1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elanso [62]
3 years ago
5

Describe the differences between program development and program execution, including the installed software required for develo

ping and executing Java programs.
Computers and Technology
1 answer:
likoan [24]3 years ago
8 0

Answer:

Program development is basically a step wise process to solve a particular problem. It basically refers to the coding of a program. This initial steps involves defining the problem statement, specifying the requirements and specifying what the output of the program should be. Program development also includes visually presenting what of the program for example in the form of flowchart. It also involves coding, the set of instructions, procedures, functions, sub routines that a computer should carry out to get the desired output. Also the bugs and errors are removed by debugging the program. Program execution refers to execute or run the set of instructions of a program. The program or machine code is loaded to the memory prior to execution and then executed. For example in JAVA the source code if first converted to bytecode and then in machine code in order to be executed.

Developing and Executing JAVA programs involves typing program using some editor (editing), compiling the program (converting to bytecode), loading program to memory prior to execution, verifying bytecode and executing the program.

In JAVA,  Java Development Kit (JDK) is used for JAVA program development and JAVA applications development. It involves an Integrated Development Environment (IDE) which serves as a platform for writing the JAVA code.

Java Runtime Environment JRE is used to JAVA program execution and provides a platform or environment to run the JAVA applications. JRE consists of class libraries, user interface toolkit, class loader and JAVA Virtual Machine JVM .

The class loader loads the required class libraries. JVM works as an interpreter for running the JAVA program line-by-line. This interpreter executes the Byte Code .

You might be interested in
Write an if/else statement that compares the double variable pH with 7.0 and makes the following assignments to the int variable
levacccp [35]

Answer:

if (pH<7.0){

          neutral=0;

          base=0;

          acid=1;

      }

      else if (pH>7.0){

          neutral=0;

          base=1;

          acid=0;

      }

      else if (pH==7.0){

          neutral=1;

          base=0;

          acid=0;

      }

Explanation:

As required by the question, if and else statements have been used to test the value of the pH and assign the apropriate values to the variables neutral, base and acid.

The code snippet below can be used to prompt the user to enter values for pH

<em>import java.util.Scanner;</em>

<em>public class pHTest {</em>

<em>   public static void main(String[] args) {</em>

<em>      Scanner scr = new Scanner(System.in);</em>

<em>       System.out.println("Enter a value for the pH");</em>

<em>       int neutral, base, acid;</em>

<em>       double pH = scr.nextDouble();</em>

<em> if (pH<7.0){</em>

<em>           neutral=0;</em>

<em>           base=0;</em>

<em>           acid=1;</em>

<em>       }</em>

<em>       else if (pH>7.0){</em>

<em>           neutral=0;</em>

<em>           base=1;</em>

<em>           acid=0;</em>

<em>       }</em>

<em>       else if (pH==7.0){</em>

<em>           neutral=1;</em>

<em>           base=0;</em>

<em>           acid=0;</em>

<em>       }</em>

<em>} }</em>

4 0
3 years ago
Read 2 more answers
What are sums of money that are given out for specific reasons?
xenn [34]

Answer:

a

Explanation:

6 0
3 years ago
Read 2 more answers
Explain how any simple substitution cipher that involves a permutation of the alphabet can be thought of as a special case of th
Kaylis [27]

A simple substitution cipher takes each vector (e_i) and assigns it to the vectors [e_{\pi (i)}] in a one-to-one function so as to make them equivalent.

<h3>What is the Hill cipher?</h3>

In 1929, the Hill cipher was invented by Lester S. Hill and it can be described as a poly-graphic substitution cipher that is typically based on linear algebra and it avails a cryptographer an ability to simultaneously operate on more than three (3) symbols.

In Cryptography, the simple substitution cipher is usually viewed as a function which takes each plaintext letter (alphabet) and assigns it to a ciphertext letter. Thus, it takes each vector (e_i) and assigns it to the vectors [e_{\pi (i)}] in a one-to-one function so as to make them equivalent.

Read more on Hill cipher here: brainly.com/question/13155546

#SPJ1

6 0
2 years ago
Type the correct answer in the box. Spell all words correctly.
Tom [10]

Answer:

navigate keys

Explanation:

the up and down keys are to scroll through documents and pages.

8 0
3 years ago
Read 2 more answers
Discuss different ways to respond to errors, such as notifying the user onscreen, writing to an error log, notifying the develop
Ronch [10]

Answer:

Notifying the errors is always useful .

Explanation:

The errors should always be notified to the developer. It is useful and is important. When we provide notifications on the screen, it helps the user and it can be used to provide feedback. In regard to developmental work, it has to be important and confidential and we use the help of email to inform or notify errors to the organization. This will help the company from negative criticism and helps the company perform better. We can also write an error log when we face the same error again and again even after notifying the developer organization. This helps to put a reminder to the organization that immediate check has to be dome and eliminate the error from the source.

Some disadvantages are if we do not keep timer implementation, the alert keeps on popping on the screen, which is irritable.

4 0
3 years ago
Other questions:
  • How does theatre compare with movies or television? What makes it similar to movies and television? What makes it different?
    13·1 answer
  • 1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaini
    6·1 answer
  • Please help me with this! I’m using Python 3
    12·1 answer
  • In python,_______ are used to define the conditions necessary for a while loop to run.
    7·2 answers
  • One key feature of malware is that it:
    13·1 answer
  • You can use tables for layout work. However, in XHTML, each form control should have its own ______ element
    12·1 answer
  • You are purchasing a new printer. Which of the following is the most important requirement?
    5·1 answer
  • With working from home now becoming a norm what is an effective network for an organization to secure its internal resources acc
    14·1 answer
  • if a user watches a video with event tracking three times in a single session, analytics will count how many unique events?
    11·1 answer
  • Which one of the following is malicious software that denies you access to your files or your organization's files unless you pa
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!