1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gekata [30.6K]
3 years ago
6

Develop a menu-driven program that inputs two numbers and, at the user’s option, finds their sum, difference, product, or quotie

nt.
Computers and Technology
1 answer:
Reptile [31]3 years ago
6 0

Answer:

import java.util.Scanner;

public class TestClock {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter num 1");

       double num1 = in.nextDouble();

       System.out.println("Enter num 2");

       double num2 = in.nextDouble();

       System.out.println("enter \"s\" for addition\t \"d\" for difference\t \"p\" for the product\t and \"q\" for the quotient");

       char op = in.next().charAt(0);

       if(op =='s'||op=='S'){

           double sum = num1+num2;

           System.out.println("The sum is "+sum);

       }

       else   if(op =='d'||op=='D'){

           double diff = num1-num2;

           System.out.println("The difference is "+diff);

       }

       else if(op =='p'||op=='P'){

           double prod = num1*num2;

           System.out.println("The product is "+prod);

       }

       else if(op =='q'||op=='Q'){

           double quo = num1/num2;

           System.out.println("The Quotient is "+quo);

       }

   }

}

Explanation:

  1. Use Scanner class to receive the two numbers and save in a two variables
  2. Create a new variable for Operation (op) to store a character
  3. Request the user to enter a character for the opearation (e.g s=sum, p=product, q=quotient and d=difference)
  4. Use if/else..if statements to implement the required operation

You might be interested in
Consider the following statements: struct supplierType { string name; int supplierID; }; struct paintType { supplierType supplie
Romashka [77]

Answer:

The answer is "supplierType"

Explanation:

Description of the code:

  • In the given program two structure is defined, that is "supplierType and paintType", in which "supplierType" structure two-variable name and "supplierID" is defined, that datatype is "String and integer".
  • In the next step, "paintType" is declared, in which "supplierType" object supplier is created, in which two string variable "color and paintID" are defined, in which "supplierType" data type is supplied.
3 0
4 years ago
If you click on repeat header rows, what will happen?
vichka [17]

Answer:

The header row will now be automatically repeated whenever the table appears across multiple pages. To turn this off, just click the Repeat Header Rows button again

Explanation:

4 0
2 years ago
Compose an e-mail to your coworker Adam that describes how to add a photograph to a slide.
pantera1 [17]

The ways to add a photograph to a slide is given below: What to write when composing the email is also given below.

<h3>How do you Insert photos into a slide?</h3>

The steps are given below?\

  • The first thing to do is to open  the slide you want to insert the image on.
  • then click on Insert menu, and take the cursor to the Picture, and then one can click Photo Browser or insert pictures.
  • Then select the picture that you want and and one can drag it onto the slide.

Note that it is essential to follow the steps and one can add as many pictures as they want to their slides.

Learn more about e-mail from

brainly.com/question/24506250

#SPJ1

3 0
2 years ago
Use the drop-down menus to complete the statements about integrating pictures and text in a Word document.
FrozenT [24]

Answer:

1. Move with text

2. Fix position on page

3. Remove background

Explanation:

EDGE 2021

7 0
3 years ago
Read 2 more answers
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Other questions:
  • Binary search requires that data to search be in order. true or false
    5·1 answer
  • DLucy is planning to launch her podcast on career guidance for college students and has already recorded a few videos for market
    10·1 answer
  • You would set a ___________ to prevent users from immediately changing their password several times in one day to return to the
    15·2 answers
  • Which of the following function headings arevalid? If they are invalid, explain why.
    12·1 answer
  • You have a notebook computer and wish to connect to an IEEE 802.11ac wireless network. The computer does not have a built-in WLA
    15·1 answer
  • Someone please make a random question with an easy answer because i need one more brainliest to UPGRADE!
    7·2 answers
  • What does getfenv() do?
    11·2 answers
  • Drag each statement to the correct location.
    10·1 answer
  • Plsssssssss help me​
    8·1 answer
  • The _____ layer addresses how the software will execute on specific computers and networks.
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!