1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Grace [21]
3 years ago
13

Write a Java program that accepts an integer number from the user between 20 and 100. Next, divide the number by 12 and determin

e if the remainder is even or odd.
Inputs: The program must prompt the user for an integer value between 20 and 100.
Enter an integer between 20 and 100:
Output: The program should have an output similar to this. The < and > symbols will contain the actual values entered and calculated.
The remainder of divided by 12 is , and it is .
Example of a program run: The value 35 is entered by the user
Enter an integer between 20 and 100: 35
The remainder of 35 divided by 12 is 11, and it is odd.
Computers and Technology
1 answer:
Eddi Din [679]3 years ago
4 0
Import java.util.Scanner;
class hola
{
public static void main(String[]args)
{
Scanner x=new Scanner(System.in);
int a=x.nextInt();
int b;
if(a>20&&a<100)
{
b=a%12;
if(b%2==0){
System.out.print("es par"+b);
}
else{
System.out.print("es impar"+b);
}
}
}

}
You might be interested in
rapid prototyping could be an advantageous methodology for developing innovative computer-based instruction. Software engineers
frosja888 [35]

The option that is true for the Student Version above is option d:  This is not plagiarism.

<h3>What is plagiarism?</h3>

This is known to be the act of copying other people's work and then taking it as your own.

When you look at the student work, you will see some measures od differences. Hence, The option that is true for the Student Version above is option d:  This is not plagiarism.

Learn more about prototyping  from

brainly.com/question/14743515
#SPJ1

See  full question below

Original Source Material

There is a design methodology called rapid prototyping, which has been used successfully in software engineering. Given similarities between software design and instructional design, we argue that rapid prototyping is a viable method for instructional design, especially for computer-based instruction.

Student Version

Rapid prototyping could be an advantageous methodology for developing innovative computer-based instruction. Software engineers have been successful in designing applications by using rapid prototyping. So it also could be an efficient way to do instructional design.

Which of the following is true for the Student Version above?

a. Word-for-Word plagiarism

b. Paraphrasing plagiarism

c. This is not plagiarism

8 0
2 years ago
Nog
STatiana [176]

Answer: False

Explanation:

The statement that "Peacekeeper text is non-printing text that indicates where you can type" is false.

The non-printing text which shows where on exam type is referred to as the peaceholder text. It is usually an hint which can be used to fill in the actual text.

8 0
3 years ago
Explain Importance of flowchart in computer programming
zhuklara [117]

Answer:

Flow charts help programmers develop the most efficient coding because they can clearly see where the data is going to end up. Flow charts help programmers figure out where a potential problem area is and helps them with debugging or cleaning up code that is not working.

creds to study.com (please don't copy it work by word, make sure to paraphrase it. otherwise plagiarism is in the game.)

Explanation:

7 0
2 years ago
Which type of game requires you to read people’s expressions to anticipate their moves?
Irina-Kira [14]

Answer:

Chess-type games

Explanation:

5 0
2 years ago
In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial insti
elixir [45]

In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial institutions are known as <u>d. cyber terrorists</u>.

<u>Explanation</u>:

Cyber crime means crime committed with the help of computer and internet. Cyber terrorism means crime that causes damage to infrastructure components of financial institutions and government office and causes threat to the society.

Cyber terrorists are person who involve in cyber terrorism. The systems used in the governments and financial institutions should be protected with hardware and software to avoid cyber terrorism.

This kind of cyber terrorism is very dangerous, as they hack the system and destroy the valuable information stored in it.

5 0
2 years ago
Other questions:
  • Web storage stores data in the browser in
    5·1 answer
  • What dose it need For a device to be considered a kind of computer
    14·2 answers
  • What isthe concept of packets, give example?
    9·1 answer
  • What function does the ALU perform?
    10·1 answer
  • 100 POINTS PLEASE HELP ASAP!!!!!
    5·2 answers
  • What is a computer network?
    5·1 answer
  • When parking on hills or an unlevel surface, make sure your_____is
    15·2 answers
  • Which skill type refers to the knowledge and ability to perform a task?
    13·2 answers
  • how to create use an array of Course objects instead of individual objects like course 1, course 2, etc
    11·1 answer
  • SUB2 WWolfPlays on yt <br><br><br> true or false if false ima cri
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!