EBK JAVA PROGRAMMING
EBK JAVA PROGRAMMING
8th Edition
ISBN: 9781305480537
Author: FARRELL
Publisher: CENGAGE LEARNING - CONSIGNMENT
bartleby

Videos

Expert Solution & Answer
Book Icon
Chapter 8, Problem 8PE

Explanation of Solution

Program:

File name: “BirthdayReminder.java

//Import necessary header files

import java.util.*;

//Define a class named BirthdayReminder

public class BirthdayReminder

{

    //Define main method

    public static void main(String[] args)

    {

        //Declare the variables and initialize the values

        final int NUM_NAMES = 10;

        String sentinal = "ZZZ";

        int count = 0;

        String name = null;

        String birthdate = null;

        //Declare an array of values

        String[] names = new String[NUM_NAMES];

        String[] birthdates = new String[NUM_NAMES];

        //Create an object for Scanner class

        Scanner input = new Scanner(System.in);

        //Prompt the user to enter a name

System.out.println("Enter a name or " + sentinal + " to quit > ");

        name = input.nextLine();

/*While condition to check if the user enters the sentinel value ZZZ for a name or has entered 10 names*/

        while(name.compareTo(sentinal)!=0 && count < NUM_NAMES)

        {

            //Prompt the user to enter the birthdate

            System.out.println("Enter birthdate (mm/dd) > ");

            birthdate = input.nextLine();

            //Store the count of names and birthdate entered

            names[count] = name.trim();

            birthdates[count] = birthdate.trim();

            //Prompt the user to enter a name

System.out.println("Enter a name or " + sentinal + " to quit > ");

            name = input.nextLine();

            //Increment the count

            ++ count;

        }

        //Print the result

        System.out.println("\nCount of names is " + count);

        System.out.println("\nNames are:" + count);

        //For loop is executed until x exceeds count

        for(int x = 0; x < count; ++x)

        //Print the result

        System.out.println(names[x]) ;

        //Declare boolean variables and initialize the value

        boolean repeat = true;

        boolean found;

        //While condition to repeat the loop

        while(repeat)

        {

            //Assign false value to found

            found=false;

            //Prompt the user to enter a name

System...

Blurred answer
Students have asked these similar questions
23:12 Chegg content://org.teleg + 5G 5G 80% New question A feed of 60 mol% methanol in water at 1 atm is to be separated by dislation into a liquid distilate containing 98 mol% methanol and a bottom containing 96 mol% water. Enthalpy and equilibrium data for the mixture at 1 atm are given in Table Q2 below. Ask an expert (a) Devise a procedure, using the enthalpy-concentration diagram, to determine the minimum number of equilibrium trays for the condition of total reflux and the required separation. Show individual equilibrium trays using the the lines. Comment on why the value is Independent of the food condition. Recent My stuff Mol% MeOH, Saturated vapour Table Q2 Methanol-water vapour liquid equilibrium and enthalpy data for 1 atm Enthalpy above C˚C Equilibrium dala Mol% MeOH in Saturated liquid TC kJ mol T. "Chk kot) Liquid T, "C 0.0 100.0 48.195 100.0 7.536 0.0 0.0 100.0 5.0 90.9 47,730 928 7,141 2.0 13.4 96.4 Perks 10.0 97.7 47,311 87.7 8,862 4.0 23.0 93.5 16.0 96.2 46,892 84.4…
You are working with a database table that contains customer data. The table includes columns about customer location such as city, state, and country. You want to retrieve the first 3 letters of each country name. You decide to use the SUBSTR function to retrieve the first 3 letters of each country name, and use the AS command to store the result in a new column called new_country.  You write the SQL query below. Add a statement to your SQL query that will retrieve the first 3 letters of each country name and store the result in a new column as new_country.
We are considering the RSA encryption scheme. The involved numbers are small, so the communication is insecure.  Alice's public key (n,public_key) is (247,7). A code breaker manages to factories  247 = 13 x 19  Determine Alice's secret key. To solve the problem, you need not use the extended Euclid algorithm, but you may assume that her private key is one of the following numbers 31,35,55,59,77,89.
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
EBK JAVA PROGRAMMING
Computer Science
ISBN:9781337671385
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT
Text book image
Programming Logic & Design Comprehensive
Computer Science
ISBN:9781337669405
Author:FARRELL
Publisher:Cengage
Text book image
Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:9781337102124
Author:Diane Zak
Publisher:Cengage Learning
Text book image
Microsoft Visual C#
Computer Science
ISBN:9781337102100
Author:Joyce, Farrell.
Publisher:Cengage Learning,
Text book image
EBK JAVA PROGRAMMING
Computer Science
ISBN:9781305480537
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT
Text book image
C++ Programming: From Problem Analysis to Program...
Computer Science
ISBN:9781337102087
Author:D. S. Malik
Publisher:Cengage Learning
C++ Programming Tutorial 36 - Intro to Loops; Author: Caleb Curry;https://www.youtube.com/watch?v=M3o7Y0juEP0;License: Standard YouTube License, CC-BY