1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesya692 [45]
3 years ago
14

Java Eclipse homework. I need help coding this

Computers and Technology
1 answer:
olganol [36]3 years ago
7 0

Answer:

I can't just do your project but use this as a head start.

Explanation:

public class TableOfBases

{

   public static void main(String[] args)

   {

       // print out "Decimal    Binary   Octal   Hex    Character";

       //  write a for loop from 65 to 90

       for (int i ...  ) {

         // get a string for integer i with base 2

           String binary = Integer.toString (i,2);

         // get a string for integer i with base 8

           String octal = Integer.toString( ...   );

         // get a string for integer i with base 16

           String hex =  ...

        // get a char for a chararater that has ASCII code i

           char ch = (char) i ;

         // print out binary, octal and hex, and ch

       }

   }

}

/*

Project... Basically Speaking

Create a project called TableOfBases with class Tester.

The main method should have a for loop that cycles through the integer values

65 <= j <= 90 (These are the ASCII codes for characters A – Z).

Use the methods learned in this lesson to produce a line of this table on each pass

through the loop. Display the equivalent of the decimal number in the various bases

just learned (binary, octal, and hex) as well as the character itself:

Decimal Binary Octal Hex Character

65 1000001 101 41 A

66 1000010 102 42 B

67 1000011 103 43 C

68 1000100 104 44 D

69 1000101 105 45 E

70 1000110 106 46 F

....

71 1000111 107 47 G 72 1001000 110 48 H 73 1001001 111 49 I 74 1001010 112 4a J 75 1001011 113 4b K 76 1001100 114 4c L 77 1001101 115 4d M 78 1001110 116 4e N 79 1001111 117 4f O 80 1010000 120 50 P 81 1010001 121 51 Q 82 1010010 122 52 R 83 1010011 123 53 S 84 1010100 124 54 T 85 1010101 125 55 U 86 1010110 126 56 V 87 1010111 127 57 W 88 1011000 130 58 X 89 1011001 131 59 Y 90 1011010 132 5a Z

*/

You might be interested in
What are some elements commonly included in forms in Word? Check all that apply.
MArishka [77]

Answer:

dates

text

drop-down lists

8 0
4 years ago
The following image shows the number of orders Company A received in 2015-2020. A financial analyst wants to calculate the year-
abruzzese [7]

The step that the analyst take to apply the same formula to all adjacent years using the Macabacus’ Fast Fill Right shortcuts  is the use of the  Macabacus Excel Add-in.

<h3>What are the feature in the Formulas menu of the Macabacus Excel add-in?</h3>

The Macabacus Excel Add-in is known to be a formula auditing tools that aids  one to be able to know and correct any kinds of errors and other forms of inconsistencies in the financial models.

Note that it is one that tends to bring up the speed of the modeling process. The Excel add-in is a tool that aid the users to make some reliable links between the financial model and that of the PowerPoint or Word documents.

Hence, The step that the analyst take to apply the same formula to all adjacent years using the Macabacus’ Fast Fill Right shortcuts  is the use of the  Macabacus Excel Add-in.

Learn more about Macabacus from

brainly.com/question/1538272

#SPJ1

8 0
2 years ago
CREIDT INAOCT Unscramble thr word<br>please solve it fast its urgent ​
ivanzaharov [21]

Answer:

Credit Action .......I believe

6 0
3 years ago
1. Why is it important to evaluate the website on which you plan to shop? (1 point)
UkoKoshka [18]
Hi there!

For #1 the answer is the site may not be trustworthy, and you risk identity theft. If you are not sure a site legit then don't trust it. Some sites can easy to tell if they can be trusted by the amount of detail put into the site itself, but others are not so easy to tell. In general, if a site does not have https:// in the web address, but instead has just http:// (no "s" in it) then don't trust it.

For #2 the answer is to use<span> a secure browser. If the browser you are using is insecure then the info you put into a site can be compromised and stolen by the browser itself because it reads all info put on it.

For #3 the answer is i</span><span>t has a secure payment page. Again going back to the https:// vs. the http:// if the page that you pay on is not secured then your credit card info can be stolen when put in because the site without a secured page will allow others with access to see your info.

-Your friend in tech, </span>ASIAX   Frequent Answerer
8 0
4 years ago
Read 2 more answers
While investigating an email issue, a support technician discovers no users can access their email accounts on the company’s ema
Paraphin [41]

Answer:

The question is incomplete.The full question with options is rewritten below:

"While investigating an email issue, a support technician discovers no users can access their email accounts on the company’s email server connected to the private LAN. Pinging the email server from several workstations on the LAN results in 0% packet loss.  

Which of the following is the next step the technician should take in troubleshooting this issue?  

A. Contact the ISP, inform the provider of the issue, and ask the provider to check the server.

B. Verify the server has a valid assigned IP address on the LAN subnet.

C. Escalate the problem to a server administrator to check for issues with the server.

D. Check the workstations on the LAN for APIPA configuration."

The answer is option (C): <em>Escalate the problem to a server administrator to check for issues with the server</em>

Explanation:

Being a Support Technician, you may not be able to determine the main issue with the mail server but may need to escalate further to the next category of individual that will confirm the issue with the mail server, in this case the server administrator as he may have higher access into the server at the back end or may directly liaise with the Private ISP.

7 0
3 years ago
Other questions:
  • Write a memo to the vice president, outlining the steps an employee might have taken to create an e-mail message and make it app
    15·1 answer
  • an object or device outside the computer, that one would plug into a port to control the functions of a computer are?
    9·2 answers
  • There are ways to perform computer commands quickly and multiple times. <br> a. True <br> b. False
    11·2 answers
  • A hotel salesperson enters sales in a text file. Each line contains the following, separated by semicolons: The name of the clie
    11·1 answer
  • What is the maximum number of VLANs that can be configured on a switch supporting the 802.1Q protocol? Why?
    11·2 answers
  • Callie Crystal owns and operates one of the most successful local coffee shops in Denver, called The Edgewater Café. Each time a
    5·2 answers
  • How has your perspective changed since the beginning of the class?
    5·1 answer
  • What is the output?<br> str = 'abcdef<br> print(str[2:50)
    6·2 answers
  • If Tamya makes $1000.00 gross monthly income and her total payroll deductions are $294.00, what is her net income?
    9·1 answer
  • When adding a component to a container with the ____ layout, specify the NORTH, EAST, SOUTH, WEST, or CENTER position.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!