1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lilavasa [31]
3 years ago
11

Write a Java class with the following methods: getArray(int numStrings) is an instance method that takes command line input (use

a Scanner's nextLine() method) to create an array of Strings whose length is numStrings and returns a reference to the array. getArray() does not print anything! getLongestString(String[] sArray) is an instance method that returns a reference to the longest String in sArray. getLongestString() does not print anything! main() creates an instance of the class and uses it to call getArray() with the argument 5, keeping a reference to the return value, then sends the array to getLongestString(), and prints the result

Computers and Technology
1 answer:
mezya [45]3 years ago
4 0

Answer:

Follows are the code to this question:

import java.util.*;//import packae for user-input  

public class Main//defining a class Main

{

public String[] getArray(int numString)//defining a method getArray

{

String[] name=new String[numString];//defining array of String values

Scanner in = new Scanner(System.in);// creating scanner class object for input values from user-end

for(int i=0;i<numString;i++)//defining for loop for input multiple values

{

System.out.print("Enter String Value :");//print message

name[i]=in.nextLine();//input values

}

return name;//return array values

}

public String getLongestString(String[] sArray)//defining a method getLongestString

{

int m=0,mi=0; //defining integer variables

for(int i=0;i<sArray.length;i++)//defining for loop for check the longest value in array

{

if(m<sArray[i].length())//defining if block that checks m varaible value greater then sArray length  

{

m=sArray[i].length();//use m to hold sArray length

mi=i;//use max_index to hold i that is loop value

}

}

return sArray[mi];//return Longest value

}

public static void main(String[] args)//defining main method

{

Main s=new Main();//Creating object of main class    

String[] n;//defining string variable n  

n=s.getArray(5);//use n varaible to call getArray method and store its value

System.out.println("Longest value is: "+s.getLongestString(n));//use print method to call getLongestString method

}

}

Output:

please find attached file.

Explanation:

In the given java program code, inside the main class two method that is "getArray and getLongestString", is defined, in which the "getArray" method uses an integer variable in its parameter and inside the method, an array is defined that use a  scanner class for input array value.

  • In the "getLongestString" pass as a parameter and inside the method, two integer variable "m and mi" is defined that use in the loop to return the longest string value.
  • In the class main method is to define that creates a class object and call the above method and use the print method to return its value.  

You might be interested in
Selah infects the ads on a website that users from her target company frequently visit with malware as part of her penetration t
ValentinkaMS [17]

Selah infects the ads on a website with a technique called the Watering hole attacks.

<h3> What is Watering hole attacks?</h3>

The  Watering hole attacks is known to be a form of attack that depends on compromising or infecting a website that has or that targeted users who are known to often frequently visit.

So, Selah infects the ads on a website with a technique called the Watering hole attacks.

Learn more about malware from

brainly.com/question/399317

#SPJ1

8 0
2 years ago
Is a term used to define those providers or hospitals that have the capabilities and processes in place to be actively use certi
aksik [14]
Meaningful use (MU) i<span>s a term used to define those providers or hospitals that have the capabilities and processes in place to be actively use certified electronic health record technology.
</span><span>This term is used in a health information technology (HIT) context.
</span><span> It defines minimum U.S. government standards for </span>using<span> electronic health records (EHR) and for exchanging patient clinical data between healthcare providers.</span>
5 0
3 years ago
What is the most powerful gpu or known as the graphics card in the world?
Sliva [168]
Although it's too early in the year to know what the best one is and there are many, in 2015 the most powerful GPUs were the EVGA GeForce Titan X, the Zotac GeForce GTX 980Ti and the <span>Gigabyte Radeon R9 Fury X.</span>
6 0
3 years ago
Read 2 more answers
One of the biggest risks involved in using e-mail is
Maurinko [17]
The best answer to the question that is being presented above would be letter d. One of the biggest risks involved in using electronic mail or e-mail is the amount of junk mail you get from unsolicited, spamming, and phishing e-mail addresses.
8 0
3 years ago
Read 2 more answers
Which would be the most appropriate way to estimate -6.1(0.22)? Check all that apply.
Sergeu [11.5K]

Answer:

A.Use rounding to get -6(0.2), and then multiply. and D. use front end estimation to get -6(0.2), and multiply. and B.

Explanation:

just took the test

7 0
3 years ago
Read 2 more answers
Other questions:
  • True or false words spelling and grammar check is always %100
    7·2 answers
  • You browsing internet and you realize that its not responding what do you do with out rebooting the computer
    10·1 answer
  • A book of the Law was found in the Temple, which was being repaired, during what year of Josiah's reign.
    15·2 answers
  • The following code processes a file containing five positive numbers. What will the variable $result contain after the code is e
    10·1 answer
  • If an object moves without rotation or angular displacement, it is called translation.
    11·1 answer
  • For each 8-bit data frame the layer uses a generator polynomial G(x) = x4+x2+ x+1 to add redundant bits. What is the sequence of
    11·1 answer
  • Software that requires excessive disk space or memory.
    15·1 answer
  • Moving your Sprite from right to left is considered the X coordinate?
    5·1 answer
  • What are the disadvantages of using grid analysis to help make decisions?
    13·2 answers
  • What is a sensitive compartmented information program
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!