1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
In-s [12.5K]
3 years ago
12

Write a program whose input is two integers and whose output is the two integers swapped. Ex: If the input is: 3 8 then the outp

ut is: 8 3 Your program must define and call a function. SwapValues returns the two values in swapped order. void SwapValues(int* userVal1, int* userVal2)
Computers and Technology
1 answer:
Ainat [17]3 years ago
4 0

Answer:

public class num3 {

   public static String swapValues(int userVal1, int userVal2){

       int temp = userVal2;

       userVal2 = userVal1;

       userVal1 = temp;

       return(userVal1+", "+userVal2);

   }

   public static void main(String[] args) {

       int val1 = 5;

       int val2 = 8;

       System.out.println("Original values");

       System.out.println(val1+", "+val2);

       System.out.println("Swapped Values");

       System.out.println(swapValues(val1,val2));

   }

}

Explanation:

  • The problem is solved with Java programming language
  • Define the method swapValues() to accept two ints and return a String
  • Within the method body, create a temp variable to hold the value of userVal2 temporary
  • Do the following re-assignment of values userVal2 = userVal1; userVal1 = temp;
  • Return the concatenated String userVal1+", "+userVal2
  • Create two variables and initialize them in the main method
  • Output their values
  • Call swapValues() aand output the swapped values
You might be interested in
What is the defining difference between computer security and information security?
Alekssandra [29.7K]
Computer security is protection from theft or damage to their hardware, software, or information, as well as disruption or misdriection of the services they provide. As information security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording, or destruction of information.
4 0
3 years ago
Write the function lettersOnly(s) that takes in a string called s, and returns a string containing only the alphabetic character
Phantasy [73]

Answer:

The program to this question as follows:

Program:

def lettersOnly(s): #defining method lettersOnly

   val="" #defining string variable that return value

   for i in s: #defining loop to calculate value

       if(i.isalpha()): #check condition that value is string

           val=val+ i #add value

   return val #return value

print(lettersOnly("data3base_ro1c3k5s")) #call method and print value

Output:

databaserocks

Explanation:

In the above python code, a method lettersOnly is declared that accepts a string variable  "s" in its parameter. Inside the method, a string variable "val", and loop is declared, in which the "val" variable holds method return value.

  • In the loop and if block is used that uses "isalpha" string method, which checks the check alphabetic character in the given value. if this is true it will calculate all value in "val" variable and return its value.    
  • At the last, the print method is used, which calls the lettersOnly method and prints its return value.
4 0
3 years ago
a) (20 points) Define the method inDogish recursively such that it returns true if the word is in dog-ish and false if it is not
tia_tia [17]

Answer:

/ Main.java

class Main {

     public static void main(String[] args) {

           //System.out.println(inDogish("aplderogad"));

           //System.out.println(inXish("aplderogad", "dog"));

     }

     // returns true if the word is in dog-ish

     // returns false if word is not in dog-ish

     public static boolean inDogish(String word) {

           /**

           * Note: we can use the inXish() method to complete this method in a

           * single line if you want. just write 'return inXish(word,"dog");' and

           * you are done.

           */

           // if word is null or empty, returning false

           if (word == null || word.length() == 0) {

                 return false;

           }

           // converting word to lower case

           word = word.toLowerCase();

           // if 'd' does not exist on the word, returning false

           if (!dogishHelper(word, 'd')) {

                 return false;

           }

           // removing the characters upto first 'd' in word

           word = word.substring(word.indexOf('d') + 1);

           // if 'o' does not exist on the word, returning false

           if (!dogishHelper(word, 'o')) {

                 return false;

           }

           // removing the characters upto first 'o' in word

           word = word.substring(word.indexOf('o') + 1);

           // if 'g' does not exist on the word, returning false, otherwise

           // returning true

           if (!dogishHelper(word, 'g')) {

                 return false;

           } else {

                 return true;

           }

     }

     // necessary to implement inDogish recursively.

     // returns true if letter is in word, else not.

     public static boolean dogishHelper(String word, char letter) {

           // if word is empty, returning -1

           if (word == null || word.length() == 0) {

                 return false;

           }

           // if first character in word is letter, returning 0

           if (word.charAt(0) == letter) {

                 return true;

           }

           return dogishHelper(word.substring(1), letter);

     }

     // the best thing about the above helper method is that we can use it in

     // inXish method also

     // a generalized version of the inDogish method

     public static boolean inXish(String word, String x) {

           // if x is empty, returning true (base case, which means all the letters

           // in x are in word in that order)

           if (x.length() == 0) {

                 return true;

           }

           // getting first character of x

           char first = x.charAt(0);

           // if first character does not exist on the word, returning false

           if (!dogishHelper(word, first)) {

                 return false;

           }

           // calling and returning inXish recursively, passing the word after

           // removing characters upto first occurrance of char first, and x after

           // removing first character from it

           return inXish(word.substring(word.indexOf(first) + 1), x.substring(1));

     }

}

Explanation:

7 0
4 years ago
Find all the files and directories in /var (including subdirectories) that are owned by user root. Send the list of full path na
Dennis_Churaev [7]

Answer:

find /var -user root > s8

Explanation:

To look for a file matching multiple conditions with find, what you do is to simply list each condition in turn. For instance, to look for a file owned by root (-user root) and writable by its owner (-perm -u+w) on the root filesystem (-xdev, meaning not to recurse underneath mount points such as /proc and /sys) and called hello:

find / -xdev -user root -perm -u+w -name hello

If you're looking for world-writable files, replace -u+w by -a+w. (The - before the permissions means that the file must have at least these permissions; without it find would search for a file that has exactly the distinct permissions.) With GNU find, you can also look for a file that is writable by the user running find: replace -perm -u+w by -writable.

In this case, frame the command as required.

Code: find

Everywhere

code: /

Only directories

code: var

Root owned file

code: - user root

Permission bits

Code: > s8

7 0
3 years ago
Necesito desactivar el acceso directo de una tecla del ratón
DochEvi [55]

Aquí hay un artículo al respecto. https://www.tenforums.com/tutorials/103600-enable-disable-mouse-keys-keyboard-shortcut-windows.html

4 0
4 years ago
Other questions:
  • Which of the following refers to semitransparent text or a faint object that appears
    15·1 answer
  • Why is it important to explore an Integrated
    13·1 answer
  • Which internet site end in .com​
    10·2 answers
  • You are planning to buy a new server that will act as the server portion of a client/server application. A colleague of yours ma
    9·1 answer
  • What format are a setups program file in before executed?
    12·1 answer
  • Define the missing method. use "this" to distinguish the local member from the parameter name.
    11·2 answers
  • What is the empty space inside the character 'O' called?
    12·1 answer
  • U $ er Ideas for R 0 B 1 0 X?
    12·2 answers
  • Which function would you use to make sure all names are prepared for a mailing label? TODAY UPPER PROPER LOWER
    11·1 answer
  • Which is an advantage of using a flat file instead of a relational database?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!