Complete the program by writing and calling a method that converts a temperature from Celsius into Fahrenheit.

Answers

Answer 1

Missing Code:

import java.util.Scanner;

public class CelsiusToFahrenheit {

// FINISH: Define celsiusToFahrenheit method here

public static void main (String [] args) {

Scanner scnr = new Scanner(System.in);

double tempF = 0.0;

double tempC = 0.0;

System.out.println("Enter temperature in Celsius: ");

tempC = scnr.nextDouble();

// FINISH

System.out.print("Fahrenheit: ");

System.out.println(tempF);

return;

}

}

Answer:

Replace // FINISH: Define celsiusToFahrenheit method here

with

public static double celsiusToFahrenheit(double tempC){

   double tempF = (tempC * 9/5) + 32;

   return tempF;

}

Replace // FINISH

with

tempF = celsiusToFahrenheit(tempC);

Explanation:

The first addition to the program:

This line defines the method

public static double celsiusToFahrenheit(double tempC){

This line calculates the Fahrenheit equivalent of the temperature in Celsius

   double tempF = (tempC * 9/5) + 32;

This line returns the temperature in Fahrenheit back to the main method

   return tempF;

}

The second addition to the program:

This line gets the returned tempF from the celsiusToFahrenheit module

tempF = celsiusToFahrenheit(tempC);

See attachment for complete program


Related Questions

in speech writing, it can be defined as all aspect of your writing that help the reader move smoothly from one sentence to the next , and form one paragraph to another

Answers

Answer:

Logical flow

Explanation:

In speech writing, LOGICAL FLOW can be defined as all aspects of your writing that helps the reader move smoothly from one sentence to the next, and from one paragraph to another.

With the Logical flow, one will be able to guide his thoughts coherently and sequentially in which Readers can fully absorb and easily understand the message.

Ethernet ensures that _____ on a shared network never interfere with each other and become unreadable.

Answers

Answer:

Signals.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Ethernet ensures that signals on a shared network never interfere with each other and become unreadable through the use of encapsulation and standard encryption protocols.

In Computer Networking, encapsulation can be defined as the process of adding a header to a data unit received by a lower layer protocol from a higher layer protocol during data transmission. This ultimately implies that, the header (segment) of a higher layer protocol such as an application layer, is the data of a lower layer such as a transportation layer in the Transmission Control Protocol and Internet Protocol (TCP/IP).

The TCP/IP model comprises of four (4) layers;

1. Application layer: this is the fourth layer of the TCP/IP model. Here, the data unit is encapsulated into segments and sent to the transport layer.

2. Transport layer (layer 3): it receives the segment and encapsulates it into packets and sends to the internet layer.

3. Internet layer (layer 2): packets are encapsulated into frames.

4. Network layer (layer 1): frames are then converted into bits and sent across the network (LAN).

Hence, the data unit encapsulated inside a packet is known as segment, which is typically referred to as packet segmentation.

Additionally, these data, segments, packets, frames and bits transmitted across various layers are known as protocol data units (PDUs).

Give atleast 10 examples of wearable technologies and its functions​

Answers

Answer:

Wearable technologies are a form of technology designed and manufactured in such a way that people can wear them around.

Explanation:

Examples of smart wearable technologies and their functions are:

1. Smart wrist watch: this serves as both wrist watch and mobile gadgets that can make calls and some other functions like calculator, calendar, etc.

2. Fitness tracker: this helps in monitoring body activity level

3. Smarts clothIng: this can work with smart watch or phones to monitor the body activity

4. Smart headset: asides from using it to listen to music, it can also filter then the information within the environment

5. Artificial Intelligence hearing aid: this can help remove unnecessary noise level

5. Artificial Intelligence hearing aid: this can help remove unnecessary noise level

6. Smart jewelry: just like smart watches, it helps in measuring health activities in the human body system.

7. Implantable: this is for internal use and can also monitor the functioning rate of the body.

8. Head Mounted display: this is attached to the head, but one will be able to see the things the device is seeing.

9. Smart Chést stràp: this measures the level of heart rate in the body

10. Goógle glass: a user to make a call or browse the intérnet, and easily share what you ve seen

Wearable are part of the technology that is made to wear and use.

technology also includes activity trackers and skin electronics. The electronics such as software sensors and other things enable them to exchange quality data.They include rings, pens, watches, bracelets, trackers, earbuds, lens and contact less devices.

Hence the above mentioned are some of the examples of wearables technologies.

learn more about at least 10 examples of wearable technologies and their functions​.

brainly.ph/question/11249287.

The best known multiple letter encryption cipher is the __________ , which treats digrams in the plaintext as single units and translates these units into ciphertext digrams

Answers

Answer:

Playfair Cipher.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

The best known multiple letter encryption cipher is the Playfair Cipher, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams.

In the Playfair Cipher, a 5 × 5 matrix comprising of letters is developed using a keyword and then, the matrix is used to encrypt the plaintext as a pair i.e two letters at a time rather than as a single text.

To lose weight, you must _______.

a.
increase exercise and increase caloric intake
b.
increase exercise and decrease caloric intake
c.
decrease exercise and increase caloric intake
d.
decrease exercise and decrease caloric intake

Answers

Answer:

B

Explanation:

because you need to exercise and eat or drink less calories

Answer: b. increase exercise and decrease caloric intake

Explanation:

_____ is responsible for packet forwarding. a. Transmission Control Protocol b. User Datagram Protocol c. Extensible Authentication Protocol d. Internet Protocol

Answers

Answer:

d. Internet Protocol

Explanation:

Internet Protocols suite  are used to transport packets from the host network across other networks. This task is usually performed by optimizing the size of each available packet, which are then forwarded through the internet protocol (IP) address.

Therefore, Internet Protocol is responsible for packet forwarding.

The BaseballPlayer class stores the number of hits and the number of at-bats a player has. You will complete this class by writing the constructor. Write a method called: public BaseballPlayer() The constructor should take three parameters to match the three instance variables in the class and then initialize the instance variables with these parameters. The parameters should be ordered so that the name of the baseball player is input first, then their hits, and at bats. In the BaseballTester class, print a call to printBattingAverage to test your constructor.

Answers

Answer:

Answered below

Explanation:

Class BaseballPlayer{

//Instance variables

string name;

int hits;

int bats;

//Constructor

BaseballPlayer (string a, int b, int c){

name = a;

hits = b;

bats = c

}

public void printBattingDetails( ){

System.out.print(name, hits, bats)

}

}

//Demo class

Class BaseballTester{

public static void main (String args []){

BaseballPlayer player = new BaseballPlayer("Joe", 8, 4)

player.printBattingDetails( )

}

}

Click this link to view O'NET's Work Styles section for Veterinarians.

Note that common work styles are listed toward the top, and less common work styles are listed toward the bottom.

According to O'NET, what are common work styles needed by Veterinarians? Check all that apply.

efficiency

attention to detail

integrity

dependability

self control

enterprising

analytical thinking

artistic

Answers

Answer: efficiency

attention to detail

integrity

self control

analytical thinking

Explanation:

Veterinarians are simply called the doctor's that attend to the needs of animals. They treat and take care of animals such as cats, pigs, dogs, and birds.

According to O'NET, the common work styles needed by Veterinarians include

efficiency, attention to detail, integrity, self control and analytical thinking.

Answer:

its

attention to detail

integrity

dependability

self control

analytical thinking

Explanation:

just took it its right :)

>>> phrase = "abcdefgh"

>>> phrase[3:6]

Answers

Answer:

Following are the correct code to this question:

phrase = "abcdefgh"#defining a variable phrase that holds a string value

print(phrase[3:6])#use print method for slicing and print its value

Output:

def

Explanation:

In the above code, a variable "phrase" is defined that holds a string value, and use a print method, inside the method, the variable is used as a list and use slicing.

It is a characteristic that enables you to access the series parts like strings, tuples, and lists. It also uses for modifying or removing objects in series, in the above slicing it starts from 3 and ends when it equal to the 6th letter, that's why it will print "def".

software products that would be beneficial to both small and large businesses.
Find software that would be beneficial to a small business only.
Find software that would be beneficial to a large business only.​

Answers

Answer:

HTML,C++,Maya for animation..etc including DoC apps etc

Compared with a star topology, a hierarchical topology: a. is more effective at handling heavy but short bursts of traffic. b. allows network expansion more easily. c. offers a great deal of network control and lower cost. d. has cable layouts that are easy to modify.

Answers

Answer:

c. offers a great deal of network control and lower cost.

Explanation:

A network topology can be defined as a graphical representation of the various networking devices used to create and manage a network.

Compared with a star topology, a hierarchical topology offers a great deal of network control and lower cost.

What is the missing line?

>>> myDeque = deque('math')

>>> myDeque

deque(['m', 'a', 'f'])

O >>> myDeque popleft

O >>> myDeque.clear()

O >>> my Deque pop

O >>> myDeque.clear()

Answers

Correct question:

What is the missing line?

>>> myDeque = deque('math')

>>> myDeque

deque(['m', 'a', 't'])

Answer:

myDeque.pop()

Explanation:

The double ended queue, deque found in the python collection module is very similar to a python list and can perform operations such as delete items, append and so on.

In the program written above, the missing line is the myDeque.pop() as the pop() method is used to delete items in the created list from the right end of the list. Hence, the 'h' at the right end is deleted and we have the output deque(['m', 'a', 't'])

myDeque.popleft () deletes items from the right.

I need help please!!!!

Answers

Just restart it and it will be fixed
unplug the whole thing and then plug it back in maybe?

How we ingest streaming data into Hadoop Cluster?

Answers

Hadoop could be described as an open source program to handle big data. By utilizing the MapReduce model, Hadoop distributes data across it's nodes which are a network of connected computers. This data is shared across the systems and thus enables it to handle and process a very large amount dataset at the same time. These collection of networked nodes is called the HADOOP CLUSTER.

Hadoop leverages the power and capabilities of it's distributed file system (HDFS) which can handle the reading and writing of large files from log files, databases, raw files and other forms of streaming data for processing using ingestion tools such as the apache Flume, striim and so on. The HDFS ensures the ingested data are divided into smaller subunits and distributed across systems in the cluster.

Learn more : https://brainly.com/question/15548105

Fill in this function that takes three parameters, two Strings and an int. 4- // Write some test function calls here! The Strings are the message that should be printed. You should alternate printMessage("Hi", "Karel", 5); between the Strings after each line. The int represents the total number of lines that should be printed. public void printMessage(String lineOne, String lineTwo, in For example, if you were to call 19.
printMessage("Hi", "Karel", 5);
// Start here! 12 the function should produce the following output:
Hi
Karel
Hi
Kare

Answers

Answer:

The function in Java is as follows:

public static void printMessage(String lineOne, String lineTwo, int lines){

       for(int i = 1;i<=lines;i++){

           if(i%2 == 1){

               System.out.println(lineOne);

           }

           else{

               System.out.println(lineTwo);

           }

       }

   }

Explanation:

This defines the function

public static void printMessage(String lineOne, String lineTwo, int lines){

This iterates through the number of lines

       for(int i = 1;i<=lines;i++){

String lineOne is printed on odd lines i.e. 1,3,5....

      if(i%2 == 1){

               System.out.println(lineOne);

           }

String lineTwo is printed on even lines i.e. 2,4,6....

           else{

               System.out.println(lineTwo);

           }

       }

   }

To call the function from main, use:

printMessage("Hi", "Karel", 5);

Assume the following:

1. An organizational unit has 2 database servers, 2 application servers, and 15 clients.
2. Database server performs data storage and data access logic.
3. Application server performs business (or application) logic.
4. One database server and one application server are used to address any client's request.

Question: Such a client-server architecture would be typically classified as:

a. 4-tier architecture (because there are four servers in this network).
b. 5-tier architecture (because there are four servers and one client in the network).
c. 3-tier architecture (because the database server, the application server, and the client each represent one tier respectively).
d. n-tier architecture, where n=19 (because there are 19 computers in the network).

Answers

Answer:

c. 3-tier architecture (because the database server, the application server, and the client each represent one tier respectively).

Explanation:

This is a 3 tier client server architecture, it has the 3 major components that makes up this system

It has the client server, an application server and lastly it has the backend database server.

Each of these 3 tiers in this question are assigned one particular task. This would make functionality to be improved and can also help to find issues that may arise during the testing and production stages.

Please explain election technology

Answers

Answer:

Technlogy is the application of scientific knowledge for practical purposes, especially in industry.

Explanation:

what is the job of a bootloader?

Answers

Answer:

A bootloader, also known as a boot program or bootstrap loader, is a special operating system software that loads into the working memory of a computer after start-up.

Explanation:

A boot loader is a special operations system that makes your computer remember stuff. It’s programmed into storage which you used to save files and many other things. Without the boot laser you computer would not be able to start up, run at full capacity, and so many more things

What will be the output?
name = "Dave"
print(name)
A. name
B. "Dave"
C. Dave
D. (name)

Answers

i believe it’s c, sorry if im wrong

What is Machine Learning (ML)?​

Answers

Answer:

its where you learn about machines

Explain in your own words the complication of history in voting technology

Answers

Answer:

Voting technology is complicated because it is hard to make sure that the votes are counted correctly.

Which daemon manages the physical memory by moving process from physical memory to swap space when more physical memory is needed

Answers

Answer:

Swap daemon

Explanation:

Swap daemon manages the physical memory by moving process from physical memory to swap space when more physical memory is needed. The main function of the swap daemon is to monitor processes running on a computer to determine whether or not it requires to be swapped.

The physical memory of a computer system is known as random access memory (RAM).

A random access memory (RAM) can be defined as the internal hardware memory which allows data to be read and written (changed) in a computer.Basically, a random access memory (RAM) is used for temporarily storing data such as software programs, operating system (OS),machine code and working data (data in current use) so that they are easily and rapidly accessible to the central processing unit (CPU).

Additionally, RAM is a volatile memory because any data stored in it would be lost or erased once the computer is turned off. Thus, it can only retain data while the computer is turned on and as such is considered to be a short-term memory.

There are two (2) main types of random access memory (RAM) and these are;

1. Static Random Access Memory (SRAM).

2. Dynamic Random Access Memory (DRAM).

Write a function in Java called factorial() that will take a positive integer as input and returns its factorial as output.

Answers

Answer:

The function is as follows:

public static int factorial(int n){

       int fact = 1;

       for(int i=2;i<=n;i++){

           fact*=i;

       }

       return fact;

   }

Explanation:

This line defines the function

public static int factorial(int n){

This declares and initializes variable fact to 1    

  int fact = 1;

This iterates from 2 to n

       for(int i=2;i<=n;i++){

This line multiplies all integers from 1 to n

           fact*=i;

       }

This returns the factorial

       return fact;

   }

The Word feature that would allow you to insert fields from an Access database into multiple copies of a Word document is called

Answers

Answer:

Mail Merge.

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

Microsoft Access can be defined as a software application or program designed by Microsoft corporation to avail end users the ability to create, manage and control their database.

A Mail Merge is a Microsoft Word feature that avails end users the ability to import data from other Microsoft applications such as Microsoft Access and Excel. Thus, an end user can use Mail Merge to create multiple documents (personalized letters and e-mails) at once and send to all individuals in a database query or table.

Hence, the Word feature that would allow you to insert fields from an Access database into multiple copies of a Word document is called Mail Merge.

Squares. Write a program class named SquareDisplay that asks the user for a positive integer no greater than 15. The program should then display a square on the screen using the character ‘X’. The number entered by the user will be the length of each side of the square. For example, if the user enters 5, the program should display the following:

XXXXX
XXXXX
XXXXX
XXXXX
XXXXX
INPUT and PROMPTS. The program prompts for an integer as follows: "Enter an integer in the range of 1-15: ".

OUTPUT. The output should be a square of X characters as described above.

CLASS NAMES. Your program class should be called SquareDisplay

Answers

Answer:

import java.util.Scanner;

class SquareDisplay {

 public static void main(String[] args) {

   Scanner scan = new Scanner(System.in);

   System.out.print("Enter an integer in the range of 1-15: ");

   int num = scan.nextInt();

   if ((num > 0) && (num <= 15)) {

     String s = "X".repeat(num) + "\n";

     System.out.print(s.repeat(num));

   } else {

     // your error handling

   }

   scan.close();

 }

}

Explanation:

Write a Java program that asks the user to enter an array of integers in the main method. The program will ask the user for the number of integer elements to be put in the array, and then ask the user for each element of the array. The program then calls a method named isSorted() that accepts an array of integers and returns true if the list is in sorted (increasing) order and false otherwise. For example, if arrays named arr1 and arr2 store [10, 20, 30, 41, 56] and [2, 5, 3, 12, 10] respectively, the calls isSorted(arr1) and isSorted(arr2) should return true and false respectively. Assume the array has at least one integer element. A one-element array is considered to be sorted.

Answers

Answer:

The program is as follows:

import java.util.Scanner;

public class MyClass {

   public static Boolean isSorted(int [] arr){

       Boolean sorted = true;

       for(int i = 0;i<arr.length;i++){

       for(int j = i;j<arr.length;j++){

           if(arr[i]>arr[j]){

               sorted = false;

               break;

           }

       }    

       }

       return sorted;

   }

   public static void main(String args[]) {

       Scanner input = new Scanner(System.in);

       int n;

       System.out.print("Length of array: ");

       n = input.nextInt();

       int[] arr = new int[n];

       System.out.println("Enter array elements:");

       for(int i = 0; i<n;i++){

           arr[i] = input.nextInt();

       }

      Boolean chk = isSorted(arr);

     System.out.print(chk);

   }

}

Explanation:

The method begins here

This line defines a method named isSorted

   public static Boolean isSorted(int [] arr){

This line declares a boolean variable and initializes it to true

       Boolean sorted = true;

The next two iterations iterate through elements of the array

       for(int i = 0;i<arr.length;i++){

       for(int j = i;j<arr.length;j++){

This compares an array element with next elements (to the right)

           if(arr[i]>arr[j]){

If the next element is smaller than the previous array element, then the array is not sorted

               sorted = false; The boolean variable is updated to false

               break; This breaks the loop

           }

       }    

       }

This returns true or false, depending on the order of the array

       return sorted;

   }

The main method begins here

public static void main(String args[]) {

       Scanner input = new Scanner(System.in);

       int n;

This prompts user for length of array

       System.out.print("Length of array: ");

This gets length of array from user

       n = input.nextInt();

This declares an array

       int[] arr = new int[n];

This prompts user for array elements

       System.out.println("Enter array elements:");

The following iteration gets the array elements

       for(int i = 0; i<n;i++){

           arr[i] = input.nextInt();

       }

This calls the isSorted array      

     Boolean chk = isSorted(arr);

This prints true or false, depending if the array is sorted or not

     System.out.print(chk);      

   }

if a touch screen chrome is not charging what is wrong with it



sis chromebook aint charging plz help you get 10 points

Answers

look it up on a best buy website ion know

Answer:

A try buying a new charger if that dont work then try going to best buy to fix it after that ion rlly know

This element is known as the path a dot makes. It can be used to create
contour drawings or to shade areas.
O Color
Contrast
Line
O Value
O None of the above

Answers

the answer is Value

i just know

Write a method that takes a Regular Polygon as a parameter, sets its number of sides to a random integer between 10 and 20 inclusive, and sets its side length to a random decimal number greater than or equal to 5 and less than 12. Use Math.random() to generate random numbers. This method must be called randomize() and it must take a Regular Polygon perimeter.

Answers

Answer:

Answered below

Explanation:

//Program is written in Java programming language

Class RegularPolygon{

int sides = 0;

int length = 0;

}

public void randomize(RegularPolygon polygon){

int randomSides = (int) 10 + (Math.random() * 20);

double randomLength = 5 + (Math.random() * 11);

polygon.sides = randomSides;

polygon.length = randomLength;

}

With what speed will a clock have to be moving in order to run at a rate that is one-half the rate of a clock at rest

Answers

Answer:

Speed = 0.866c

Where c is speed of light

Explanation:

We want to find the speed at which it run at a rate that is one-half the rate of a clock at rest.

Thus, we will use time dilation equation to solve it.

Thus;

t_o/√[1 - (v²/c²)] = 2t_o

Where:

t_o is time at rest

v is the speed at which it runs

c is the speed of light.

t_o will cancel out to give;

1/√[1 - (v²/c²)] = 2

Rearranging, we have;

√[1 - (v²/c²)] = ½

Let's make v the subject of the formula;

Let's square both sides to get;

1 - (v²/c²) = ½²

1 - (v²/c²) = ¼

Rearrange to get;

1 - ¼ = v²/c²

¾ = v²/c²

Take square root of both sides to get;

v/c = √¾

v = c × 0.866

v = 0.866c

Other Questions
Which two organ systems work together to provide cells with oxygen and to remove carbondioxide from the body?(5 Points) The area of this rectangle is 32 sq cm. The width is 8 cm. What is the length of this rectangle? How long would a pendulum have to be in order to have a period of 10.0 s? Use a value of 9.81 m/s2 for the local acceleration due to gravity. Give your answer to one decimal place. Which sentence uses verbs to show that Jasmine's success was prevented by a lack of practice?1. Jasmine scores more goals because she practices harder.2. Jasmine will score more goals because she practices harder.o3. If Jasmine had practiced harder, she would have scored more goals.O4. Because Jasmine practiced harder, she was able to score more goals. What is the value of5/6 divided by 3/4 PLEASE HELP ME QUICK!!!! What is an appropriate title for this diagram?Energy Flow in a CommunityEcological SuccessionBiological EvolutionFood Choin is y = 4x* Proportional or Nonproportional? Find the number of faces, edges and vertices of the solid. What does comma means A remote community desperately needs more electrical energy. It is located inan area with the following characteristics: Average wind speed of 0 - 5 km/hr One small river with slow-moving currents Few coal deposits. Mostly sunny days, very few cloudsBased on the above information, which energy source would be the mosteconomical and safest for the community to pursue?O A. HydroelectricO B. WindO O OC. Fossil fuelO D. Solar use the periodic table to determine the molar mass of each of the following elements. Use the correct number of significant figures. Potassium How would you compare a circle to an ellipse? What river was rome located by? Shawn owns The Muffin mobile food truck. He goes home after he sells more than 200 muffins. He began the day with a big 36 muffin order! Now he's selling 24 muffins per hour. After how many complete hours can Shawn go home? can some one help me pretty pls According to the Pandemic graph approximately how many more people died from the Black death than from the 1918 flu ?a) 25 million b) 50 million c) 75 million Use the drop-down boxes to compare and order of the numbers from least to greatest.Number line extends from six to seven and extends both sides. There are nine markings placed as regular intervals between the ends. The points A, B, C, and D are also marked on the line6.8 Choose...A.C. D.B6.6 Choose... A.C. D.B467 Choose...A.C. D.B47 Choose... A.C. D.B Temperate climates include tundra climates,TrueFalse Do you think the media was responsible for inciting the riot? Explain