1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vovikov84 [41]
3 years ago
8

Create a public non-final class named Streamer. You should implement one class method: filterStrings. It should accept a single

parameter: a Stream of Strings (Stream). It should also return a Stream of Strings, but: only those that are longer than 8 characters and with each member of the stream converted to lowercase You may want to review yesterday’s lecture and Java’s official stream documentation, in particular the map and filter functions. You will need to import java.util.stream.Stream. Do not terminate the stream: simply return it from your function.
Computers and Technology
1 answer:
In-s [12.5K]3 years ago
7 0

Answer:

See explaination

Explanation:

/ Streamer.java

import java.util.stream.Stream;

public class Streamer {

//required method

public static Stream<String> filterStrings(Stream<String> stream) {

//filtering out the strings from stream where length is less than or

//equal to 8, and then converting all strings in the resultant stream

//to lower case using map()

stream = stream.filter(e -> e.length() > 8).map(String::toLowerCase);

return stream;

}

}

You might be interested in
Which of the following is a proper use of the application, netstumbler
Studentka2010 [4]

Where are the answers for the questions that you are able to pick from?


3 0
4 years ago
Read 2 more answers
What is computer hacking?
tangare [24]

Answer:

<h3><u>Computer hacking:-</u></h3>

  • Computer hacking is the act of compromising digital devices and networks through unauthorized access to an account or computer system.

  • Hacking is not always a malicious act, but it is most commonly associated with illegal activity and data theft by cyber criminals.
6 0
3 years ago
Draw a flowchart that ask the user to enter number: if the number is less than then 10 number it is doubled if the number is mor
solong [7]

Answer:

please find the attachment of the flowchart.

Explanation:

In this question, a start block is used to start the program, in the parallelogram box we input the value from the user end and in the diamond box, we check the input is not equal to 0. In the next diamond box, it checks the given input value and print value, and at the last, we stop the code.

Please find the program and its output in the attached file.

8 0
3 years ago
Explain what the loop does and what the result of executing it will be.
Studentka2010 [4]

Answer:

The loop increments the value of new while the loop condition is true

The end value of new is 3

Explanation:

Given

The above code segment

Required

What the loop does and the result

We have:

new = 0 --- initialize new to 0

i = 3; i \le 5; i++ --- The loop condition;

i.e. the loop will be repeated 3 times (when i = 3, 4 and 5)

new = new + 1 --- For each increment of i, new is incremented by 1

So, the value of new is:

<em>i = 3: new = 0 + 1 = 1</em>

<em>i = 4: new = 1 + 1 = 2</em>

<em>i = 5: new = 2 + 1 = 3</em>

5 0
3 years ago
Jordan just wrote a secret message program in python that converts the number 7,095 to 1s and 0s. Which number system is Jordan
nevsk [136]

Answer:

Binary

Explanation:

Binary code is code that only entails 1s and 0s

7 0
3 years ago
Read 2 more answers
Other questions:
  • A set of instructions to increase a programmer’s pay rate by 10 percent is hidden inside an authorized program. It changes and u
    6·1 answer
  • You must establish credit in order to buy a house true or false
    5·2 answers
  • Using the drop-down menus, correctly complete the sentences.
    5·2 answers
  • What age group is experiencing the most growth in social media
    13·1 answer
  • You are assigned to modify an existing Webpage by adding several tables that contain precise wording. The Webpage has had severa
    14·1 answer
  • Common types of possessed objects are smart cards, rfid-encoded badges, magnetic cards, ____, and smartphones that are swiped th
    7·1 answer
  • True or false Encryption prevents hackers from hacking data?
    8·1 answer
  • What is difference between augmented reality and mixed reality?​
    11·1 answer
  • Which of the following characterizes how an enabled security program might react to a new program installation on a computer sys
    7·2 answers
  • Select the correct answer.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!