answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lys-0071 [83]
2 years ago
12

5.16 *zyLab: Hello IDE The goal of this problem is learn how to use Eclipse or IntelliJ. Submit the source code files (.java) be

low. Make sure your source files are encoded in UTF-8. Some strange compiler errors are due to the text encoding not being correct. Complete the following: In your chosen IDE, create a new project. You can name the project anything you like, we recommend "M5". Create a new class file, titled HelloIDE (which will create the file HelloIDE.java). Write a main method in this class that prompts a user for their name, and then replies with "Hello, ___!" filling in the blank with the typed in name, trimmed. Otherwise, if the string is empty, or just contains only whitespace, or if no input is given, output "Hello, stranger!". Example input/output for input "Mark":
Computers and Technology
1 answer:
givi [52]2 years ago
8 0

Answer:

import java.util.Scanner;

public class HelloIDE

{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

   

 System.out.print("Enter your name: ");

 String name = input.nextLine();

 

 name = name.trim();

 

 if(name.equals(""))

     name = "stranger";

     

 System.out.println("Hello, " + name + "!");

}

}

Explanation:

import the Scanner class to be able to get input from the user

Create an object of the Scanner class called input

Ask the user to enter the name and set it to the name

Trim the name using trim() method, removes the whitespaces from the string

Check the name. If name is equal to "", set the name as stranger. This way if the name is empty, or just contains whitespaces or if name is not given, name will be set as stranger.

Print the name in required format

You might be interested in
The terminal window wants to evaluate your current bash knowledge by using the ~/workspace/nested-directories folder:
tia_tia [17]

Answer:

a. cd into the nested directories/ nested - level - 1 / directory using an absolute path

Explanation:

The directory is a location on the hard disk, which is also called a folder. It contains the files and also contains the other directories called sub directories.

A path to a file is merged with a slash and determines the file or directory in the operating system. An absolute path is the location file or directory from the actual file system

The directory's absolute path starts with a slash, and all slashed in the directory separates the directions.

All directions in the absolute path are written on the left side. The last name in the path may belong to the file, and the pwd command can determine the current directory.

The relative path is the location of the file. It begins with the working directory. An absolute path is unambiguous and working with deeply nested directories.

There are two commands which are used such as

  • cd
  • pwd
  1. cd is used for changing directory
  2. pwd is used for the working directory

We easily navigate the file system with the help of an absolute path.

7 0
2 years ago
Which of these tools can best be used as a self assessment for career planning purposes? a personality test an asset analysis a
Ivahew [28]

Answer:

a goal development checklist

Explanation:

8 0
2 years ago
Matt is a senior developer for Cyber Protect, a company that helps secure management information systems. Matt's new task is to
Len [333]

Answer:

white-hat hacker

Explanation:

The white-hat hacker is also called as ethical hacking. The white hat hacker is the security of the computer in an ethical manner by some experts it specializing in system testing and other test modules of computer is to ensure the security of the information security of an organization.

As Matt is a  developer for protecting the Cyber in a company The Matt creates secure management information systems. it divides the new task into the computer So Matt is a white-hat hacker in that organization

4 0
2 years ago
Which of the following statements is incorrect? An operating system provides an environment for the execution of programs. An op
rosijanka [135]

Answer:

command line and graphical user interface

Explanation:

there were (and still are) operating system with no graphical user interface at all, as for example some Unix releases

8 0
1 year ago
3) 5, 10, 15, 20 are items of data. Explain how these could become information and what knowledge
yKpoI14uk [10]

For example when there is research on how many people shoplift in a shopping centre per week. These numbers could show a increase in the number of shoplifters per week.

8 0
2 years ago
Other questions:
  • Represent decimal number 8620 in (a) BCD, (b) excess-3 code, (c)2421 code, and (d) as a binary number
    7·1 answer
  • Suppose the information content of a packet is the bit pattern 1110 0110 1001 1101 and an even parity scheme is being used. What
    15·1 answer
  • JAVAThe method longestStreak is intended to determine the longest substring of consecutive identical characters in the parameter
    7·1 answer
  • Write a program that calculates an adult's fat-burning heart rate, which is 70% of 220 minus the person's age. Complete fat_burn
    10·1 answer
  • Suppose two threads execute the following C code concurrently, accessing shared variables a, b, and c: Initialization int a = 4;
    15·1 answer
  • Complete function PrintPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 3, print "To
    9·1 answer
  • Describe a strategy for avoiding nested conditionals. Give your own example of a nested conditional that can be modified to beco
    15·1 answer
  • Which statement is true about the purpose of a work in process constraint?
    15·1 answer
  • When do images or graphics in Microsoft Word hurt the document rather than help
    9·1 answer
  • You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!