1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadya [2.5K]
3 years ago
7

Write a Java program that prompts the user to enter integer values for the sides of a triangle and then displays the values and

the type of triangle they represent. If the user enters values that do not make a valid triangle, or if any values are not greater than zero, your program should display the values entered as well the following error message: The values entered do not make a valid triangle.
Computers and Technology
1 answer:
satela [25.4K]3 years ago
7 0

Answer:

import java.util.Scanner;

public class triangle {

       public static void main (String [] args) {

           int sideOne, sideTwo, sideThree;

           Scanner in = new Scanner (System.in);

           System.out.println("Enter the first side of the triangle");

           sideOne = in.nextInt();

           System.out.println("Enter the secon side of the triangle");

           sideTwo = in.nextInt();

           System.out.println("Enter the third side of the triangle");

           sideThree = in.nextInt();

           if ( sideOne<=0||sideTwo<=0|| sideThree<=0){

               System.out.println(" The Values enter are "+sideOne+ "," +sideThree+ ","+sideThree+ " These values don't make a valid triangle");

           }

           else if ((sideOne + sideTwo> sideThree) || (sideOne+sideThree > sideTwo) || (sideThree+sideTwo > sideOne))

           {

               System.out.println ("The triangle is Valid");

           }

           else {

               System.out.println(" The Values enter are "+sideOne+ "," +sideTwo+ ","+sideThree+ " These values don't make a valid triangle");

           }

       }

Explanation:

for a Triangle to be Valid one of the three sides of the triangle must greater than the other two sides.  The code above enforces this condition using an if statement in combination with the Or Operator

The following conditions where enforced

side one, side two and side three != 0

Side One + Side Three > Side Two

Side Three + Side Two> Side One

Side Two + Side One > Side Three

You might be interested in
A CPU scheduler that assigns higher priority to the I/O-bound processes than the CPU-bound processes causes:
Sholpan [36]

Answer:

Low CPU utilization and high I/O utilization

Explanation:

6 0
2 years ago
I am trying to code a lifting simulator game on ro-blox. These problems listed in the third picture tells you the problems. If y
Andru [333]
I have no idea but keep grinding
7 0
3 years ago
a 0.600 kg dynamics trolley has 1.5 kg load added. It is launched with a force of 10.n what is the acceleration
Anastaziya [24]

Answer:

acceleration = 4.76 m/s²

Explanation:

Given that"

the mass of the dynamic trolley = 0.6 kg

the mass of the load  = 1.5 kg

total mass = (0.6 + 1.5) kg = 2.1 kg

the force = 10 N

Thus;

using the formula of force which is;

Force = mass × acceleration

10 = 2.1  × acceleration

acceleration = 10/2.1

acceleration = 4.76 m/s²

7 0
3 years ago
When a device or service causes the system to hang during a normal boot, boot into __________ and disable the device or service
Olenka [21]

You should boot into <u>safe mode</u> and disable the device or service when it causes the computer system to hang during a normal boot.

<h3>What is safe mood?</h3>

Safe mood can be defined as a boot option in which the operating system (OS) of a computer system starts in <u>diagnostic mode</u> rather than in a normal operating mode, so as to enable the user correct any problems preventing the computer system to have a normal boot.

This ultimately implies that, safe mood is a diagnostic mode of the operating system (OS) of a computer system that is designed and developed to fix most problems within an operating system (OS) and for the removal of rogue software applications.

Read more on safe mood here: brainly.com/question/13026618

5 0
2 years ago
The concurrent process model defines a set of "states." describe what these states represent in your own words, and then indicat
nikitadnepr [17]

Answer:

Explanation:

Concurrent Process model can be regarded as evolutionary process model as well as software engineering is concerned, it allows to know the current state of activities as well as their associated states.

The set of states In the concurrent process model are:

✓awaiting changes

✓Inactive

✓baselined

✓under development

✓under revision

✓under review

✓done

The stated "states" above give a representation of externally observable mode as regards to the behaviour of activities of a particular software engineering.

The existence of activities of software engineering do exist at same period

In concurrent process model, though each of the activities occur in different states so that process network is produced. The movement from one state to another of activity of software engineering is as a result of

predefined events.

5 0
3 years ago
Other questions:
  • Describe the indicators and hazards of a metal deck roof fire in an unprotected steel joist warehouse as well as the techniques
    6·1 answer
  • You would like to know how many cells contain data. Which function should you use? COUNT MIN SUM ABS
    14·1 answer
  • Help PLEASE (in attachment)
    8·1 answer
  • What are the major functions of a computer
    7·1 answer
  • Pharming involves redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web brow
    7·1 answer
  • I AM GIVING BRAINLEST!!!!!!!!
    14·2 answers
  • HELP PLZZZZZZ
    10·1 answer
  • Please anyone, help me.... I'm not sure how to put these all together.<br> 35 points!
    15·2 answers
  • Assume that you have the business data in various sources such as Excel, .csv, text files and Access, Oracle databases. Write th
    9·1 answer
  • _________ is the method used by password crackers who work with pre-calculated hashes of all passwords possible within a certain
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!