Design a RomanNumerals class that takes a number within 1 to 10 and display the Roman numeral version of that number (I, II, III, IV, V … X). If the number entered by the user is outside the range of 1-10, the program should display an error message. Code a driver class RomanNumeralsApp to test the class by asking user to enter a number, creating an object of RomanNumerals and calling its methods getNumber, setNumber, convertNum, and displayResult to perform the described task.
Answer:
Explanation:
The following code is written in Java. It creates a RomanNumberals class with all of the requested methods, including a convertNum method and displayResults method. The user is then asked to input a number within the main method. A RomanNumeral object is created, passed the userInput and all of it's methods are called for testing. A test output can be seen in the attached image below.
import java.util.Scanner;
class Brainly {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.println("Enter a number: ");
int number = in.nextInt();
RomanNumerals romanNumeral1 = new RomanNumerals();
romanNumeral1.setNumber(number);
System.out.println("Test getNumber Method: " + romanNumeral1.getNumber());
romanNumeral1.convertNumber();
romanNumeral1.displayResult();
}
}
class RomanNumerals {
int number;
String romanNumeral;
public RomanNumerals() {
}
public int getNumber() {
return number;
}
public void setNumber(int number) {
this.number = number;
}
public void convertNumber() {
switch (this.number) {
case 1: romanNumeral = "I"; break;
case 2: romanNumeral = "II"; break;
case 3: romanNumeral = "III"; break;
case 4: romanNumeral = "IV"; break;
case 5: romanNumeral = "V"; break;
case 6: romanNumeral = "VI"; break;
case 7: romanNumeral = "VII"; break;
case 8: romanNumeral = "VIII"; break;
case 9: romanNumeral = "IX"; break;
case 10: romanNumeral = "X"; break;
default: System.out.println("Not a valid number"); break;
}
}
public void displayResult() {
System.out.println("Number " + this.number + " is represented as " + this.romanNumeral);
}
}
After reading all L02 content pages in Lesson 02: Inheritance and Interfaces, you will complete this assignment according to the information below.Do not use the scanner class or any other user input request. You application should be self-contained and run without user input.Assignment ObjectivesPractice on implementing interfaces in JavaFootballPlayer will implement the interface TableMemberOverriding methodswhen FootballPlayer implements TableMember, FootballPlayer will have to write the real Java code for all the interface abstract methodsDeliverablesA zipped Java project according to the How to submit Labs and Assignments guide.O.O. Requirements (these items will be part of your grade)One class, one file. Don't create multiple classes in the same .java fileDon't use static variables and methodsEncapsulation: make sure you protect your class variables and provide access to them through get and set methodsAll the classes are required to have a constructor that receives all the attributes as parameters and update the attributes accordinglyAll the classes are required to have an "empty" constructor that receives no parameters but updates all the attributes as neededFollow Horstmann's Java Language Coding GuidelinesOrganized in packages (MVC - Model - View Controller)Contents
Solution :
App.java:
import Controller.Controller;
import Model.Model;
import View.View;
public class App
{
public static void main(String[] args) // Main method
{
Model model = new Model(); // Creates model object.
View view = new View(); // Creates view object.
Controller controller = new Controller(view, model); // Creates controller object that accepts view and model objects.
}
}
[tex]\text{Controller.java:}[/tex]
package Controller;
[tex]\text{impor}t \text{ Model.Model;}[/tex]
import View.View;
[tex]\text{public class Controller}[/tex]
{
Model model; // Model object
View view; // View object
public Controller(View v, Model m) // Method that imports both model and view classes as objects.
{
model = m;
view = v;
//view.basicDisplay(model.getData()); // basicDisplay method from View class prints FootballPlayer objects as Strings from Model class.
view.basicDisplay(model.getMembers().get(1).getAttributeName(3));
view.basicDisplay(model.getMembers().get(1).getAttribute(3));
view.basicDisplay(model.getMembers().get(1).getAttributeNames());
view.basicDisplay(model.getMembers().get(1).getAttributes());
view.basicDisplay("size of names=" + model.getMembers().get(1).getAttributeNames().size());
view.basicDisplay("size of attributes=" + model.getMembers().get(1).getAttributes().size());
}
}
FootballPlayer.java:
package Model;
import java.util.ArrayList;
public class FootballPlayer extends Person implements TableMember { // Used "extends" keyword to inherit attributes from superclass Person, while using "implements" to implement methods from TableMember interface.
private int number; // Creating private attribute for int number.
private String position; // Creating private attribute for String position.
public FootballPlayer(String name, int feet, int inches, int weight, String hometown, String highSchool, int number, String position) // Full parameter constructor for FootballPlayer object (using "super" keyword to incorporate attributes from superclass).
{
super(name, feet, inches, weight, hometown, highSchool); // Used super keyword to include attributes from superclass.
this.number = number; // Value assigned from getNumber method to private number instance variable for FootballPlayer object.
this.position = position; // Value assigned from getPosition method to private position instance variable for FootballPlayer object.
}
public FootballPlayer() // No parameter constructor for FootballPlayer object.
{
this.number = 0; // Default value assigned to private number instance variable under no parameter constructor for FootballPlayer object.
this.position = "N/A"; // Default value assigned to private position instance variable under no parameter constructor for FootballPlayer object.
}
Override
public String getAttribute(int n) // getAttribute method that is implemented from interface.
{
switch (n) { // Switch statement for each attribute from each FootballPlayer object. Including two local attributes, denoted by this. While the others are denoted by "super".
case 0:
return String.valueOf(this.number); // Use of the dot operator allowed me to discover String.valueOf method to output int attributes as a string.
case 1:
return this.position;
case 2:
return super.getName();
case 3:
return super.getHeight().toString();
case 4:
return String.valueOf(super.getWeight());
case 5:
return super.getHometown();
case 6:
return super.getHighSchool();
default:
return ("invalid input parameter");
}
}
Override
public ArrayList<String> getAttributes() // getAttributes ArrayList method that is implemented from interface.
{
ArrayList<String> getAttributes = new ArrayList<>();
for(int i = 0; i <= 6; i++){ // For loop to add each attribute to the getAttributes ArrayList from getAttributes method.
getAttributes.add(getAttribute(i));
}
return getAttributes;
}
Override
public String getAttributeName(int n) // getAttributeName method implemented from interface.
{
switch (n) { // Switch statement for the name of each attribute from each FootballPlayer object.
case 0:
return "number";
case 1:
return "position";
case 2:
return "name";
case 3:
return "height";
case 4:
return "weight";
case 5:
return "hometown";
case 6:
return "highSchool";
default:
return ("invalid input parameter");
}
}
A python code only runs the except block when _____. Group of answer choices all the statements in the try block are executed an error occurs in the preceding try block the programmer manually calls the except block an error occurs anywhere in the code
Answer:
Python only running exception block when try block fails
Explanation:
i do cyber security and i was learning this in high school
In Python, try and except statements are used to catch and manage exceptions. Statements that can generate exceptions were placed within the try clause, while statements that handle the exception are put within the except clause.
An exception should be caught by except block, which is used to test code for errors that are specified in the "try" block. The content of the "except" block is executed if such a fault/error appears.In Python, the exception block only runs when an error occurs in the try block.Therefore, the answer is "try block fails ".
Learn more:
brainly.com/question/19154398
job evaluation for technical consultant
How do u create a blank line between two lines in a document
Answer: Press enter at the end of the line.
Explanation:
If you press enter at the end of the line or sentence, it will start a new space underneath your line or sentence.
is a collection of information stored under a single name
[tex]\boxed{ File }[/tex] is a collection of information stored under a single name.
[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]
Answer:
Explanation:A collection of information that is stored on a computer under a single name, for example a text document, a picture, or a program. The association between a file and the program that created the file. Displays the contents of the current folder or library.
6.23 LAB: Convert to binary - functions Instructor note: This is a lab from a previous chapter that now requires the use of a function. If you weren't able to solve it before, think of this as a new opportunity. Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is: As long as x is greater than 0 Output x % 2 (remainder is either 0 or 1) x = x // 2 Note: The above algorithm outputs the 0's and 1's in reverse order. You will need to write a second function to reverse the string. Ex: If the input is: 6 the output is: 110 Your program must define and call the following two functions. The function integer_to_reverse_binary() should return a string of 1's and 0's representing the integer in binary (in reverse). The function reverse_string() should return a string representing the input string in reverse. def integer_to_reverse_binary(integer_value) def reverse_string(input_string)
Answer:
The program in Python is as follows:
import math
def integer_to_reverse_binary(integer_value):
remainder = ""
while integer_value>=1:
remainder+=str(integer_value % 2)
integer_value=math.floor(integer_value/2)
reverse_string(remainder)
def reverse_string(input_string):
binaryOutput=""
for i in range(len(input_string)-1,-1,-1):
binaryOutput = binaryOutput + input_string[i]
print(binaryOutput)
integer_value = int(input("Enter a Number : "))
integer_to_reverse_binary(integer_value)
Explanation:
This imports the math module
import math
This defines the integer_to_reverse_binary function
def integer_to_reverse_binary(integer_value):
This initializes the remainder to an empty string
remainder = ""
This loop is repeated while the integer input is greater than or equal to 1
while integer_value>=1:
This calculates the remainder after the integer value is divided by 2
remainder+=str(integer_value % 2)
This gets the floor division of the integer input by 2
integer_value=math.floor(integer_value/2)
This passes the remainder to the reverse_string function
reverse_string(remainder)
The reverse_string function begins here
def reverse_string(input_string):
This initializes the binaryOutput to an empty string
binaryOutput=""
This iterates through the input string i.e. the string of the remainders
for i in range(len(input_string)-1,-1,-1):
This reverses the input string
binaryOutput = binaryOutput + input_string[i]
This prints the binary output
print(binaryOutput)
The main begins here
This gets input for integer_value
integer_value = int(input("Enter a Number : "))
This passes the integer value to the integer_to_reverse_binary function
integer_to_reverse_binary(integer_value)
Every Java statement ends with: *
Period
Colon
Double quote
Semicolon
Answer:
semicolon is the answer
What do application in productivity suites have in common
Answer:
The function of the suites application is to create presentations and perform numerical calculations.
Explanation:
For minimization problems, the optimal objective function value to the LP relaxation provides what for the optimal objective function value of the ILP problem?
Answer:
A lower bound on the optimal integer value.
Explanation:
The question is poorly typed. The original question requires the optimal solution of the objective function of a minimization problem
I will answer this question base on the above illustration.
When an objective function is to be minimized, it means that the objective function will take the feasible solution with the least value.
The least value are often referred to as the lower bound.
What is a fruitful function? Explain with help of programming example?
plz
9- Which type of view is not present in MS
PowerPoint?
(A) Extreme animation
(B) Slide show
(C) Slide sorter
(D) Normal
Answer:
A.Extreme animation
hope it helpss
The number of host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0. Show the calculations.
Answer:
adress: 10101100.00010000.1 0000000.00000000
netmask: 11111111.11111111.1 0000000.00000000
Network: 172.16.128.0/17 10101100.00010000.1 0000000.00000000 (Class B)
Explanation:
ex: 10 -> 00001010
200 ->11001000
Explain in details:
(i) Deadlock
(ii) File manager
(iii) Process
(iv) Multiprogramming
(v) Software Classification
(vi) Virtual memory
Answer and Explanation:
Deadlock occurs when two operating systems on the same computer are hindering each other's execution, getting blocked, waiting for each one to run first. This can happen when a preemption has not occurred, when a mutual exclusion has occurred, or when one of the systems causes the other to not execute.
File manager is software that allows a computer user to create directories and organize files inside and outside of them.
Process is the term used to determine the functioning of computer software. When a software is started, it uses its own programming code to perform a specific activity.
Multiprogramming is the term used for the moment when an operating system allows the user to run more than one software at the same time. For this to happen, the computer needs to have a high processing capacity, to handle the effort of running several software simultaneously.
Software Classification is the process that determines the composition and different aspects that make up a software. In this way, it is possible to understand the usefulness and programming of this software.
Virtual memory is the use of secondary memory for caching. This allows the user to share files more securely and quickly, in addition to alleviating the problems that limited memory presents.
Given that EAX contains FFFF80C0h, which of the following would be true after executing the CWD instruction?
a. AX=FFFFh, DX=80C0h
b. EDX=FFFFFFFFh, EAX=FFFF80C0h
c. DX=FFFFh, AX=80C0h
d. cannot be determined
Answer:
c. DX=FFFFh, AX=80C0h
Explanation:
CWD instruction set all bits in DX register with same sign as in AX register. The effect is to create a 32 bit sign result. This will have same integer value as of 16 bit.
what is graphical browser ?
Answer:
Graphical browsers display text, images, and other web applications including video and audio files (as compared with text-only browsers).
what is the meaning of photography
[tex] \sf\underline{ Photography} \: is \: the \: way \: / \: process \: / \: art \\ \sf \: of \: taking \: beautiful \: pictures \\ \sf \: usually \: of \: amazing \: sceneries \: (it \: can \: be \: of \: other \: \\ \sf things \: as \: well) \: for \: visual \: pleasure. \: The \: attached \: picture \\ \sf \: is \: an \: example \: for \: a \: good \\ \sf\: type \: of \: photography. \: A \: person \: who \: practices \: the \: \\\sf art \: of \: photography \: is \: known \: as \: a \: \underline{ photographer}.[/tex]
Which report views shows how the report will look in print and enable you to make modifications to the print settings?
Answer:
Print preview
Explanation:
In Microsoft access the report view that will show you an accurate picture of what your print out will look like before it is printed is : Print preview
Microsoft access is a relational database that allows the usage and storage of information in and organization
x-1; while x ==1 disp(x) end, then the result a. infinity or b. (1)
Answer:
1 is the answer because ur trying to trick us
Explanation:
Which of the following CALL instructions writes the contents of EAX to standard output as a signed decimal integer?
a. call WriteInteger
b. call WriteDec
c. call WriteHex
d. call WriteInt
Answer:
d. call WriteInt
Explanation:
Required
Instruction to write to decimal integer
Of the 4 instructions, the call WriteInt instruction is used write to a decimal integer.
This is so, because the WriteInt instruction writes a signed decimal integer to standard output.
This implies that the output will have a sign (positive or negative) and the output will start from a digit other than 0 (i.e. no leading zero)
Thành phần bên trong nào thực hiện các tính toán và các phép toán logic?
a. Bộ vi xử lý
b. ROM_BIOS
c.Các chip RAM
d. Bo mạch chủ
Answer:
A
Explanation:
We will find an video named????
Help us and select once name.
Complete: B__in___t
Create a file named A10.java. Place all your code in this file. Create a publicstatic ArrayList of integers named intList.
Define a public static method addNumber(int i) that adds ito your list.
Exercise 2
Create a publicstatic HashMap of integers,integers namedintMap.
Define a public static method addPair(int i,int j) that adds i,jto your HashMap (make ithe key and j the value).
Explanation:
The file named as A10.java has been attached to this response. It contains the source code for the exercises. The source code contains comments explaining important parts of the code.
A few things to note;
i. To add an item to an arraylist, the add() method is used. For example to add an integer 7 to the arraylist named intList, simply write;
intList.add(7);
ii. To add an item to a hashmap, the put() method is used. The put method receives two parameters which are the key and value respectively. The key is a form of identifier used to store or retrieve a particular value in a hashmap. To store an integer 8 with a key of 5 in a hashmap named intMap, for example, simply write;
intMap.put(5,8);
An infographic displays the relative frequencies of the 100 most common emojis used in text messaging for each of the last 12 months. Which of the following conclusions cannot be drawn from such a representation of emoji usage?
a. You can determine the growth or decline in popularity of a particular emoji.
b. You can determine what percentage of text messages contains a particular emoji.
c. You can determine how long the most popular emoji has held the #1 position.
d. You can determine the average age of emoji users based on emoji use.
Answer:
d. you can determine the average age of emoji users based on emoji use.
Explanation:
The infographic displays 100 most common emoji used in text messaging. This information can be used to determine percentages of text message which contains particular emoji. This details can not determine the age of emoji user based in emoji use.
what is the Is option that prints the author of a file
Answer:
Print.. is your answer...
bao bì chủ động active packaging và bao bì thông minh intelligent packaging khác biệt như thế nào
answer:
yes....................
What does Falstaff do to protect himself in battle?
which feature of organisations to manage needs to know about to build and use information system successfully
The correct answer to this open question is the following.
The feature of organizations to manage needs to know about to build and use information system successful is the following.
Managers of successful organizations should know that companies have hierarchies and different structures in which these companies are organized.
Every company use systems and procedures that could be specialized to the degree the company requires. For that system to function, they have to be perfectly interconnected to all the areas of the company. The goal: to maximize efficiency and accomplish the goals.
Systems and procedures should take into consideration the culture and diversity of the workplace. There are interest groups in every organization that have special characteristics and requirements that have to be taken into consideration to create a much better system.
Good managers must be aware of these elements, and the different roles, goals, management styles, tasks, incentives, and departmental structure of the company so the system can better serve the purpose of the entire organization.
Explain the
4 ways
ways of arranging icons.
Answer:
There are 4 ways of arranging icons:
By name.by type.by date or by size.Explanation:
Click right-click a blank desktop area and then click Arrange icons to arrange icons for name, type, date, or size. Click on the command to show how the icons should be organized (by Name, by Type, and so on).
Click Auto Arrange to set the icons automatically. Click Auto Arrange to remove the checkmark if you want to set the icons alone.
HOW TO ARRANGE ICONS ON LAPTOP'S DESKTOP:
Right-click the Desktop and from the resulting shortcut menu select View; make sure that Auto Arrange Icons are not selected.Destroy it before proceeding to the next step if selected.
Click on the desktop with the righ-click.Choose Sort-by from the resulting shortcut menu and then click on the desktop shortcut criteria.Any icon can be clicked and dragged to a different place on your desktop, for instance, to separate your favorite game from other desktop icons to help you easily find it.A network technician is planning to update the firmware on a router on the network. The technician has downloaded the file from the vendor's website. Before installing the firmware update, which of the following steps should the technician perform to ensure file integrity?
a. Perform antivirus and anti-malware scans of the file.
b. Perform a hash on the file for comparison with the vendor’s hash.
c. Download the file a second time and compare the version numbers.
d. Compare the hash of the file to the previous firmware update.
Answer: B. Perform a hash on the file for comparison with the vendor’s hash.
Explanation:
Before installing the firmware update, the step that the technician should perform to ensure file integrity is to perform a hash on the file for comparison with the vendor’s hash.
Hashing refers to the algorithm that is used for the calculation of a string value from a file. Hashes are helpful in the identification of a threat on a machine and when a user wants to query the network for the existence of a certain file.