2. Close the current document.

3. Print the current document.

4. Exit the program

Enter your selection

The other question i need Java for are: 2.) Design a case structure that can be used with the algorithm. The case structure should call a module named openDocumnet if the user selected item 1, should call a module named closeDocument if the user selected item 2, should call a module named printDocument if the user selected item 3.

3.)Put the algorithms that you designed for Questions 1 and 2 together inside a loop that redisplays the menu after the user's selected operation is performed, or exits if the user selects item 4 from the menu.

4.)Look for ways to modularize the algorithm that you designed for Algorithm Workbench Question 3 and modify it accordingly

Reference no: EM131275048

Questions Cloud

Identify risk and apply risk management processes : BSBRSK401 - Identify risk and apply risk management processes Review the scenario information contained in the Appendices of this assessment task and identify the internal and external context for risk management with respect to the MacVille scenario..
Identify the most senior leader of the organization : Identify and explain the stakeholder organization perspective: Payer (insurers, government payers, and employers); Provider (entities and individuals providing services in the health care system); Patient (consumers); or Producer (a product develo..
Explain formal and informal structures and decipher : Explain formal and informal structures and decipher between traditional and non-traditional frameworks. Describe the characteristics that set functional, divisional, and matrix structures apart.
State the hume-rothery rules and explain the rationale : Based on Hume-Rothery's conditions, which of the following systems would be expected to display unlimited solid solubility?
Redisplays the menu after the user selected operation : Put the algorithms that you designed for Questions 1 and 2 together inside a loop that redisplays the menu after the user's selected operation is performed, or exits if the user selects item 4 from the menu.
What is the mirror image rule : What must a party prove to recover under the theory of quasi-contract?- What is the mirror-image rule?- What is the mailbox rule?
Create action plan and calendar to move your business plan : Create an action plan and calendar to move your business plan forward? Review your long-term and short-term objectives and create a more cohesive plan to help meet your goal?
What is required to prove promissory estoppel : List the four types of consideration described in the text.-  What is required to prove promissory estoppel when consideration is missing?
List the three elements of accord and satisfaction : List and describe the three exceptions to the preexisting-duty rule.-  List the three elements of accord and satisfaction.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Process of creating and exporting a schedule report

Describe the process of creating and exporting a schedule report for the medical practice. What is the purpose of the schedule report?

  Write a program that will define the f string manipulation

1.) Write a program that will define the following string manipulation functions. Each is analogous to thecorresponding C++ string function.

  You are the lead forensic technician within a medium size

create a 15-20 slide powerpoint presentation addressing the following scenarioyou are the lead forensic technician

  Describe the data normalization process

Describe the data normalization process including its specific steps. Why is it referred to as a "decomposition process?"

  Draw a signal graph and identify the nine components

Draw a signal graph and identify the nine components

  Find the edit distances between the following pairs

Mutation, where one symbol is replaced by another symbol. Note that a mutation can always be performed by an insertion followed by a deletion, but if we allow mutations, then this change counts for only 1, not 2, when computing the edit distance.

  Why is an e-mail use policy important

1). Why is the issue of trust an integral part of a security policy 2). Why is an e-mail use policy important?

  Difference between it and information systems

Discuss the advantages and disadvantages of spreadsheet software as number-crunching software.

  Identify all candidate keys for each relation

Create a Relation Schema for S given above. Write out both the full and the abbreviated schemas as shown on Slide of the lecture notes in Module 3. Using a table as a physical representation, create a relation for S as defined above. The table sho..

  Describe two different kinds of communication software

Is Web search a database query? Explain your answer.

  Identify content and functional requirements

Identify Content and Functional Requirements

  Which of these conditions returns true

Which of these conditions returns true? Check the Java documentation for the inheritance patterns.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd