✓ Details
C++
Write a program in which an array is initialized through user input Use these elements in an array named Temps: 98.6, 32.0, 87.1, 45.7 and -1.2.
Output the values in the array. The outputs should look like this: The elements in the array named Temps are (list the elements).

Answers

Answer 1
Here is a sample C++ program that initializes an array with user input and outputs the values in the array:

```
#include
using namespace std;

int main() {
const int SIZE = 5;
double Temps[SIZE];
cout << "Enter " << SIZE << " temperature values:" << endl;
for (int i = 0; i < SIZE; i++) {
cin >> Temps[i];
}
cout << "The elements in the array named Temps are: ";
for (int i = 0; i < SIZE; i++) {
cout << Temps[i] << " ";
}
cout << endl;
return 0;
}
```

This program declares an array named `Temps` with a size of 5 and initializes it with user input. It then outputs the values in the array using a `for` loop. The output is formatted to match the specifications in the prompt.

Related Questions

Please help with Com Sci work!

Answers

Copyright protection is not absolute. Various kinds of "fair use" are allowed by US and some other countries' copyright laws. The examples of fair use: D. 1 and 4 only

What is fair use?

In the United States, there is a legal concept known as fair use that permits the utilization of copyrighted material to some extent without obtaining authorization from the rights holders.

Examples of permitted applications come in forms like criticism, comment, news reporting and even educational or scholarly research. This concept adheres to discretion when it comes down to factors such as purpose and character of use, the type of content being used, the quantity/amount of the extracted portion, its significance relative to the overall composition, and how utilizing it may affect distribution marketing or value proposition. Implementation therefore happens on a case-by-case viewpoint.

Learn more about copyright on

https://brainly.com/question/357686

#SPJ1

Keycode- computer timeline

Does anyone know how to do this, I need help and
my teacher won’t help me

Answers

1937: John Atanasoff and Clifford Berry construct the very first electronic digital computer, the Atanasoff-Berry Computer (ABC).

How to explain the information

1951: Remington Rand releases the specially designed Universal Automatic Computer (UNIVAC) to the U.S. Census Bureau, becoming the initial commercially accessible computer.

1969: The first transmission over ARPANET - the predecessor of today's Internet - is sent from UCLA to the Stanford Research Institute.

1975: Micro Instrumentation and Telemetry Systems (MITS) launches the first personal computer in history, named the Altair 8800.

1991: Tim Berners-Lee conceptualizes the World Wide Web (WWW), which enables convenient access as well as sharing of data on the web.

Learn more about computer on

https://brainly.com/question/24540334

#SPJ1

What is your biggest fear when it comes to purchasing a used phone or laptop?

Answers

That I won’t like how it functions and continue to use my old one

PLEASE HELP IN JAVA

A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow. Word pairs consist of a name and a phone number (both strings), separated by a comma. That list is followed by a name, and your program should output the phone number associated with that name. Output "None" if name is not found. Assume that the list will always contain less than 20 word pairs.

Ex: If the input is:

3 Joe,123-5432 Linda,983-4123 Frank,867-5309 Frank

the output is:
867-5309

Your program must define and call the following method. The return value of getPhoneNumber() is the phone number associated with the specific contact name.
public static String getPhoneNumber(String[] nameArr, String[] phoneNumberArr, String contactName, int arraySize)

Hint: Use two arrays: One for the string names, and the other for the string phone numbers.

Answers

Answer: import java.util.Scanner;

public class ContactList {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       

       // Read the number of word pairs in the list

       int n = scnr.nextInt();

       scnr.nextLine(); // Consume the newline character

       

       // Read the word pairs and store them in two arrays

       String[] names = new String[n];

       String[] phoneNumbers = new String[n];

       for (int i = 0; i < n; i++) {

           String[] parts = scnr.nextLine().split(",");

           names[i] = parts[0];

           phoneNumbers[i] = parts[1];

       }

       

       // Read the name to look up

       String name = scnr.nextLine();

       

       // Call the getPhoneNumber method to look up the phone number

       String phoneNumber = getPhoneNumber(names, phoneNumbers, name, n);

       

       // Print the phone number, or "None" if the name is not found

       if (phoneNumber != null) {

           System.out.println(phoneNumber);

       } else {

           System.out.println("None");

       }

   }

   

   public static String getPhoneNumber(String[] nameArr, String[] phoneNumberArr, String contactName, int arraySize) {

       // Search for the name in the array and return the corresponding phone number

       for (int i = 0; i < arraySize; i++) {

           if (nameArr[i].equals(contactName)) {

               return phoneNumberArr[i];

           }

       }

       // If the name is not found, return null

       return null;

   }

}

Explanation: The program inputs the number of word sets, stores them in two clusters (names and phoneNumbers), and looks up a title by calling the getPhoneNumber strategy to return the comparing phone number. Prints phone number or "None" in the event that title not found. getPhoneNumber strategy takes nameArr, phoneNumberArr, contactName, and arraySize as contentions. The strategy looks for a title and returns the phone number in case found, something else invalid.

Which of the following is a serverless approach to executing modular pieces of code

Answers

Developers can create and run services using serverless architecture without having to worry about maintaining the underlying infrastructure.

Thus, While a cloud provider sets up servers to operate their apps, databases, and storage systems at any size, developers can write and distribute code.

Users can interface with applications and access their business logic through servers, but administering servers requires a significant amount of time and resources.

Teams must keep up with server hardware maintenance, software and security updates, and backup creation.

Thus, Developers can create and run services using serverless architecture without having to worry about maintaining the underlying infrastructure.

Learn more about Server, refer to the link:

https://brainly.com/question/7007432

#SPJ1

The learning center teaches 2 classes. Each class has its list of student names.

Some students are taking one class, some are taking both the classes. Write a function (getResult) with the list parameters (classOne and classTwo). The function will return the the list of students who are taking both classes. (PYTHON)

Answers

Sure, here's an example Python function that takes two lists of student names as arguments and returns a list of students who are taking both classes:

def getResult(classOne, classTwo):

   # use set intersection to find students who are in both classes

   studentsTakingBoth = list(set(classOne) & set(classTwo))

   return studentsTakingBoth

Here's an example usage of the function:

classOne = ['Alice', 'Bob', 'Charlie', 'David']

classTwo = ['Bob', 'David', 'Eve', 'Frank']

studentsTakingBoth = getResult(classOne, classTwo)

print(studentsTakingBoth) # should print ['Bob', 'David']

In this example, the getResult function takes two lists classOne and classTwo as arguments, and finds the intersection of the two sets of students using the set intersection operator &. The resulting list is then returned. Note that we first convert the set intersection result into a list before returning it, since the set data type does not preserve the order of elements.

Explain about concept of gradient decent

Answers

Gradient descent is a popular optimization algorithm used in machine learning and artificial intelligence. The main idea behind gradient descent is to iteratively adjust the parameters of a model in order to minimize a cost function.

The cost function is a measure of how well the model is performing on a given task. For example, in a linear regression model, the cost function might be the sum of the squared differences between the predicted values and the actual values. The goal of the optimization process is to find the set of parameters that minimizes this cost function.

Gradient descent works by computing the gradient of the cost function with respect to each parameter in the model. The gradient is a vector that points in the direction of the steepest increase in the cost function. By taking small steps in the opposite direction of the gradient, we can iteratively adjust the parameters of the model in order to minimize the cost function.

There are different variations of gradient descent, such as batch gradient descent, stochastic gradient descent, and mini-batch gradient descent. Each variation has its own advantages and disadvantages, depending on the size of the dataset and the complexity of the model.

Overall, gradient descent is a powerful optimization algorithm that has revolutionized the field of machine learning and artificial intelligence. By using gradient descent, we can train complex models that can perform a wide range of tasks, from image recognition to natural language processing.

In a game, a sword does 1 point of damage and an orc has 5 hit points. We want to introduce a dagger that does half the damage of a sword, but we don’t want weapons to do fractions of hit point damage. What change could we make to the system to achieve this goal?

Answers

One arrangement to get  the objective of presenting a dagger   that does half the harm of a sword without managing divisions of hit point harm would be to alter the hit focuses of the orcs.

What is the changes  about?

A person  might increase the hit focuses of orcs to 10. This way, the sword would still do 1 point of harm and the blade might do 0.5 focuses of harm, but we would still be managing with entire numbers for hit focuses.

One might present a adjusting framework where any further harm is adjusted up or down to the closest entirety number. In this case, the sword would still do 1 point of harm, but the dagger would circular down to focuses of harm.

Learn more about game from

https://brainly.com/question/908343

#SPJ1

I am trying to use the sed command with negate to print only the lines with the zip code starting with 9. I am having a hard time pinpointing these. An example of a line in this file:

Zippy Pinhead:834-823-8319:2356 Bizarro Ave., Farmount, IL 84357:1/1/67:89500

As you can see, the zip code is 84357 and is between the state initials and their birthdate. The command I have so far is

sed -n '/\b9[0-9]{5}\b/!p' filename

but it isn't working. Does anyone have any ideas how to pinpoint the zipcode and only get the ones starting with 9 using negate(!)? I am using a Bash shell on putty.

Answers

We can create a total of 5,040 unique zip codes using digits 0 through 9, where each digit can be used only once, and the zip code cannot start with 0.

A ZIP code (Zone Improvement Plan) is a postal code used in the United States to help efficiently and accurately deliver mail to a particular location. A ZIP code is made up of five numerical digits, and in some cases, a hyphen and an additional four digits.

The first digit of the ZIP code represents a region, and subsequent digits narrow down the specific area. ZIP codes were first introduced by the United States Postal Service (USPS) in 1963, and they help streamline mail delivery by ensuring that each address in the United States has a unique ZIP code.

Learn more about Zip on:

https://brainly.com/question/31431601

#SPJ1

This is in C#. In Chapter 11, you created the most recent version of the GreenvilleRevenue program, which prompts the user for contestant data for this year’s Greenville Idol competition. Now, save all the entered data to a Greenville.ser file that is closed when data entry is complete and then reopened and read in, allowing the user to view lists of contestants with requested talent types. The program should output the name of the contestant, the talent, and the fee.

Note: We have hidden .ser files, although you can still read and write to them.

Answers

I've used Visual studio and windows 10 for compiling and running below mentioned C# code.

How to explain the program

Above code will take input from user in the following steps:

1. Enter number of contestants.

2. Then for each contestant it will take, contestant name, then its Talent code and age.

3. After entering all the contestant details, you will see the revenue expected this year.

4. Then program prompts the user to enter Talent type. When user enters that, program will show the contestant details who have user mentioned Talent type.

Learn more about program on

https://brainly.com/question/26642771

#SPJ1

e A computer virus. the normal operation of a computer.​

Answers

Answer:

Computer Virus Overview

Roshan Mandal

A computer virus is a type of malicious software program that can infect and damage computer systems. It is designed to spread from one computer to another and can be transmitted through email attachments, downloads, or other means.

When a computer is infected with a virus, the normal operation of the computer can be disrupted. Depending on the type of virus, it may slow down the computer's performance, cause programs to crash, delete files, or even render the computer completely unusable.

To protect against viruses, it is important to use up-to-date antivirus software and to be cautious when opening email attachments or downloading files from the internet. It is also recommended to keep software and operating systems updated to ensure they are protected against known vulnerabilities.

Write a assembly code function (decode) to clean the data in a variable (one byte long) from '0'. The variable address is placed in ECX

Write a function (encode) to 'ADD' an ascii 0 to a variable. The variable address is placed in ECX

Answers

The assembly code function (decode) to clean the data in a variable (one byte long) from '0'. The variable address is placed in ECX is given below:

Here's the assembly code for the two functions for variable:

; Function to clean data in a byte variable from '0'

decode:

   push ebp            ; Save base pointer

   mov ebp, esp        ; Set up new base pointer

   mov al, [ecx]       ; Load byte from variable into AL register

   cmp al, 30h         ; Compare AL with '0' character

   jb end_decode       ; If AL is less than '0', jump to end

   cmp al, 3Ah         ; Compare AL with ':' character

   jae end_decode      ; If AL is greater than or equal to ':', jump to end

   sub al, 30h         ; Subtract '0' from AL to clean the data

   mov [ecx], al       ; Store cleaned data back into variable

end_decode:

   pop ebp             ; Restore base pointer

   ret                 ; Return from function

; Function to add an ascii 0 to a variable

encode:

   push ebp            ; Save base pointer

   mov ebp, esp        ; Set up new base pointer

   mov al, [ecx]       ; Load byte from variable into AL register

   add al, 30h         ; Add '0' to AL to encode the data

   mov [ecx], al       ; Store encoded data back into variable

   pop ebp             ; Restore base pointer

   ret                 ; Return from function

Thus, this is the assembly code for the given scenario.

For more details regarding assembly code, visit:

https://brainly.com/question/31590404

#SPJ1

Write statements to define a class that includes the following. The class will not necessarily be complete – you only have to write the member functions that I ask for. You do not need to write a main function. If any member function that you write calls another member function, you must write that function also.



- Define a class, Animal, with the following data members:

type
age
height
weight
- Write a constructor function for Class which will set the type to an empty string and the age, weight and height to zero.

- Write a member function (getExpectancy) for the class that returns the life expectancy for animal. The expectancy will be the sum of the four times the age, three times the height and two times the weight. (PYTHON)

Answers

Answer:

Explanation:

class Animal:

   def __init__(self):

       self.type = ''

       self.age = 0

       self.height = 0

       self.weight = 0

   

   def getExpectancy(self):

       return 4 * self.age + 3 * self.height + 2 * self.weight

What are not acceptable notes?

Answers

Answer:

err

Explanation:

Write notes in your own words instead of copying down information from the book. Avoid over-highlighting. Highlighting doesn't do much to actively engage the brain, so it's not the most useful strategy. Also, highlighting too much can keep you from focusing on the main ideas.

Part C Before the Internet and the World Wide Web made information easily accessible, how do you think people searched for information? Did they seek the help of experts in that field? Or did they read books to look for the information? How different are the sources of information today from the days prior to the Internet and the World Wide Web?

Answers

A system of information called the World Wide Web (WWW), also referred to as the Web, enables users to access documents and other web resources via the Internet.

Thus, Through web servers, which can be accessed by software like web browsers, documents and downloadable media are made available to the network. Uniform resource locators, or URLs, are character strings used on the World Wide Web to identify and locate servers and services.

A web page formatted in Hypertext Markup Language (HTML) is the original and still most popular type of document. This markup language enables ordinary text, graphics, embedded video and audio materials, and scripts (short programs) that carry out intricate user interaction.

The HTML language also permits embedded URLs, or hyperlinks, which give users direct access to other web sites.

Thus, A system of information called the World Wide Web (WWW), also referred to as the Web, enables users to access documents and other web resources via the Internet.

Learn more about World wide web, refer to the link:

https://brainly.com/question/20341337

#SPJ1

Answer please…………………

Answers

Due to the slower speed of hard drives compared to RAM, the CPU avoids direct access to programs and data stored on them.

What is the RAM about?

RAM's faster speed is attributed to its random accessibility design, enabling the CPU to rapidly access any portion. Also, hard drives necessitate the physical movement for data retrieval, leading to significantly longer wait times.

The initiation of the computer triggers the allocation of frequently accessed software and information into the RAM, thus enhancing its performance speed. The Central Processing Unit proceeds to retrieve the necessary programs and data from the Random Access Memory, since this process is considerably quicker than retrieving them from the hard drive.

Learn more about RAM  from

https://brainly.com/question/13196228

#SPJ1

See text



Task 1

1. Research on the Internet new computers from a manufacturer of your choice.

(a) What is the typical amount of RAM and hard drive size that they are including in their computers as standard?

(b) The amount of storage in hard drives is usually far higher than the amount of RAM on the computer.

Why doesn't the CPU access programs and other data from the hard drive directly?

How can you optimize the performance of a function written in assembly language, while ensuring that it still performs the intended functionality and produces correct outputs? What factors should you consider when making trade-offs between speed and correctness?

Answers

While optimizing the performance of an assembly language function, a range of techniques can be implemented such as minimizing data access, reducing instruction count and utilizing hardware features like caching and pipelining.

Why  is this so ?

It is vital to validate that these optimizations do not compromise the intended functionality of the program or lead to erroneous results.

To achieve this, comprehensive testing should be deployed on different inputs and conditions to guarantee that the optimized function behaves as anticipated.

As one makes trade-offs between speed and correctness, various factors must be considered like the complexity of code, criticality of function and how error impacts system operation.

Learn more about performance optimization:
https://brainly.com/question/14015474
#SPJ1

Which user interface part shows graphical output of mined data?
The
real estate part of the user interface shows graphical output of mined data.

Answers

Screen real estate is the  user interface part shows graphical output of mined data.

What is the  user interface?

Data visualization facilitates users to observe data from various angles. An essential concern regarding user interfaces is how to display a vast quantity of data on a limited screen space. The term "screen real estate" refers to the amount of space available on the display for presenting visual information.

Due to the limited display area, it is unfeasible for users to perceive information distinctly. The requisite data fluctuates among different users. The capacity of data mining ought to encompass generating insights on a diverse range of subjects.

Learn more about  user interface from

https://brainly.com/question/29541505

#SPJ1

Does an MVP need to have a polished GUI to be delivered? If not, what's the minimum elements that are needed? What elements might not be needed to be completely finished for an MVP? Explain your rationale.

Answers

Answer:

Whether you consider an MVP to be the part before or after the initial polish shouldn't really matter. For your example, I imagine having a "clean" UI would be a pretty important factor in whether it's functionally fun (as defined above), so you should definitely be polishing that a bit

Explanation:

Drag each tile to the correct location.
Distinguish between the features of low-level and high-level languages.
assembly language
Java
machine language
High-Level Language
Python
Low-Level Language

Answers

Answer

Low-Level Language:
- Assembly language
- Machine language

High-Level Language:
- Java
- Python

TWO (2) negative effects of how technology use in education affects students' learning. Your response should include a minimum of FIVE (5) credible sources.​

Answers

Technological advancements have taken education to new heights, yet they have come with their fair share of drawbacks.

What is the explanation for the above response?

Two such demerits of utilising technology in classrooms are distraction and lack of retention capacity among students.

Given the myriad choices provided by tech in terms of entertainment such as social networking sites or online games, students tend to lose focus and face negative consequences such as poor academic performance.

Technology dependency poses a vulnerability that can hinder student learning outcomes.

Students whose reliance rests solely on technology may face challenges related to critical thinking and problem-solving abilities - two necessary skills for achieving academic success.

Learn more about technology  at:

https://brainly.com/question/28288301

#SPJ1

Install and set up a programming environment to make it easier to write/test JavaScript​

Answers

The way for a person to set up a programming environment are

Install a text editorInstall Node.jsInstall a package managerCreate a new projectInstall dependenciesWrite and test your code

What is the programming  about?

in terms of Get a text editor: A software that enables code writing is known as a text editor. Numerous selections exist including Sublime Text, Visual Studio Code, Atom, and others. Select your preferred option and proceed with its installation.

Node.js installation involves setting up a JavaScript runtime utilizing Chrome's V8 JavaScript engine. The capacity to execute JavaScript on the server-end is granted.

Learn more about programming  from

https://brainly.com/question/23275071

#SPJ1

Which tasks can a user accomplish by using the Find and Replace feature of Word? CORRECTLY Check all that apply.

changing the size of the page
changing the case of a word
changing the spelling of a word
changing the margins of the page
changing a word to another word

Answers

The tasks that a user accomplish by using the Find and Replace feature of Word is A: changing the case of a word

What is the Replace feature?

Users have the ability to utilize Word's Find and Replace function, which enables them to identify particular text in a document and swap it with alternative text.

Despite its functionality, this attribute does not provide users with the ability to manipulate the dimensions, boundaries, or formatting of the entire document, as these aspects are generally predetermined by the document's page layout configuration.

Learn more about Replace feature from

https://brainly.com/question/12245516

#SPJ1

The agencies involved and its security operation taken during the issue of MH 370​

Answers

Conducted as a result of MH370 vanishing during March 2014, one of history's most momentous missing Flight search and rescue maneuvers was initiated.

What is the explanation for the above response?

Various international agencies and military teams became involved and concentrated their searches firstly within South China Sea and Gulf of Thailand limits; following discovery by satellites that airplanes deviated from its existing trajectory it expanded to across Indian Oceans ranges as well.

Multinational team arrived equipped with various materials inclusive aircrafts, ships along with submerged underwater apparatuses.

However despite all assiduous efforts being employed by said unit no debris surfaced for many years subsequently eventually benefiting from private-sectored funding pursuit rendering upward discovery enabling locating MH370 submerged jetliner remains.

Learn more about Fight history at:

https://brainly.com/question/12310094

#SPJ1

What is your biggest concern when it comes to purchasing a used phone or laptop?

Answers

Answer:

quality

Explanation:

if i know about the phone or laptop quality and quantity then i can know which is important if i buy.

i can give you example by laptop. For example i want to get buy laptop. i should know about the quantity and quality. then if i choose quantity i can buy so many laptops if they are more than 3 laptops and i get it in low price. then i take it and i try to open the laptops for some other thing to do but they cant opened so it means it has lowest quality.

and if i choose the quality. may be i can't buy more than 1 laptops but the qulaity of the laptops is high so when i open the laptop it opened

Note

quality is the superiority or the quality level of a things.

quantity is the abundance or the quantity level of a thing

c. Explain how computer memory is measured a. Using a table, categorize bardware devices into input, output and storage devices b. State four similarities and four differences between first and second generation of computers e Describe the fourth and fifth generation of conten​

Answers

Answer:

a. Computer memory is measured in bytes - a unit of digital information storage. Usually, computer memory is referred to as Random Access Memory (RAM), and its size is usually measured in gigabytes (GB). b. Input devices are used to input data into the computer system, for example, keyboard, mouse, scanner, and microphone. Output devices display and present data to the user, for example, monitor, printer, and speakers. Storage devices are used for storing data, for example, hard disk drive, solid-state drive, and USB drive. First-generation computers were large, bulky, and expensive, using vacuum tubes as their main components to process data. They were not user-friendly and lacked programming languages. Second-generation computers were faster, smaller, and cheaper than their predecessors. They used transistors in place of vacuum tubes, which reduced power consumption and generated less heat. They also used programming languages like COBOL and FORTRAN.

c. Fourth-generation computers were smaller in size and used microprocessors for processing data. They were characterized by faster speed, increased storage capacity, and cost-effectiveness. Fourth-generation computers could also support multitasking and multi-user operations. Fifth-generation computers are currently being developed, aiming at creating machine intelligence based on natural language processing, AI algorithms, and advanced parallel processing. They are expected to be able to learn from experience and understand and interpret human speech and natural language.

Overall, the evolution of computers has led to an exponential increase in both computing power and accessibility to users, as well as the use of more efficient and compact hardware devices.

Explanation:

Answer:

The civilizations of the Maya, Aztec, and Inca that once flourished in Central and South America shared common elements. People practiced farming, developed social structures, raised armies, and worshipped many gods. The three civilizations were as diverse as the terrains in which they lived

Online _ are the way in which people define themselves on social media sites and other Internet-based venues.

Answers

Online identity are the way in which people define themselves on social media sites and other Internet-based venues.

What is online identity?

This refers to how a person choosing to define themselves on the internet via varous social media.

This may or may not be different from their real persona. In some cases, people's online identify become their real identity and note the other way round.

Thus, it is correct to state that online identity are the way in which people define themselves on social media sites and other Internet-based venues.

Learn more about online identity:
https://brainly.com/question/13692041
#SPJ1

Identify the task/s performed by an operating system.

allocating memory to various files

specifying user access rights for security

receiving input from input devices

Convert high level programs into machine language.

Answers

The the task/s performed by an operating system are:

allocating memory to various files (Option A)
specifying user access rights for security (OPton B)receiving input from input devices (Option C)Convert high level programs into machine language. (option D)

What is the explanation for the above response?

An operating system carries out various intricate and complex tasks to efficiently manage both the hardware and software components of a computer.

These include allocating memory space to files, regulating user actions, receiving input from external devices such as mice and keyboards, and transforming programs into a language that is machine-readable.

Learn more about operating system at:

https://brainly.com/question/31551584

#SPJ1

Please Help! Which of the following is a common file extension of program install packages? Question 6 options: .exe .pptx .xlsx .docx

Answers

Answer: A. .exe

Explanation:

The extension ".exe" is widely recognized as a file extension utilized for installation packages of programs on Windows-based computers. An executable file possessing the extension ".exe" is employed to effectuate the installation or execution of software on a computer system. File extensions such as ".pptx", ".xlsx", and ".docx" are commonly linked to file formats used in Microsoft Office documents.

Objective: At the end of the activity, the students should be able to:  Create a program that handles exception and allows writing to and reading from a text file. Software Requirements:  Latest version of NetBeans IDE  Java Development Kit (JDK) 8 Procedure: 1. Create a folder named LastName_FirstName (ex. Reyes_Mark) in your local drive. 2. Create a new project named TaskPerf6. Set the project location to your own folder. 3. Write a program that will: a. Ask the user to select between two (2) options: • Register: User shall input his desired username and password. These shall be saved in a text file named records.txt. Only alphanumeric characters are allowed. • Login: User is asked to input a username and password. Validate using the text file created from the Register option. If both the username and password are correct, display the message “Successfully logged in”, else, display “Incorrect username or password”.

Answers

A good example Java program that handles exceptions and allows writing to and reading from a text file using NetBeans IDE and JDK 8 is given in the image attached.

What is the program about?

The JDK comprises a set of tools, which include the compiler and JVM that interprets byte code, alongside Javadoc. Possible paraphrase: Some examples of software tools that can be used for programming or writing code are basic text editors like Notepad++ or Sublime Text.

The program provides the user with a choice of two functionalities: creating a fresh username and password or accessing the system with an already established username and password. "Upon registration, the user's login credentials are saved in a text document named 'records.txt'.

Learn more about program from

https://brainly.com/question/1538272

#SPJ1

Other Questions
One of the major problems in using solar energy has been ___ A genetic disorder caused by an increased viscosity of secretions from the pancreas, salivary glands, liver, intestine, and lungs is ______. I need help with these Which medication comes in an intramuscular solution? Bumetanide Chlorthalidone Spironolactone Torsemide A client is being discharged with a prescription for warfarin. Which information is critical to be included in the nurse's discharge teaching?Take Tylenol for minor painsUse a soft toothbrushDon't increase your intake of green leafy vegetablesReport any nose or gum bleeds Which best describes xanthoma plaques or nodules? The portion of the central nervous system that originates in the brain and extends down the lower trunk is the:A) spinal cordB) blood vesselsC) cranial nerveD) tibial nerve economic independence reading for accuracy use your textbook to decide if a statement is true or false. write t or f in the blank. if a statement is false, rewrite the underlined portion to make it true.1. low taxes helped encourage small investors to provide money for new businesses. 2. corporations are generally owned by a single, wealthy person. 3. many new cities were established on rivers, and older cities lost population. 4. cities such as cincinnati grew because more farmers were shipping their products by water. 5. new cities used modern sewage systems that helped control diseases. 6. few cities and towns had organized fire companies, so fire was a constant threat. 7. new cities offered libraries, museums, and shops for people to enjoy in their leisure time. netw rks Rewrite the sentences using correct punctuation and capitalization.1. when we were reading the book gone with the wind my teacher said this is an advanced book but you can read it without any problem2. there are three things we need to buy at the grocery store shampoo soap and toothpaste3. my friend said first we have to stop in atlanta georgia to buy a copy of the newspaper the atlanta daily4. i just heard the song everything is awesome from the lego movie5. susan can you please pass me the pepper asked Robert6. tonight we have read three chapters the lady in red the man in yellow and the boy in blue7. kecin lilian and thomas are on their way to ohio8. yes you are allowed to watch the television show family guy with mom dad and grandma9. the biggest problem he said is that the tire has a hole in it10. Sandra told her sister you can use my umbrella if you want what is it called when a major disturbance caused by a stressful event disrupts the homeostasis/equilibrium of someone's life? How many times can u write your name in 12 minutes using variables Based on your recorded values, write an equation that represents the relationship between the time you spent doing the activity and the amount of the activity you completed. Make sure to define your variables :D Why does Winston decide not to go out into the open? Select one: a. He is not ready to end his romantic date. b. He does not want to be discovered by other people. c. He wouldnt be able to see the dace swimming. d. He is looking for the Golden Country. On average, the products with the "Natural" label were judged to have significantly fewer calories. Based on this study, is it reasonable to conclude that including the word "Natural" on the label causes a reduction in estimated calories? QUESTION 8: The role of acetylcholinesterase in the neuromuscular junction is to __________.a. increase the sodium permeability of the motor end plateb. remove acetylcholine from the synaptic cleftc. generate a muscle action potentiald. release acetylcholine from the synaptic terminal accounting diversity can create a problem for companies that wish to have stock listed on a stock exchange in a foreign country because the foreign stock exchange might require the company to use A sample of gas occupies 50.0L at 15.0 Cand 640.0 mmHg pressure. What is the volume at STP? which of the following statements about the hardy-weinberg principle are true? select all that apply. responses it is used to model gene flow. it is used to model gene flow. it assumes certain forces are not acting on a population. it assumes certain forces are not acting on a population. it assumes certain forces are acting on a population. it assumes certain forces are acting on a population. it is used to model genetic equilibrium. What was one of the ways that Franz Boas brought about the end of the evolutionism period in early anthropology? what is the volume of a hemisphere with a diameter of 8ft (rounded to the nearest tenth of a cubic foot) Which equation represents the length of the completed tunnel based on the number of days since TBM was introduced?