1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seropon [69]
3 years ago
9

Summary

Computers and Technology
1 answer:
Nataly_w [17]3 years ago
8 0

Answer:dddd

Explanation:

//The code is all written in Java and here are the three classes in order ReportDriver, RaceReport, and Race

class ReportDriver {

   

   public static void main(String[] args) {

       boolean continueRace = true;

       Scanner in = new Scanner(System.in);

       ArrayList<ArrayList<Integer>> races = new ArrayList<>();

       while (continueRace == true) {

           System.out.println("Would you like to enter into a race? Y or N");

           char answer = in.next().toLowerCase().charAt(0);

           if (answer == 'y') {

               Race race = new Race();

               races.add(race.Race());

           } else {

               break;

           }

       }

       for (int x = 0; x <= races.size()-1; x++) {

           RaceReport report = new RaceReport();

           report.RaceReport(races.get(x));

           report.printRange();

           report.printAverage();

       }

   }

}

//++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

package sample;

import java.util.ArrayList;

public class RaceReport {

   int range, average;

   String first, second, third;

   public void RaceReport(ArrayList<Integer> times) {

       if (times.get(2) == times.get(1)) {

           if (times.get(2) == times.get(0)) {

               System.out.println(first = "Times tied for first place are " + times.get(2) + " and " + times.get(1) + " and " + times.get(0));

           } else {

               System.out.println(first = "Times tied for first place are " + times.get(2) + " and " + times.get(1));

               System.out.println(second = "Second place time is " + times.get(0));

           }

       } else if (times.get(1) == times.get(0)) {

           System.out.println(first = "First place time is " + times.get(2));

           System.out.println(second = "Times tied for Second place are " + times.get(1) + " and " + times.get(0));

       } else {

           System.out.println(first = "First place time is " + times.get(2));

           System.out.println(second = "Second place time is " + times.get(1));

           System.out.println( third = "Third place time is " + times.get(0));

       }

       range = Math.abs(times.get(0) - times.get(2));

       average = (times.get(2) + times.get(1) + times.get(0) / 3);

   }

   public void printRange() {

       System.out.println("The range of the race was " + range);

   }

   public void printAverage() {

       System.out.println("The average of the race was " + average);

   }

}

//++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

package sample;

import java.util.ArrayList;

import java.util.Collections;

import java.util.Scanner;

public class Race {

   Scanner in = new Scanner(System.in);

   ArrayList<Integer> times = new ArrayList<>();

   public ArrayList<Integer> Race() {

       System.out.println("Input time 1:");

       times.add(in.nextInt());

       System.out.println("Input time 2:");

       times.add(in.nextInt());

       System.out.println("Input time 3:");

       times.add(in.nextInt());

       Collections.sort(times);

       return times;

   }

}

You might be interested in
Your help desk has informed you that they received an urgent call from the vice president last night requesting his logon ID and
makkiz [27]

Answer:

Social Engineering Attack

Explanation:

The exploitation of individuals in order to gain confedential information is a Social Engineering Attack. These attacks typically take advanage of one's emotions or they use inpersonaltion to steal data.

read more here: https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

Lmk if this helps! :)

7 0
3 years ago
In addition to compiling the list of user access requirements, applications, and systems, the BIA also includes processes that a
laila [671]

Answer:

automated

Explanation:

Basically a Business Impact Analysis (BIA) estimates and determines the effects of a business activity and process disturbances. These disruptions can be natural or electronic disasters. It also collects information which is used to establish recovery plan. It identifies the business vulnerabilities and works on the strategies in order to reduce such potential hazards. The BIA involves both manual and automated processes. BIA involves automated processes which include the automated software tools that enables the protection of the confidential information of the users and also generates automated reports about the critical business processes.

5 0
3 years ago
Tower of Hanoi algorithm 4 disks
Sophie [7]
????is this a question
4 0
3 years ago
Read 2 more answers
Question 5) What is a feature of podcasts?
steposvetlana [31]

Answer:

the answer is a.they rely on airwaves for broadcasting

Explanation:

i just took this test on brainly

6 0
3 years ago
Read 2 more answers
Which type of exception would be detected if you used the conversion command Convert.ToDecimal to try to convert an ampersand?
Anestetic [448]

Answer:

Visual basic

Explanation:

Implicit and Explicit Conversion

4 0
3 years ago
Other questions:
  • Suppose the program counter (pc) is set to 0x2000 0000. is it possible to use the jump (j) mips assembly instruction to set the
    15·1 answer
  • What is the IEEE standard for the Wi-Fi Protected Access 2 (WPA2) security protocol?
    6·1 answer
  • PLEASE HELP ASAP!!
    12·1 answer
  • Which part of the os provides users and applications with an interface to manipulate files?
    8·1 answer
  • Disk quotas are set using the ____ console. diskpart disk management mst windows explorer
    10·1 answer
  • What kind of printer is used with multipart forms such as those with point of sale machines?A) dot-matrixB) daisy-wheelC) inkjet
    5·1 answer
  • WHICH COMPUTER COMPONENT CONTAINS ALL THE CIRCUITRY NECESSARY FOR THE OTHER COMPONENTS OR DEVICES TO COMMUNICATE WITH ONE ANOTHE
    12·1 answer
  • Where is the best place to self learn c++ or c# that is free?
    6·2 answers
  • How does the technology affect you daily living? Give situations where you use technology and how it helped you.​
    5·1 answer
  • Examine the following output:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!