Object-Oriented Programming (Using Java Language)
===============================================

Object-Oriented Programming (Using Java Language)===============================================
Object-Oriented Programming (Using Java Language)===============================================
Object-Oriented Programming (Using Java Language)===============================================
Object-Oriented Programming (Using Java Language)===============================================

Answers

Answer 1

Answer:

import java.util.Scanner;

class Main {  

 public static void main(String args[]) {

       Scanner scan = new Scanner(System.in);

       System.out.print("Enter a decimal value (0 to 15): ");

       int num = scan.nextInt();

       scan.close();

       

       if (num < 0 || num >15) {

           System.out.printf("%d is an invalid input\n", num);

       } else {

           System.out.printf("The hex value is %X\n", num);

       }

 }

}

Explanation:

Hopefully this example will get you going for the other assignments.


Related Questions

Write a program that gives simple math quizzes. The program should display two random numbers that are to be added, such as:

Project 5-11 output

The program should allow the student to enter the answer. If the answer is correct, a message of congratulations should be displayed. If the answer is incorrect, a message showing the correct answer should be displayed.

Answers

Answer:

6

Explanation:

the answer would have to be 6

1. Software that is designed to intentionally cause harm to a device, server, or network is A. outware B.loggerware C.
attackware D. malware Answer:
2. Some examples of malware include: A. robots, viruses, and worms B. trojans, worms, and bots C. computerware,
worms, and robots D.worms, system kits, and loggerware Answer:
3. Viruses and worms can affect a system by A. deleting hard drives B. slowing down the system C. improving system
functions D. producing fake applications Answer:
4. One tool that hackers use to get sensitive information from victims is/are A. loggerware B. keyloggers C.robots D.
phishing Answer:
5. One key feature of malware is that it A. can only work individually B. can only work on certain operating systems C.
can work jointly with other malware types D. can always be stopped by anti-malware software Answer:
6. One vulnerability that makes computers susceptible to malware is A. using anti-malware software B. using password
protection C. using old versions of software D. using encryption on sensitive files Answer:
7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gathering
personal information C. give an attacker full control over a system D. all of the above Answer: -
8. Malware is a combination of which two words? A malevolent and software B. malignant and software C.
maladapted and software D. malicious and software Answer:
9. The most common way that malware is delivered to a system is through the use of A USB sticks B. damaged
hardware C. emails/attachments D.updated software Answer:
10. Mobile malware is A. malware that moves from one device to another B. malware that moves to different areas in
one system C. malware that deactivates after a period of time D. malware that infects smartphones and tablets
Answer:

Answers

Answer:

Explanation:

1.  D Malware causes harm, the other answers seem irrevelant.

2.  B Because they all can cause harm to a server, device or network. (trojan for device, worm for device and bots for networks)

3.  B I haven't heard of viruses deleting hard drives, but lots of viruses do slow

down your computer.

4. D Phishing is a way to obtain data so yes.

5. ? This one is wierd... We can rule out D because that's not always true but you have to decide this on your own.

6. Obviously C? Using old versions can make your computer more

susceptible to malware.

7. D Because all of those can be uses.

8. D Malicous software

9. This is a hard one... Not D, Most likely not B and C is probably more

common.

10.  D It's MOBILE malware

Other Questions
For what purpose did Egyptians place life-size sculptures in the tombs of their rulers? What are the major problems and pitfalls that RW faces as it tries to go global with its product line? What is the slope-intercept equation of the line that is perpendicular to y-4=-2/3(x-6) and that passes through (-2, -2)? can someone help me and check if im right? please and fast What format would you use to cite this source in a bibliography? ____________________________________________________ HURRYYY ASAPWhy is it best to use block structure when there are few items to compare in an essay?Readers see the features of each item in the same paragraph.Readers can remember the details better.Readers can more easily see the similarities.Readers have an overall idea of each item and remember the details. where is it most likely to find a fruit bat? Order these three values from least to greatest. Explain or show your reasoning. 65% of 80 82% of 50 170% of 30 Question 1 of 10Which of the following best describes the slope of the line below?O A. ZeroO B. PositiveO C. NegativeO D. Undefined Evaluate 9-5+(48/2)x5x7+6 Write y - 2 =- 1/3(x + 6) in standard form using integers. 12. John borrowed $80 from his sister, Joan. He agreed to pay her back at a rate of $6 perweek. Create a function, P, that gives the amount of money that john still owes Joan afterw weeks.12 (b) John told Joan that he will have paid her back all of the money, after makingpayments for 13 weeks.. Explain why John is incorrect? Most of the slaves came to British North America.True or falsePls help!! Some positive coping methods may give you time to clear your head.A. and ignore problems.B. and postpone problems.C. and see problems in perspective. Which of the following quotes best supports the idea of why people wear masks Find the angle of rotation about the center of the square that maps A to C. What are your thoughts about the media? Do they affect the way we see events today? Is television reporting as impactful as other media forums, Face/book, T/witter, and other social media communication apps? Consider what you already knew aboutthe mythological character, Icarus, beforereading this poem. How does this poemcause your perception of Icarus tochange? Explain. Help me out here pleaseeeeeeeeee What were Timbuktu, Gao, and Djenne?