1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
posledela
3 years ago
10

To calculate the chapter from which you must solve the programming exercise, divide the integer number representing your student

ID by 3, consider the remainder (either 0, 1 or 2) and increment it by 3. The result you obtain represents the chapter number, and it should be 3, 4 or 5.
Computers and Technology
1 answer:
Mashutka [201]3 years ago
7 0

Answer:

<em>import java.util.Scanner;</em>

<em>public class ANot {</em>

<em>    public static void main(String[] args) {</em>

<em>        System.out.println("Please Enter Your Student ID");</em>

<em>        Scanner in = new Scanner(System.in);</em>

<em>        int yourId = in.nextInt();</em>

<em>       int chapterToRead = (yourId%3)+3;</em>

<em>        System.out.println("You are to read chapter: "+chapterToRead);</em>

<em>    }</em>

<em>}</em>

Explanation:

This solution is implemented in Java programming language. The scanner class is used to receive user input which is saved in an int variable yourId. In order to obtain the remainder when the students' ID is divided by 3, we use the modulo (%) operator which returns the remainder

You might be interested in
2a
zmey [24]

Answer:

See explaination

Explanation:

2a)

A hacker group hacked into the Bay Area Rapid Transit system, this was done to protest BART’s shut down of wireless communication in some BART stations. Such attacks is done mostly to stand for some situation which happened previously. Hence, we can say it is a form a hacktivism. It was not ethical as it disrupted the system for some time.But this is also a form of protest which is been done by some group of peoples.

2b)

If a foreign government launches a hacking attack, it can be considered a war.

If this type of attack happens then the repercussions may result to the war.

2c)

We gave an analogy between merchants accepting some amount of shoplifting, on the one hand, and merchants and credit card companies accepting some amount of credit card fraud, on the other hand.

THe streght so called can be pointed out as the money is rolling in the market and the business keeps on going.

The weakness can be described as the loss which is being incurred by the company.

7 0
3 years ago
Impaired drivers not only harm themselves but they harm other individuals and affect our _________________.
lawyer [7]

entire society. impaired drivers affect all of those things.

4 0
4 years ago
Read 2 more answers
Question # 4
bezimeni [28]

Answer:

the last one I think not 100% sure

6 0
4 years ago
If you answer I will mark brainliest!!! I want to be able to see two websites on my screen at the same time, how do I do that on
aleksandrvk [35]
Click chrome with 2 fingers on your mousepad and click new window, you can have 2 websites open at once this way
8 0
3 years ago
When the computer makes room for sentences on the next line, this is called
OLga [1]
That's easy its called enter you can push enter and it will bring you to the next line so that's it good bye have a nice day
3 0
3 years ago
Other questions:
  • The following declaration appears in a program: short totalPay, basePay = 500, bonus = 1000; The following statement appears in
    9·1 answer
  • Sensitive security information can be shared with whom
    13·2 answers
  • Refer to the image below. The letter item indicated at 3. is_____________________ a Your Address - Where you are b The Letter Ad
    7·1 answer
  • GenXTech is a growing company that develops gaming applications for military simulations and commercial clients. As part of its
    8·1 answer
  • When designing a database, what should your first step be?
    5·1 answer
  • What types of storage can be used to access your data on another computer?
    7·2 answers
  • Social media is an effective form of e-commerce. True False
    12·1 answer
  • A for loop
    6·1 answer
  • What security setting can cause a mobile device to erase installed apps and data if the passcode is incorrectly entered a number
    11·1 answer
  • In which directory would a system administrator store scripts that should be run monthly by the cron daemon?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!