1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bazaltina [42]
3 years ago
14

Write a method that accepts an integer argument and returns the sum of all the integers from 1 up to (and including) the number

passed as an argument. For example, if 3 is passed as an argument, the method will return the sum of 1+2+3, which is 6. Use recursion to calculate the sum. Test your method in main by prompting the user to enter a positive integer to sum up to. Provide input validation so that only positive values are accepted.
Computers and Technology
1 answer:
kakasveta [241]3 years ago
8 0

Answer:

mark me brainlist

Explanation:

import java.util.*;

public class Main {

       public static int sumOfNumbers(int n)

       {

               if(n==0) return 0;

               else

               return n+sumOfNumbers(n-1);

       }

       public static void main(String[] args) {

               Scanner sc=new Scanner(System.in);

               int n;

               while(true)

               {

                       System.out.println("Enter a number :");

                       n=sc.nextInt();

                       if(n<=0)

                       System.out.println("Enter a positive number ");

                       else

                       break;

               }

               System.out.println("Sum of all numbers upto "+n+" is :"+sumOfNumbers(n));

       }

}

You might be interested in
List three ways you can help someone who is being bullied in of just being a bystander​
nignag [31]

Answer:

1.) Let a teacher, administrator or other safe adult know about what's going on.

2.) If someone is being physically harmed, you can call the police or 911.

3.) If the bullying is mild, (Name calling, insults, etc.) you can attempt to step in.

Explanation:

N/A

8 0
3 years ago
Compare Fibonacci (recursion vs. bottom up)
ipn [44]

Answer:

C++ code explained below

Explanation:

#include<bits/stdc++.h>

#include <iostream>

using namespace std;

int FiboNR(int n)

{

int max=n+1;

int F[max];

F[0]=0;F[1]=1;

for(int i=2;i<=n;i++)

{

F[i]=F[i-1]+F[i-2];

}

return (F[n]);

}

int FiboR(int n)

{

if(n==0||n==1)

return n;

else

return (FiboR(n-1)+FiboR(n-2));

}

int main()

{

long long int i,f;

double t1,t2;

int n[]={1,5,10,15,20,25,30,35,40,45,50,55,60,65,70,75};

cout<<"Fibonacci time analysis ( recursive vs. non-recursive "<<endl;

cout<<"Integer FiboR(seconds) FiboNR(seconds) Fibo-value"<<endl;

for(i=0;i<16;i++)

{

clock_t begin = clock();

f=FiboR(n[i]);

clock_t end = clock();

t1=double(end-begin); // elapsed time in milli secons

begin = clock();

f=FiboNR(n[i]);

end = clock();

t2=double(end-begin);

cout<<n[i]<<" "<<t1*1.0/CLOCKS_PER_SEC <<" "<<t2*1.0/CLOCKS_PER_SEC <<" "<<f<<endl; //elapsed time in seconds

}

return 0;

}

7 0
3 years ago
Which is an example of a variable name written in camelcase?
stiv31 [10]

Answer: songName

-DoggyMan5

4 0
3 years ago
Read 2 more answers
________ is a remote access client/server protocol that provides authentication and authorization capabilities to users who are
iren [92.7K]

Answer:

Correct answer is (4)

Explanation:

Terminal Access Controller Access Control System

4 0
3 years ago
Think of all your favorite movies or games. Is their digital animation present? How do you think that it affected the movie or g
Lyrx [107]

Answer:

yea there is a digital animation bc its animated, it changed the appearance, it wouldnt be there, it would look cool

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • ​_____ describes the process of using computer software to extract large amounts of data from websites. A. Sentiment analysis B.
    10·1 answer
  • He primary purpose for attackers to send port scanning probes to hosts is to identify which ports are open. true false
    5·1 answer
  • Need 2.5 Code Practice Answers
    14·2 answers
  • A systems administrator is designing a directory architecture to support Linux servers using Lightweight Directory Access Protoc
    11·1 answer
  • Explain why decomposition will be used in creating the algorithm for the game including two dice.
    11·1 answer
  • Visme,PowerPoint, keynote and prezi are what kind of software
    15·1 answer
  • Anne creates a web page and loads a CSS style script along with the page. However, the entire page appears black and she cannot
    6·1 answer
  • What is one example of an emerging class of software
    12·1 answer
  • What are all the Answer Streaks (Fun Facts) for brainly?
    13·2 answers
  • What are three ways to protect yourself from identity theft when using your smartphone or computer?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!