1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuki888 [10]
3 years ago
7

Fun with Characters

Computers and Technology
1 answer:
Inessa [10]3 years ago
4 0

The program is an illustration of conditional statements.

Conditional statements are statements whose execution is dependent on the truth value of the condition.

The checkCharacter() method in Java, where comments are used to explain each line is as follows:

//This defines the checkCharacter() method

public static String checkCharacter(String inputString, int index){

  //This checks if the character at the index, is a digit

  if(Character.isDigit(inputString.charAt(index))){

      //If yes, it returns "Digit"  

      return "Character "+inputString.charAt(index)+" is a digit";

  }

  //This checks if the character at the index, is a letter

  else if(Character.isLetter(inputString.charAt(index))){

      //If yes, it returns "letter"

      return "Character "+inputString.charAt(index)+" is a Letter";

  }

  //This checks if the character at the index, is a white space

  else if(inputString.charAt(index) ==' '){

      //If yes, it returns "white space"

      return "Character "+inputString.charAt(index)+" is a white space";

  }

  #If all the above conditions are false

   else{

      //If yes, it returns "unknown character"

      return "Character "+inputString.charAt(index)+" is an unknown character";

  }

}

The string to return depends on the character at the index.

Read more about similar programs at:

brainly.com/question/25127567

You might be interested in
PLEASE HELP
svet-max [94.6K]

Answer:

i think its accommodate, because the other two dont look right. correct me if im wrong

7 0
2 years ago
Using the spreadsheet below, which formula can be used to determine Albert's hourly wage?
algol13

Answer:

It will be average (B2:C2)

as it will select all the data between B2 and C2

7 0
3 years ago
Read 2 more answers
How many data bits are sent in a single psk31 character?
ololo11 [35]
I would say the number varies.
8 0
3 years ago
_________ involves connecting geographically remote computers into a single network and combining the computational power of all
galben [10]

Answer:

Grid computing involves connecting geographically remote computers into a single network to create a computational grid that combines the computing power of all the computers on the network to attack large computing problems.

7 0
3 years ago
Read 2 more answers
1. provides a list of at least five SSIDs and the
taurus [48]

One of the most important ways to provide wireless security is through:

  • The use of encryption.

<h3>What is Wireless Security?</h3>

This refers to the network authentication and use of encryption to secure a network from unauthorized access or compromise of the network by an external agent.

With this in mind, we can see that SSID is a WiFi network name and it makes use of WPA2 security encryption to protect the wireless network through wireless encryption protocol.

Please note that your question is incomplete so I gave you a general overview to help you get a better understanding of the concept.

Read more about wireless security here:
brainly.com/question/14449935

8 0
2 years ago
Other questions:
  • Powerpoint s _____ feature allows you to set the timing for a video clip
    12·1 answer
  • _____ is a software delivery approach in which an organization outsources the equipment used to support its data processing oper
    5·1 answer
  • When photographing wildlife, what type of lighting should you use?
    15·2 answers
  • After you configure backup settings using the backup plugin, backup jobs will run automatically and start taking backups at the
    13·1 answer
  • Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users im
    8·1 answer
  • Which feature do we most likely use to quickly change the background, fonts, and layout?
    12·1 answer
  • What is the difference btween a microcontroller a mini computer?
    15·2 answers
  • Will mark Brainliest!! What is the best hard disk compacity? Why?
    7·1 answer
  • MODS ONLY answer this, I have something for you. I'm reporting this to make it easier
    14·1 answer
  • Which of the following statements is true when it comes to developing a web presence for a business?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!