1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
suter [353]
3 years ago
10

In JAVA,

Computers and Technology
1 answer:
Dahasolnce [82]3 years ago
5 0

Answer:

The program to this question as follows:

Program:

public class Main //define class main

{

public static void main(String[] args)  //define main method

{

boolean isAMember = false; //define boolean variable isAMember

int currentMembers[]={1,72,36,43,51,61,72,80}; //declare and initialized array.

int memberID=72; //define integer variable memberID.

for(int k = 0; k < currentMembers.length; k++) //loop.

{

if(currentMembers[k] == memberID) //conditional statement.

{

isAMember = true; //assign value true.

break;

}

System.out.print("true"); //print value.

}

}

}

Output:

true

Explanation:

The above java program to this question can be described as:

  • In java program we define a class that is "Main" inside this class we define a main method in the main method we define variables that are "k, memberID, isAMember, currentMembers".
  • The variable k and memberID is an integer variable that is used in the loop and use for match condition. and currentMembers is an integer array that is declared and initialized. and isAMember is a boolean variable that returns only true or false value.
  • Then we define a (for) loop in this loop we check condition we use if block. In if block, we check that currentMembers array value is equal to memberID. if this condition is true so we assign value true in "isAMember" variable and print its value.
You might be interested in
William found out that someone used his report on American culture without his permission. What is William a victim of? A. plagi
lyudmila [28]
A. Plagiarism, because someone used all of his work without citing him or asking for permission.
6 0
3 years ago
Read 2 more answers
In which generation microprocessor was developed short answer of computer science​
3241004551 [841]

Explanation:

in fourth generation microprocessor was developed.

may it helped u

5 0
3 years ago
When you ____ an exception, you send a message that an error has occurred to another part of the program.
jekas [21]
The correct answer is most definitely B
8 0
3 years ago
Read 2 more answers
Which statements describe the use of styles in Word? Check all that apply.
algol [13]

Answer:

can be used to make word docments look the same

Explanation:

4 0
3 years ago
Read 2 more answers
If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure stat
Leni [432]
If the computer you are using is a laptop that moves from one network to another, you can click the Alternate Configuration tab and configure a static IP address setting for a second network.
4 0
3 years ago
Other questions:
  • Achieving a degree in computer forensics, information technology, or even information systems can provide a strong foundation in
    11·1 answer
  • You have been contracted by a local school to evaluate their computer labs for security threats. They are most worried about the
    6·1 answer
  • Which windows tools would you use to browse the files system on a hard drive?
    6·2 answers
  • . Does Zuckerberg believe in the thought that “the endpoint is when you sell the
    15·1 answer
  • _____ is a program that allows a person using one computer to access files and run programs on a second computer that is connect
    11·1 answer
  • Heather has segmented all of the individuals in her database into four categories according to how many game tickets they purcha
    12·2 answers
  • Read the scenario below, and then answer the question.
    13·1 answer
  • Which list shows a correct order of mathematical operations that would be used by a spreadsheet formula?
    5·2 answers
  • Code: ckg-jbqp-hki<br>only girls join❤️​
    11·2 answers
  • How can we avoid falling victim to a phishing or pharming scheme
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!