1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leonid [27]
4 years ago
6

Write a java program called allDigitsOdd that returns whether every digit of a positive integer is odd. Return true if the numbe

r consists entirely of odd digits (1, 3, 5, 7, 9) and false if any of its digits are even (0, 2, 4, 6, 8). For example, the call allDigitsOdd(135319) returns true but allDigitsOdd(9145293) returns false.
Computers and Technology
1 answer:
Vlada [557]4 years ago
4 0

Answer:

public class Digits

{

   public static boolean allDigitsOdd(int num)

   {

       boolean flag=true;

       int rem;

       while(num>0)

       {

           rem=num%10;

           num=num/10;

           if(rem%2==0)    // if a even digit found immediately breaks out of loop

           {

               flag=false;

               break;

           }

       }

       return flag;     //returns result

   }

   public static void main(String args[])

   {

       System.out.println(allDigitsOdd(1375));    //returns true as all are odd digits

   }

}

OUTPUT :

true

Explanation:

Above program has 2 static methods inside a class Digits. Logic behind above function is that a number is divided by 10 until it is less than 0. Each time its remainder by 0 is checked if even immediately breaks out of the loop.

You might be interested in
Digital learning can help students who enjoy
mr Goodwill [35]

Answer:

flexibility and independence

Explanation:

6 0
3 years ago
Memememememmemememememememmmeememememe
Alexus [3.1K]

l o l l o l l o l ha ha ha ha ha l o l

7 0
3 years ago
Session Hijacking refers to the exploitation of a valid computer session where an attacker takes over a session between two comp
noname [10]

Answer:Weak session ID generation algorithm

Explanation: Session hijacking is the hacking by disguising as the authenticated user and illegally exploit the particular computer session. IP packets are invoked by the disguised attacker into the active session between the legal computer user. It is also called session key.

It gives the hacker to use the data and services of the computer in an unauthorized manner. It arises due to the session of communication are not secure and strong,key used for session is weak etc.

5 0
3 years ago
Why did the editors choose to rearrange the intercutting between Luke’s story and the Imperials? What effect did this have on th
kompoz [17]

Answer:

Though it has its merit, know that the rule is not mandatory. ... A jump cut is a cut in film editing in which two sequential shots of the ... An intercut is a type of edit where two or more actions in distinct ...

3 0
3 years ago
1. Write a Python code to:
Ksenya-84 [330]

Answer:

hope this help and do consider giving brainliest

Explanation:

1)

a)

import numpy as np

A=np.array([[1,4,3,2],[1,7,4,5],[2,5,3,1],[1,3,2,9]]);

print("Inverse is");

B=np.linalg.inv(A);

print(B);

print("A*A^-1=");

print(np.dot(A,B));

print("A^-1*A=");

print(np.dot(B,A));

2)

import numpy as np

A=np.array([[4,3,2],[5,6,3],[3,5,2]]);

B=np.array([[3,-1,2,6],[7,4,1,5],[5,2,4,1]]);

X=np.dot(np.linalg.inv(A),B);

print("X=");

print(X);

5 0
3 years ago
Other questions:
  • The ____ dialog box in windows vista appears each time a user attempts to perform an action that can be done only with administr
    12·1 answer
  • 1. Which of the following is required to create a computer simulation?
    11·1 answer
  • Footnotes and endnotes can be used to explain information in more detail, add opinions or comments, or to cite sources in the do
    7·1 answer
  • What is 450 g of flour a measure of?
    11·1 answer
  • In this lab, you will build a system for package delivery services that provides different shipping options with specific price.
    6·1 answer
  • You are required to copy in your attendees' emails from outside of Outlook when creating a meeting
    6·2 answers
  • 1) "Information systems are revolutionizing the way businesses function in the 21st century," Do you agree or disagree with this
    5·1 answer
  • Basic computer programs used by a variety of companies include:
    5·1 answer
  • How bridges are built over water
    14·1 answer
  • modify hw 02 c.c to use envp instead of environ. be sure that you understand how the code works. provide liberal comments to exp
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!