Write a program in Java programming language to display or calculate “Hello, Daddy and Mum”

Answers

Answer 1

Answer:

class Simple{

public static void main(String args[]){

System.out.println("Hello Daddy and Mum);

}

}

Explanation:

First, we create a class, then a method and then give the Integrated Data Environment (IDE) the command to give out an output that says Hello, Daddy and Mum”

Answer 2

Answer:

public class Program

{

public static void main(String[] args) {

System.out.println("Hello, Daddy and Mum");

}

}

Explanation:

Java is a high level, modern programming language designed in the early 1990s by Sun Microsystems.

The above one is simple program that displays “Hello, Daddy and Mum” on the screen.

In Java, every application begins with a class definition. Here we have named class Program.

The main() method is the entry of the program. A valid Java program must have main() method.

The code prints the text “Hello, Daddy and Mum” using System.out.println() function.


Related Questions

What is the first thing Charlotte needs to do after she opens an Excel spreadsheet?

A. Select another program
B. Select a different template
C. Select new blank program
D. Select new blank workbook

Answers

Answer: C

I hope this helps

A(n) ____ is a location on your computer screen where you type text entries to communicate with the computer’s operating system.

Answers

Answer: Command Line Interface

This is also known as a command prompt.

On many systems, this program has a black background and white text font. You can type in commands such as "cd" which means "change directory", or you could type in "mkdir" to make a directory. The commands I'm listing in the examples apply to windows systems but they may also apply to linux and other systems as well.

TRUE or FALSE.
2.1 Information is a collective term used for words, numbers, facts,

Answers

Answer:

true

Explanation:

Because it is the very best way

What does it mean to declare a function versus call a function?​

Answers

Declaring is creating the function. This means that it is initiated but not running. when you run it that means it is activated and taking affect

By using perception strategies you have learned, objectively evaluate the following scenario,
You are 16, you have your driver's license, and you want to take some friends to a movie. You
ask your father if you can borrow the car, but he refuses and puts his keys in his pocket. He let
you use the car several days ago.
List the facts: Interpretation #1: Interpretation #2: Request for clarification combined with behavior and interpretations:

Answers

Answer:

book of English

page 91 answer in 2 part

Explanation:

ok bro pls follow me

Answer:

Interpretation #1: My dad wanted to annoy me and didn't want me to have fun.

Clarification: #1: Dad why did you refuse to let me borrow your keys, did I do something wrong? Or did you just want to annoy me.

Interpretation #2: He is worried that something dangerous might happen without any adults in the car and didn't want to rist anyone getting hurt.

Clarification #2 : Dad, do you think we are not going to drive safely? Would you prefer someone older accompanies us?

Explanation:

A manufacturer that uses the intermittent process to produce special customer orders is called a: modular shop central shop job shop localized processor centralized processor

Answers

A manufacturer that uses the intermittent process to produce special customer orders is called job shop.

What is job shop?

A job shop is known too be a  type of manufacturing process. It is said to be one where little batches of different kinds of custom products are made.

Note that In the job shop process flow, a lot of the products made needs a specific set-up and sequencing of process methods. Therefore, A manufacturer that uses the intermittent process to produce special customer orders is called job shop.

Learn more about  job shop from

https://brainly.com/question/24516871

Chip stays up late every night surfing the Web, but tells himself that he hardly ever does this.

Which computer addiction symptom is Chip experiencing?


Lack of control


Downplaying


Neglect


Uncomfortable feelings

Answers

Answer:

2

Explanation:

hes downplaying the fact the he stays up every single night by saying he hardly ever does it

Chip is experiencing the computer addiction symptom of "Downplaying."

How can this be explained?

Despite staying up late every night surfing the Web, he tells himself that he hardly ever does this. This behavior involves minimizing the extent of his computer usage, which is a common characteristic of downplaying in cases of addiction.

It's important to recognize such signs to address and manage potential addiction issues.

Read more about computer addiction here:

https://brainly.com/question/28724010

#SPJ2

functions
of beaker​

Answers

Answer:

Beaker Purpose

Although the purpose of a beaker is to contain and measure liquids, the glassware can come in a multitude of shapes and sizes. Most often, a beaker is cylindrical in shape and has a flat bottom. Some beakers have a small beak or spout to aid in the pouring of liquids.

Here hope that helps know mark me as brill

PLEASE HURRY!!!!

What can you change, if anything, in this line so that there will not be a space between the dollar sign and the amount of money due?

print("You owe $", moneyDue)

A) You do not need to change anything. There is no space.
B) print("You owe $" , str(moneyDue))
C) print("You owe $" + str(moneyDue))
D) The space cannot be removed.

Answers

Answer:

print("You owe $", moneyDue, sep="")

Explanation:

By default, Python3 will put a space between two strings like this. If you specify that the separator is an empty string (sep="") then it will not separate the two strings and the space will go away.

Answer:

print("You owe$" + str(moneyDue))

Explanation:

It's the one with the plus sign. Correct on EDG 2021 :D

A(n) _____ is the conceptual organization of an entire database as viewed by a database administrator.

Answers

Answer: Schema

Explanation:

i did cs

Which range function will generate a list of all odd numbers between 17 and 47 inclusive?

A
range (18 , 48 , 2)

B
range (17 , 47 , 3)

C
range (17 , 48 , 2)

D
range (18 , 47 , 3)

Answers

Answer:

The answer is "range (12, 86, 2)"

Explanation:

Answer:

B is definitely the answer

Which of the following is used to store data in the computer's memory that can be
used by a program later when executing instructions? Hint: They are link storage
containers
Variables
Operators
Expressions
Boolean

Answers

The  storage that is used to store data in the computer's memory that can be used by a program later when executing instructions is variables.

What is variables?

Variables can be defined as the way or process in which data or information are store in a computer memory.

Data or information that may likely change or be altered are often stores in a computer memory storage called variables and this store data can be retrieve later for use by a program when executing instruction on the computer  system.

Inconclusion the  storage that is used to store data in the computer's memory that can be used by a program later when executing instructions is variables.

Learn more about variables here:https://brainly.com/question/23931018

PLEASE HURRY!!!

After the following code is executed, what value is stored in weight?

>>> answer = input("What do you weigh? ")
What do you weigh? 105.7
>>> weight = float(answer)
>>> weight = weight + 3
The value stored in weight is .

Answers

Answer:

108.7

Explanation:

When someone enters an answer, it's stored in the variable "answer" as a string. Then "weight" is set to the value of the string, converted to a floating-point number (meaning that it has a decimal value, instead of being an integer). At that point weight = 105.7, so when you add 3 to it you get 108.7.

Given a Student class, create a class with following characteristics:

The class name should be ClassRoom. Private variable students array to maintain the list of Student objects.
Function addStudent with input parameter name (string) and rollNo(int) adds a new student in "students" list.

Method getAllStudents should return all the students in ClassRoom.

Input
Jack

1
Jones
2
Marry
3
where,

First & Second line represent a student’s name and roll number. And so on.

Output

1 - Jack
2 - Jones
3 - Marry

Answers

Answer:

ssume that,

Maximum “students” count can be 10.

*Driver Class*

*Solution class*

import java.util.*;

class Student {

private String name;

private int rollNo;

public String getName() {}

public void setName(String name) {}

public int getRollNo() {}

public void setRollNo(int rollNo) {}

};

class ClassRoom {

private int i;

private Student[] students;

public void addStudent(String name, int rollNo) {}

public Student[] getAllStudents() {}

};

Wirte a program which asks the users to input length and calculates the area of a square.( Area = Length^2)​

Answers

Explanation:

i hope this will help you


Computer industries and organizations also face issues related to health, safety, and environmental issues. In this task, you will examine these
sues related to an industry organization that deals with technology, specifically computers. Write a short essay on these issues.

Answers

Over the past twenty years a great many questions have arisen concerning the links that may exist between the use of computers and the health and safety of those who use them. Some health effects -- such as joint pain and eye strain following an extended period huddled typing at a screen and keyboard -- are recognised as an actuality by many. However, proving with any degree of certainly the longer-term health impacts of computer use remains problematic. Not least this is because widespread computer use is still a relatively modern phenomenon, with the boundaries between computers and other electronic devices also continuing to blur.

Ethernet and wireless networks have some similarities and some differences. One property of Ethernet is that only one frame at a time can be transmitted on an Ethernet. Does 802.11 share this property with Ethernet? Discuss your answer.

Answers

802.11 do not share this property with Ethernet this is because Wireless networks is known to have a kind of potential parallelism, and as thus, it differ from Ethernet.

What is a Wireless networks?

Wireless networks are known to be a kind of computer networks that are said to not need to be connected by form of cables.

The use of a wireless network is one that helps firms to avoid the costly prices of using cables in their buildings or as a form of connection between their various equipment locations.

Learn more about Ethernet from

https://brainly.com/question/1637942

Write a loop that inputs words until the user enters stop. After each input, the program should number each entry and print I. This format:
#1: You entered _____
When stop is entered, the total number of words entered should be printed in this format:
All done ___ words entered.

Answers

Answer:

Written in Python:

userinp = input("Input: ")

count = 0

while not userinp == "stop":

print("You entered "+str(userinp))

count = count + 1

userinp = input("Input: ")

print("All done, "+str(count)+" words entered")

Explanation:

I've added the full program as an attachment where I use comments to explain difficult lines

Answer:

word = input("Please enter the next word: ")

count = 0

while word != "DONE":

      count += 1

      print("#{}: You entered the word {}".format(count, word))

      word = input("Please enter the next word: ")

print("A total of " + str(count) + " words were entered.")

Explanation:

Assuming this is python, this should help!

Part 1:

In a group, with a friend, or with family members, identify a problem in your community. Describe the problem and work through the steps of problem solving to come to one potential solution. If you can, implement the solution and evaluate the results. If you cannot, propose what may happen if you implemented the solution. Make sure to include all of the steps.

Part 2:

Ask five people for an example of a conflict they have experienced. Look over the approaches to conflict resolution that are listed in the lesson. For each situation, select the approach that you feel would work best. Describe why you selected the approach.

Describe your results for both parts of the project in an essay of at least 300 words.

Long Text (essay)
Submit your 300- word essay that: 1) identifies a problem in your community and works through problem solving steps to provide a solution, and 2) analyzes five conflicts through the conflict resolution approaches and explains an appropriate resolution for each conflict.

Answers

The  problem in my community is lack of pipe borne water.

What are the issues of water supply?

Africa is known to be a content that has some poverish nation. My community is known to lack good water and that is a key issue i would love to address.

What i can do is to write to the government and other private organizations for help or i will take the project upon myself to construct bore holes for the community. A lot of people do not have access to water during the dry season and this will solve the problem.

What are the steps to write an essay?

An essay can be written by following the steps below:

First know the type of Essay you want to write.You introduce the Topic of the essay.State the problem or reasons for writing. Write the body of the writeup.End with a Conclusion.

Note that a good essay is one that that communicate the right message to anyone reading it.

Learn more about water from

https://brainly.com/question/5060579

help me please you don't have to answer all , only 1 is okay. thank you so much​

Answers

Answer:

15 maybe an advertisement?

Explanation:

Ann would like to find all the data that has the least errors. What should Ann do?

*use clustering datamining
*use regression datamining
*conduct a query
*filter the data

Answers

Answer:

use fliter the data

Explanation:

brainly patrol don't take this down, there isn't really an explanation type of question.

_______________________ is a useful CI tool that allows users to simultaneously compare the web traffic of multiple domain names over time. The tool provides graphs showing the number of unique visitors over time, monthly metrics for each domain name (such as number of referring sites), and top search terms for each of the domain names entered.

Answers

Compete. com  is a useful CI tool that allows users to simultaneously compare the web traffic of multiple domain names over time.

What is Web traffic?

The term Website traffic connote when a web users is said to  visit a website. Web traffic is said to be calculated by the times in visits, known as "sessions," .

Note that the tool or computer index Compete.com  is said to be a useful CI tool that allows users to simultaneously compare the web traffic of multiple domain names over time.

The options are:

Compete.com

Goo gle Trends

Hoot Suite

You Tube Analytics

Learn more about tools from

https://brainly.com/question/24625436

Consider the following relations containing information about authors, articles and which author authored which papers (a paper can have several co-authors):

Author(authorID, name)
Authoring(articleID, authorID)
Article(articleID, title, venue, year, month)

Express the following queries in Algebra

a. List the articles authored by John Smith
b. List the co-authors of John Smith (authors who co-authored an article with John Smith)
c. List all the articles published last year
d. List pairs of articles that have the same titles with different article IDs
e. List the authors with no article in the database
f. List the authors who have all their papers co-authored with John Smith
g. List the papers authored by only one author (without aggregate functions)
h. Which author co-authored at least 1 paper with every author (without aggregate functions)
i. List the authors who have all their papers co-authored only with John Smith (No other co-author)

Answers

Answer:

The description of the given point can be defined as follows:

Explanation:

In option a:

List the articles authored by John Smith

[tex]\pi[/tex]Article.title ([tex]\delta[/tex](Author.authorID=Authoring.authorID)^ (Article.articleID=Authoring.articleID)^ (Author.name=’John Smith’) (Article [tex]\times[/tex] Authoring [tex]\times[/tex] Author))

In option b:

Listed all John Smith but also Marc Antoine's articles  

[tex]\pi[/tex] Article.title ([tex]\delta[/tex](Author.authorID=Authoring.authorID)^ (Article.articleID=Authoring.articleID)^

(AUTOR.NAME='JohnSmith 'or "John Smith'Marc Antoine" )

(article [tex]\times[/tex] Authoring  [tex]\times[/tex] Author)

In option c:

Review the John Smith co-authors (authors co-authors with John Smith)  

ID (Author.authorID = Authoring.authorId)^(Article.articleID =Authoring.articleID)^(Article.articleID = Authoring.articleID)^  

(Author.name='John Smith') (Paragraph x Author)  

[tex]\pi[/tex]  Article.title ([tex]\delta[/tex](article.item ID = Addresse.itemID)^(Authoring.art.item = art)  

(Paragraph [tex]\times[/tex] Authoring)

In option d:

List all of that year's papers  

[tex]\delta[/tex] (Article.year=2019)  

In option e:

List the authors without a database post  

authorInDatabase = [tex]\pi[/tex] Authoring.authorID (δ(Author.authorID=Authoring.articleID) )

(Author [tex]\times[/tex] Authoring)

authorTotal =  Author.authorID (δ (Author.authorID=Authoring.articleID)

(Author [tex]\times[/tex] Authoring)

AuthorsWithNotWithArticles = authorTotal - AuthorInDatabase

In option f:

Listed of writers that have co-authored both published publications to John Smith  

Authors = [tex]\pi[/tex]  Book.authorID ([tex]\delta[/tex] Author.authorID)^(Article.articleID = Authoring.articleID)^ Authoring.articleID)^ Book Authors  

(Paragraph [tex]\times[/tex] Authoring) (Author.name='John Smith')  

[tex]\pi[/tex] Author.name ([tex]\delta[/tex] (Art.articleID = Author.articleID)^(Authoring.authorID = Authoring. Authoring. AuthorID)  

(Physician[tex]\times[/tex] Authoring)

Before responding to an e-mail from another student in an online course, a student should

Answers

address the student in a polite manner.
-make sure he knows the person
-read the email throughly
-respond in a good manner

Not sure if that can help, but I hope it does! Good luck !


Why should you act as an involver?

Answers

Answer:

To involve people in major and minor situations that is best for the community to be involved in.

Why is it now difficult for computer technology to maintain the pace to development describing by Moore’s Law?

Answers

i think it might be A?

[ASAP] Choose the term to complete the sentence.

A _____ is a drawing made up of lines without any surface color or shading.

1. Raster
2. Vector
3. Rendering
4. Wireframe

Answers

A vector is a drawing made up of lines without any surface color or shading. The correct option is 2.

What is vector drawing?

Digital shapes called vectors are formed of lines and curves and are used to build images using mathematical equations. These curves and lines, which are also known as pathways, enable designers to scale pictures that are as simple as shapes or as intricate as full-blown illustrations.

Focus is placed on using only straight lines and contours, without any shading in line drawings. In the majority of line drawings, the artist draws the entire picture without ever taking their tool off the paper.

Therefore, the correct option is 2. Vector.

To learn more about vector drawing, refer to the link:

https://brainly.com/question/3930341

#SPJ1

Answer:

D. Wireframe

Explanation:

You use encryption, user accounts, and access control lists (ACLs). However, you find that there is no plan to replace database server hardware if it fails. You find that ordering a replacement server would take at least 24 hours to arrive, and an additional 6 hours to prepare for use. Which part of the C-I-A security triad has failed?

Answers

Based on the scenario, the part of the C-I-A security triad that has failed is maintaining availability.

What is the C-I-A security triad?

The C-I-A security triad refers to an abbreviation for confidentiality, integrity and availability. It can be defined as a cybersecurity model that is designed and developed to guide security policies for information security in an organization, so as to effectively and efficiently protect and make their data available to authorized end users.

In this scenario, the part of the C-I-A security triad that has failed is maintaining availability because the database server hardware cannot be replaced immediately if it fails.

Read more on data here: brainly.com/question/25558534

For question 2 you will need to write your own Python code. Think through the problem, and re-read if necessary. Determine how you might solve the problem logically. Think of what variables you might need to store temporary values. Your friend was bragging about how many stairs he climbed each day because of his apartment location on the fifth floor. Calculate how many times your friend would have to go down then back up the stairs to reach his fifth floor apartment to reach 100, 500, 1000 and 5000 steps. The apartments all have vaulted ceilings, so use 16 steps per floor in your calculations. Remember to count down and back up as one trip. You will also reuse the variable that contains the target number of steps. Round up. HINT: take a look at previous question, and the use of import math and math.ceil(). Recommended variable names you will need for this question: steps_per_floor, floor, target_steps, trips >>>: Write a program that calculates the total number of trips given 100, 500, 1000 or 5000 daily steps, 16 steps per floor, and down and back up the stairs represents one trip. Re-use the target_steps variable. Round the number of trips up to the nearest whole integer. >>>: Display the number of trips for each of the four step counts, using the following example, illustrating the output for 100 steps. Add the other three results below the 100 steps result.

Answers

Answer:

It has to be performed a minimum of  1  trips to do   100 steps

It has to be performed a minimum of  4  trips to do   500 steps

It has to be performed a minimum of  7  trips to do   1000 steps

It has to be performed a minimum of  32  trips to do   5000 steps

All trips need to be  44

Explanation:

open python console and execute the .py code bellow:

import math

floor_steps=16

floor=5

total=0

target_steps=2*floor_steps*floor

trips=100/(target_steps)

trips= math.ceil(trips)

total+=trips

print("It has to be performed a minimum of ",trips," trips to do   100 steps")

trips=500/(target_steps)

trips= math.ceil(trips)

total+=trips

print("It has to be performed a minimum of ",trips," trips to do   500 steps")

trips=1000/(target_steps)

trips= math.ceil(trips)

total+=trips

print("It has to be performed a minimum of ",trips," trips to do   1000 steps")

trips=5000/(target_steps)

trips= math.ceil(trips)

total+=trips

print("It has to be performed a minimum of ",trips," trips to do   5000 steps")

print("All trips need to be ",total)

Create a Python script that enables a user to enter an integer number into the Python console and stores such integer number into a variable named input1. Use an if statement to print the following output per the following conditions:If integer is a negative number, print in console "Input1 integer is negative"If integer is zero, print in console "Input 1 integer is zero"If integer is a positive number less or equal than 30, print in console "Input 1 is positive but less or equal than 30.If integer is a positive number greater than 30, print in console "Input1 is positive and greater than 30"

Answers

Answer:

Here is the Python program:

input1 = int(input("Enter an integer: ")) #prompts user to enter an integer

if(input1<0): #if input value is negative

    print("Input1 integer is negative")

elif(input1==0): #if input value is 0

    print("Input 1 integer is zero")

elif(input1<=30): #if input value is less than or equal to 30

    print("Input 1 is positive but less or equal than 30")

else: #if input value is greater than 30

    print("Input 1 is positive and greater than 30")    

Explanation:

I will explain the program with an example

Lets say user enters 16 as input So

input1 = 60

Now the first if condition if(input1<0): is false because 60 is not less than 0

The second elif (else if) condition elif(input1==0): also evaluates to false because 60 is not equals to 0

The third elif condition elif(input1<=30): evaluates to false because the input value is 60 which is not less than or equal to 30.

The fourth else part executes because all the above if elif conditions evaluate to false which means the input number if neither negative, nor 0 and not less than or equal to 30. Hence the input number is greater than 30 and this is true as 60 is greater than 60. So the print statement executes which is:

    print("Input 1 is positive and greater than 30")

The message in the above print statement is printed on the output screen.

The screenshot of the program along with its output is attached.

Other Questions
100 POINTS AND BRAINLIEST!!Which of the following best describes a function? Select all that apply.the graphed line overlaps itselfevery input has exactly one outputthe graph of the relation passes the vertical line testthe graph of the relation is a straight line PLEASE HELP I SWEAR I WILL GIVE BRAINLIEST PLEASEE:(:( pic included What is the least populated country in south america. Answer the problem 1010+3839 Austin bought three boxescontaining chocolates, eachat $4.61 and four boxes withpastries, each at $3.20.How much in total did hehave to pay? Which two line segments represent the legs? What is the 50 30 20 budget rule? Is that a good plan for a monthly budget? Which is a major idea of nationalism? A. The people of a nation should have a shared culture and ethnicity.B. The market system will not create a great nation. C. Social services should not be provided by the government. D. Democracy is the only way to form a new nation. help me match the cards because there is a lot ill add more points please and thank you I need help heres the question:he price of a normal meal is $6.75. On tuesday, the meal is on sale for for $1.00 off for the regular price. Sarah brought 4 of thease meals on Tuesday. What is the total cost of these 4 meals before the tax?. Please help!! Select a box to identify whether each equation has no solution, one solution, or infinitely many solutions.No SolutionOne SolutionInfinitely Many Solutions- 2x + 3 = - 3x + 2- 2x + 3= - 2x + 3OO- 2x + 3 = 2x + 3 1. Describe the North strategy to win the war?2. Explain how the concept of total war impact the state of South Carolina? The side accross the right angle is called thehypotenuseleg Aleg B Identity and explain type of aerial photography Find the equation of the line which passes through (-2,1) and which is perpendicularto the line 2x - 4y = -8. State the answer in slope-intercept form and graph.- Jasper had a sports card album that held 100 cards. He filled 42/100 with football cards and 3/10 with baseball cards. What fraction of the album is still empty?A. 28/100B. 45/100C. 55/100D. 72/100 How do you write 6.73 in scientific notation? "a number increased by thirty-five" Answer ASAP for 5 stars and for chance of brainliest! This question is from the Book A Long Way Gone.At what time period in Beah's life is chapter 2 occurring, and how is the book structured in the way it's written? Find the measure of angle A.9)A3x + 6754x+6