in java how do i Write a method named isEven that accepts an int argument. The method should return true if the argument is even, or false otherwise. Also write a program to test your method.

Answers

Answer 1
Answer:============================================

//Class header definition

public class TestEven {

   

   //Method main to test the method isEven

   public static void main(String args[ ] ) {

       

       //Test the method isEven using numbers 5 and 6 as arguments

       System.out.println(isEven(5));

       System.out.println(isEven(6));

     

   }

   

   //Method isEven

   //Method has a return type of boolean since it returns true or false.

   //Method has an int parameter

   public static boolean isEven(int number){

       //A number is even if its modulus with 2 gives zero

      if (number % 2 == 0){

           return true;

       }

       

       //Otherwise, the number is odd

       return false;

   }

}

====================================================

Sample Output:

=========================================================

false

true

==========================================================

Explanation:

The above code has been written in Java. It contains comments explaining every part of the code. Please go through the comments in the code.

A sample output has also been provided. You can save the code as TestEven.java and run it on your machine.

Answer 2

Methods are collections of named program statements that are executed when called or evoked

The program in Java, where comments are used to explain each line is as follows:

import java.util.*;

public class Main {

   public static void main(String args[ ] ) {

       //This creates a Scanner Object

       Scanner input = new Scanner(System.in);

       //This gets input for the number

       int num = input.nextInt();

       //This calls the function

       System.out.println(isEven(num));

  }

  public static boolean isEven(int num){

      //This returns true, if num is even

      if (num % 2 == 0){

          return true;

      }

      //This returns false, if otherwise

      return false;

  }

}

Read more about methods at:

https://brainly.com/question/20442770


Related Questions

You are in a rectangular maze organized in the form of M N cells/locations. You are starting at the upper left corner (grid location: (1; 1)) and you want to go to the lower right corner (grid location: (M;N)). From any location, you can move either to the right or to the bottom, or go diagonal. I.e., from (i; j) you can move to (i; j + 1) or (i + 1; j) or to (i+1; j +1). Cost of moving right or down is 2, while the cost of moving diagonally is 3. The grid has several cells that contain diamonds of whose value lies between 1 and 10. I.e, if you land in such cells you earn an amount that is equal to the value of the diamond in the cell. Your objective is to go from the start corner to the destination corner. Your prot along a path is the total value of the diamonds you picked minus the sum of the all the costs incurred along the path. Your goal is to nd a path that maximizes the prot. Write a dynamic programming algorithm to address the problem. Your algorithm must take a 2-d array representing the maze as input and outputs the maximum possible prot. Your algorithm need not output the path that gives the maximum possible prot. First write the recurrence relation to capture the maximum prot, explain the correctness of the recurrence relation. Design an algorithm based on the recurrence relation. State and derive the time bound of the algorithm. Your algorithm should not use recursion

Answers

Answer:

Following are the description of the given points:

Explanation:

A) The Multiple greedy approaches could exist, which could be to reach for the closest emergency diamond, and yet clearly we are going to miss some very essential routes in that case. So, it can make every argument quickly, and seek to demonstrate a reference case for that.

B) An approach to the evolutionary algorithm and its users are going to just have states M x N. But each state (i, j) indicates the absolute difference between the amount of the selected diamond and the amounts of the costs incurred.

DP(i, j) = DimondVal(i, j) + max ((DP(i, j-1)-2), (DP(i-1,j-1)-3))

DP(i, j) is a description of the state.

DimondVal(i, j) is the diamond value at (i j), 0 if there is no diamond available.

This states must calculate the states of M N  and it involves continuous-time for each State to determine. Therefore the amount of time of such an algo is going to be O(MN).

Your smartphone, digital camera, and printer are all part of a network in your workspace. What type of network is likely in use

Answers

Answer:

PAN

Explanation:

PAN, short form of Personal Area Network, is a type of computer network built for personal use typically within a building. This could be inside a small office or a bedroom in a residence. This type of network basically consists of one or more personal computers, digital camera, printer, Tv, scanner, telephones, peripheral devices, video games console, and other similar devices.

It is pretty much simple to set up and allow for great flexibility. In this network, a single modem can be set up to enable both wired and wireless connections for multiple devices within the building.

What is the difference between requirements and controls in the security process? Give examples of each.

Answers

Answer:

Security controls are those measures taken to prevent, identify, counteract, and reduce security risks to computer systems, whereas, Security Requirements are guidelines or frameworks that stipulates measures to ensure security control.

Explanation:

Security controls encompass all the proactive measures taken to prevent a breach of the computer system by attackers. Security requirements are those security principles that need to be attained by a system before it can be certified as safe to use.

Security controls are of three types namely, management, operational, and technical controls. Examples of technical controls are firewalls and user authentication systems. A statement like 'The system shall apply load balancing', is a security requirement with an emphasis on availability.

When preparing a photo for a magazine, a graphic designer would most likely need to use a program such as Microsoft Excel to keep track of magazine sales. Microsoft Word to write an article about the photo. Adobe Photoshop to manipulate the photo. Autodesk Maya to create 3-D images that match the photo.

Answers

Answer:

Adobe Photoshop To Manipulate The Photo.

Explanation:

BLACKPINKS new album is amazing OMG I LOVE Lovesick Girls!!!

Explain why an organization's firewall should block incoming packets the destination address of which is the organization's broadcast address?

Answers

Answer:

The classification including its given topic has always been outlined in section through below justifications.

Explanation:

Whenever an application running seems to have the destination as either the destination network of the organization, it must use the sophisticated instruments. This would also pressure each host mostly on infrastructure to collect the traffic coming as well as processing the message. Increases system should perhaps be restricted because it will not significantly impact channel or device productivity.Therefore, the firewall of a standard operating organization will block certain traffic with IP addresses as destination host of the organization.Another thing to remember here seems to be that transmitted destination details are usually indicators of an intruder using only a target computer as something of a transmitter. An assailant utilizing a broadcasting channel can trigger the transmitter to occur on a different machine.  

Makers of tablet computers continually work within narrow constraints on cost, power consumption, weight, and battery life. Describe what you feel would be the perfect tablet computer. How large would the screen be? Would you rather have a longer-lasting battery, even if it means having a heavier unit? How heavy would be too heavy? Would you rather have low cost or fast performance Should the battery be consumer-replaceable?

Answers

Answer:

In my opinion I would spend my money on a pc, tablets are of no use anymore besides having a larger screen, nowadays you either have a phone or a computer.

In my opinion I would spend my money on a pc, tablets are of no use anymore besides having a larger screen, nowadays you either have a phone or a computer.

What will be the typical runtime of a tablet?

The typical runtime of a tablet is between three and ten hours. More charge is typically needed for less expensive models than for more expensive tablets.

The typical runtime of a tablet is between three and ten hours. More charge is typically needed for less expensive models than for more expensive tablets. It might go a week or longer between charges if you only use the tablet once or twice each day.

Many people find that charging merely 80% is ineffective. Your phone won't function if you fully charge it and then use it in a single day. The 40-80% rule applies if, like me, your daily usage is limited to 25–50%.

The typical runtime of a tablet is between three and ten hours. More charge is typically needed for less expensive models than for more expensive tablets.                          

Therefore, In my opinion I would spend my money on a pc, tablets are of no use anymore besides having a larger screen, nowadays you either have a phone or a computer.

Learn more about battery on:

https://brainly.com/question/19225854

#SPJ2

C++ 3.4.4: If-else statement: Print senior citizen. Write an if-else statement that checks patronAge. If 55 or greater, print "Senior citizen", otherwise print "Not senior citizen" (without quotes). End with newline.

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

   int patronAge = 71;

   

   if(patronAge >=55)

       cout<<"Senior citizen"<<endl;

   else

       cout<<"Not senior citizen"<<endl;

   return 0;

}

Explanation:

Initialize the patronAge age, in this case set it to 71

Check the patronAge. If it is greater than or equal to print "Senior citizen". Otherwise, print "Not senior citizen". Use "endl" at the end of each print statement to have new lines.

Your boss wants you to start making your own Ethernet cables to save the company money. What type of connectors will you need to order to make them?

Answers

Answer:

Bulk Ethernet Cable - Category 5e or CAT5e

Bulk RJ45 Crimpable Connectors for CAT-5e

Explanation:

The main path of the Internet along which data travels the fastest is known as the Internet ________. Group of answer choices

Answers

Answer:

Internet backbone

Explanation:

The internet backbone is made up of multiple networks from multiple users. It is the central data route between interconnected computer networks and core routers of the Internet on the large scale. This backbone does not have a unique central control or policies, and is hosted by big government, research and academic institutes, commercial organisations etc. Although it is governed by the principle of settlement-free peering, in which providers privately negotiate interconnection agreements, moves have been made to ensure that no particular internet backbone provider grows too large as to dominate the backbone market.

C++ PROGRAM THAT DOES THE FOLLOWING:
Problem You Need to Solve for This Lab:
You are asked to write an app to keep track of a relatively small music library. The app should load song information from a data file once the app is started. It should allow user to view, add, remove, and search for songs. The app should save the data back to the same data file when the program exits.
What Your Program Should Do:
Write an interactive text based menu interface (using a loop) that will allow the user to
 Enter information for a new song
 Display information for all the songs in the database with index for each song
 Remove a song by index
 Search for songs by a certain artist
 Search for songs by a certain album
 Quit

Answers

Answer:

I have updated answer in google

Explanation:

please chek it. I hope it will nice

Write down the information for your system’s active network connection (most likely either Ethernet or Wi-Fi).

Answers

Question:

1. Open a command prompt window, type ipconfig/ all and press Enter.

2. Write down the information for your system’s active network connection(most likely either Ethernet or Wi-Fi).

* Physical address in paired hexadecimal form.

* Physical address expressed in binary form.

Answer:

00000000 11111111 00000011 10111110 10001100 11011010

Explanation:

(i)First, open a command prompt window by using the shortcut: Windows key + X then select command prompt in the list.

(ii)Now type ipconfig/ all and press Enter. This will return a few information

(a) To get the Physical address in paired hexadecimal form, copy any of the Physical Addresses shown. E.g

00-FF-03-BE-8C-DA

This is the hexadecimal form of the physical address.

(b) Now let's convert the physical address into its binary form as follows;

To convert to binary from hexadecimal, we can use the following table;

Hex                 |         Decimal                |           Binary

0                      |          0                           |           0000

1                       |          1                            |           0001

2                      |          2                           |           0010

3                      |          3                           |           0011

4                      |          4                           |           0100

5                      |          5                           |           0101

6                      |          6                           |           0110

7                      |          7                           |           0111

8                      |          8                           |           1000

9                      |          9                           |           1001

A                     |          10                           |           1010

B                      |          11                           |           1011

C                      |          12                           |           1100

D                      |          13                           |           1101

E                      |          14                           |           1110

F                      |          15                           |           1111

Now, from the table;

0 = 0000

0 = 0000

F = 1111

F = 1111

0 = 0000

3 = 0011

B = 1011

E = 1110

8 = 1000

C = 1100

D = 1101

A = 1010

Put together, 00-FF-03-BE-8C-DA becomes;

00000000 11111111 00000011 10111110 10001100 11011010

PS: Please make sure there is a space between ipconfig/ and all

.Pretend you are ready to buy a new computer for personal use.First, take a look at ads from various magazines and newspapers and list terms you don’t quite understand. Look up these terms and give a brief written explanation. Decide what factors are important in your decision as to which computer to buy and list them. After you select the system you would like to buy, identify which terms refer to hardware and which refer to software.

Answers

Answer:

Brainly is not meant to give paragraph answers to large questions.

In a computer (desktop)

There are 8-9 main components to a PC

Motherboard

CPU

GPU (for gamers)

RAM

SSD

HDD

PSU

Cooling fans (for AMD processors stock fans are included)

Case (some fans included)

I personally build my computers (desktops) as its cheaper and I won't have to pay a build fee.

A customer contacts the help disk stating a laptop does not remain charged for more than 30 minutes and will not charge more than 15%. Which of the following components are the MOST likely causes the issue? (Select three.) A. LCD power inverter B. AC adapter C. Battery D. Processor E. VGA card F. Motherboard G. Backlit keyboard H. Wireless antenna

Answers

Answer:

A. LCD power inverter

B. AC adapter

C. Battery

A security analyst is performing a BIA. The analyst notes that in a disaster, failover systems must be up and running within 30 minutes. The failover systems must use back up data that is no older than one hour. Which of the following should the analyst include in the business continuity plan?
A. A maximum MTTR of 30 minutes
B. A maximum MTBF of 30 minutes
C. A maximum RTO of 60 minutes
D. An SLA guarantee of 60 minutes

Answers

Answer:

D.  A maximum RPO of 60 minutes

Explanation:

Note that an option is not included in this list of options.

The complete list of options is:

A. A maximum MTTR of 30 minutes

B. A maximum MTBF of 30 minutes

C. A maximum RTO of 60 minutes

D.  A maximum RPO of 60 minutes

E. An SLA guarantee of 60 minutes

The Recovery Point Objective tells how old a backup file must be before it can be  recovered by a system after failure.

Since the data in the failover systems described in this question must be backup and recovered after the failure, it will be important to include the Recovery Point Objective (RPO) in the Business Continuity Plan.

Since the failover systems must use back up data that is no older than one hour, the backup of the system data must be done at intervals of 60 minutes or less. Meaning that the maximum RPO is 60 minutes.

Note that RPO is more critical than RTO in data backup

True or False: It is okay to just paste the URLs of the items you used for references at the end of a paper. Select one: True False

Answers

True as long as it isn’t on a test

It is not okay to just paste the URLs of the items you used for references at the end of a paper therefore the answer is False

For better understanding, lets explain why the answer is false

When citing a reference it not OK to cite URLs. when you are citing onlh the URL is wrong because theURL could change at any time and the fact remain that it is not everyone who reads your paper can do it electronically or has access to the internet., so the url is not the first step to take. The right thing to do is to give the name of the paper, the author(s), the Journal it was published in and the year it was published.



From the above, we can therefore say that the answer is It is not okay to just paste the URLs of the items you used for references at the end of a paper therefore the answer is False, is correct.

Learn more about referencing from:

https://brainly.com/question/13003724

What's the value of this Python expression? ((10 >= 5*2) and (10 <= 5*2))

Answers

Answer:

1 (true)

Explanation:

10 == 10 is valid=> 10 >= 10 is valid => 10 >=(5*2) is valid

10 == 10 is valid=> 10 <= 10 is valid => 10 <=(5*2) is valid

=>  ((10 >= 5*2) and (10 <= 5*2)) is valid => Return 1 or True

The Employee class will contain a String attribute for an employee’s name and a double attribute for the employee’s salary. Which of the following is the most appropriate implementation of the class?

a. public class Employee

{
public String name;
private double salary;
// constructor and methods not shown
}

b. public class Employee
{
private String name;
private double salary;
// constructor and methods not shown
}

c. private class Employee
{
public String name;
public double salary;
// constructor and methods not shown
}

d. private class Employee
{
private String name;
private double salary;
// constructor and methods not shown
}

Answers

Answer:

The answer is "Option b".

Explanation:

In the choice b, a public class "Employee" is declared, in which two private variables "name and salary" is declared whose data type is a string and double. At this, the class is accessible outside the scope but it variable accessible in the class only and the wrong choice can be defined as follows:

In choice a, datatypes access modifiers were different that's why it is wrong.In choice c and d both classes use a priavte access modifier, which means it can't accessible outside that's why it is wrong.

Megan was working on an image for a presentation. She had to edit the image to get the style she wanted. Below is the original picture and her final picture. Which best describes how she edited her picture? She cropped the blue background and added contrast corrections. She removed the complex blue background and added contrast corrections. She cropped the blue background and added artistic effects. She removed the complex blue background and added artistic effects.

Answers

Answer:

She removed the complex blue background and added artistic effects.

Explanation:

This is the best answer because both aspects are correct. If Megan were to "Crop" the backgrounds the shape would have changed and she would not have been able to get the whole background without cropping some of the flowers out. Therefore it is not A or C. The pictured change is most definitely artistic effects. So D is the best option.

Answer:

She removed the complex blue background and added artistic effects.

Explanation:

on edg

Write a program named Deviations.java that creates an array with the deviations from average of another array. The main() method

Answers

Answer:

hello your question is incomplete attached is the complete question and solution

answer : The solution is attached below

Explanation:

Below is a program named Derivations.java that creates an array with the deviations from average of another array.

Which test refers to the retesting of a unit, integration and system after modification, in order to ascertain that the change has not introduced new faults?

Answers

Answer:

Regression test

Explanation:

There are different types of testing in software development. Some of them are;

i. Smoke test

ii. Interface test

iii. Alpha test

iv. Beta/Acceptance test

v. Regression test

vi. System test

While all of these have their individual meanings and purposes, the regression test seeks to confirm that a recent update, modification or change in the underlying program code of the application (software) has not affected the existing features. This test ensures that a change to a software has not introduced new bugs or vulnerabilities to the state of the software before the change was made.

Regression test is actually done when;

i. there is a change in requirements of the software and thus the code is modified.

ii. a new feature is added to the software.

Convert the following numbers from decimal to binary, assuming unsigned binary representation:________.
A) 35
B) 3
C) 27
D) 16

Answers

Answer:

Binary representations of following are:

A) 35 = 100011

B) 3 = 11

C) 27 = 11011

D) 16 = 10000

Explanation:

The method to generate the binary number from a decimal is :

Keep on dividing the number by 2 and keep on tracking the remainder

And the quotient is again divided and remainder is tracked so that the number is completely divided.

And then write the binary digits from bottom to top.

Please have a look at the method in below examples:

A) 35

[tex]\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 35 & 1 \\ 2 & 17 & 1 \\ 2 & 8 & 0 \\ 2 & 4 & 0 \\ 2 & 2 & 0 \\ 2 & 1 & 1\end{tabular}\end{center}[/tex]

Writing the remainder from bottom to top.

So, binary number is 100011

B) 3

[tex]\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 3 & 1 \\ 2 & 1 & 1 \\ \end{tabular}\end{center}[/tex]

Writing the remainder from bottom to top.

So, binary equivalent is 11.

C) 27

[tex]\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 27 & 1 \\ 2 & 13 & 1 \\ 2 & 6 & 0 \\ 2 & 3 & 1 \\ 2 & 1 & 1 \end{tabular}\end{center}[/tex]

Writing the remainder from bottom to top.

So, binary equivalent is 11011.

D) 16

[tex]\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 16 & 0 \\ 2 & 8 & 0 \\ 2 & 4 & 0 \\ 2 & 2 & 0 \\ 2 & 1 & 1 \\\end{tabular}\end{center}[/tex]

Writing the remainder from bottom to top.

So, binary equivalent is 10000.

Answers are:

Binary representations of following are:

A) 35 = 100011

B) 3 = 11

C) 27 = 11011

D) 16 = 10000

The advantage of returning a structure type from a function when compared to returning a fundamental type is that

Answers

Answer:

The function can return multiple values and the function can return an object

Explanation:

The advantage of returning a structure type from a function when compared to returning a fundamental type is that the function can return multiple values and also the function can return an object

A function in a structure can be passed to a function from any other function or from the main function itself and the definition of a structure can be seen in the function where it is found

#Write a function called random_marks. random_marks should #take three parameters, all integers. It should return a #string. # #The first parameter represents how many apostrophes should #be in the string. The second parameter represents how many #quotation marks should be in the string. The third #parameter represents how many apostrophe-quotation mark #pairs should be in the string. # #For example, random_marks(3, 2, 3) would return this #string: #'''""'"'"'" # #Note that there are three apostrophes, then two quotation #marks, then three '" pairs. #Add your function here!

Answers

Answer:

def random_marks(apostrophe, quotation, apostrophe_quotation):

   return "'"*apostrophe + "\""*quotation + "'\""*apostrophe_quotation

   

print(random_marks(3, 2, 3))

Explanation:

Create a function called random_marks that takes apostrophe, quotation, and apostrophe_quotation as parameters. Inside the function, return apostrophe sign times apostrophe plus quotation mark times quotation plus apostrophe sign quotation mark times apostrophe_quotation.

Note that plus sign (+) is used to concatenate strings. Also, if you multiply a string with a number, you get that number of strings ("#"*3 gives ###).

Then, call the function with given parameters and print

hard disk drive has 16 platters, 8192 cylinders, and 256 4KB sectors per track. The storage capacity of this disk drive is at most Select one: a. 32 GB. b. 128 GB. c. 128 TB. d. 32 TB.

Answers

Answer:

B

Explanation:

Here, we want to calculate the storage capacity of the disk drive.

We proceed as follows;

Per track capacity = 4 * 256 KB = 1024 KB = 1 MB

per platter capacity = 1 MB * 8192 = 8192 MB

total capacity = 16 * 8192 MB = 131072 MB

converting total capacity to GB,

1024 MB = 1 GB

thus, 131,072 MB to GB would be;

total capacity =131072/1024 = 128GB

Do transformers have life insurance or car insurance? If you chose life insurance, are they even alive?

Answers

Answer:

Car insurance

Explanation:

they are machines with ai

Suppose you are provided with 2 strings to your program. Your task is to join the strings together so you get a single string with a space between the 2 original strings. This is a common case is coding and you will need to create your output by joining the inputs and adding the space in the middle.

# Input from the command line
import sys
string1 = sys.argv[1]
string2 = sys.argv[2]

Answers

Answer:

public class TestImport{

   public static void main(String[] args) {

       String string1 = args[1];

       String string2 = args[2];

       System.out.println(string1 +" " +string2);

   }

}

Explanation:

The solution here is to use string concatenation as has been used in this statement System.out.println(string1 +" " +string2);

When this code is run from the command line and passed atleast three command line arguments for index 0,1,2 respectively, the print statment will return the second string (that is index1) and the third argument(that is index2) with a space in-between the two string.

A copy of the copyrighted work must be exactly the same as the original to infringe a copyright.
1. True
2. False

Answers

Answer:

true

Explanation:

What will be the tokens in the following statement? StringTokenizer strToken = new StringTokenizer("January 1, 2008", ", ", true);

Answers

Answer:

The tokens are:

January

space

1

,

space

2008

Explanation:

StringTokenizer class is basically used to break a string into tokens. The string consists of numbers, letters, quotation marks commas etc,

For example if the string is "My name is ABC" then StringTokenizer will break this string to following tokens:

My

name

is

ABC

So in the above example, the string is "January 1, 2008". It contains January with a space, then 1, then a comma, then 2008

The last comma and true in the statement do not belong to the string. They are the parameters of the StringTokenizer constructor i.e.

StringTokenizer(String str, String delim, boolean flag)

So according to the above constructor str= "January 1, 2008"

String delim is ,

boolean flag = true

So  the StringTokenizer strToken = new StringTokenizer("January 1, 2008", ", ", true); statement has:

a string January 1, 2008

a delim comma with a space (, ) which is used to tokenize  the string "January 1, 2008".

boolean flag set to true which means the delim i.e. (, ) is also considered to be a token in the string. This means the comma and space are considered to be tokens in the given string January 1, 2008.

Hence the output is January space 1 comma space 2008.

Check the attached image to see the output of the following statement.

ZigBee is an 802.15.4 specification intended to be simpler to implement, and to operate at lower data rates over unlicensed frequency bands.

a. True
b. False

Answers

Answer:

True

Explanation:

Solution

ZigBee uses unlicensed frequency bands but operate at slower speed or data rates.

ZigBee: This communication is particular designed for control and sensor networks on IEEE 802.15.4 requirement for wireless personal area networks (WPANs), and it is a outcome from Zigbee alliance.

This communication level defines physical and  (MAC) which is refereed to as the Media Access Control layers to manage many devices at low-data rates.

g Write a C program that prompts the user for a string of, up to 50, characters and numbers. It can accept white spaces and tabs and end with a return. The program should keep track of the number of different vowels (a,e, i, o, u) and the number of digits (0, 1, 2, 3, 4, 5, 6, 7, 8,9). The program should output the number of occurrences of each vowel and the number of occurrences of all digits.

Answers

Answer:

Following are the code to this question:

#include <stdio.h> //defining header file

#include <string.h>//defining header file

int main()//defining main method

{

char name[50]; //defining character variable

int A=0,E=0,I=0,O=0,U=0,value=0,i,l; //defining integer variables

printf("Enter string value: ");//print message

gets(name);//input value by gets method

l=strlen(name);//defining l variable to store string length

for(i=0; i<50; i++) //defining loop to count vowels value

{

if(name[i] == 'A' || name[i] == 'a') //defining if condition count A value A++;//increment value by 1

else if(name[i] == 'E' || name[i] == 'e')//defining else if condition count E value

E++;//increment value by 1

else if(name[i] == 'I' || name[i] == 'i') //defining else if condition count I value

I++;//increment value by 1

else if(name[i] == 'O' || name[i]== 'o') //defining else if condition count O value

O++;//increment value by 1

else if(name[i] == 'U' || name[i] == 'u')//defining else if condition count U value

U++;//increment value by 1

else if(name[i]>= '0' && name[i] <= '9')//defining else if condition count digits value

value++;//increment value by 1 }

printf("A: %d\n",A);//print A value

printf("E: %d\n",E); //print E value

printf("I: %d\n",I);//print I value

printf("O: %d\n",O);//print O value

printf("U: %d\n",U);//print U value

printf("value: %d",value);//print digits value

return 0;

}

Output:

please find the attachment.

Explanation:

In the above code, a char array "name" and integer variables "A, E, I, O, U, i, value and l" declared, in which name array store 50 character value, which uses the gets function to take string value.after input value strlen method is used to store the length of the input string in l variable.In the next step, for loop is declared that uses multiple conditional statements to counts vowels and the values of the digits,if it is more then one it increments its value and at the last print method is used to print its count's value.
Other Questions
How does this image compare to the white blood cells you saw using Stellas compound microscope? What are the pros and cons of using electron and compound microscopes? In your response consider cost and ease of use. please i know the awnser is 60 but i cant explain it PLEASE HELP! IF YOU CAN'T ANSWER ALL OF THE QUESTIONS, PLEASE JUST GIVE ME AS MUCH AS YOU CAN! THANK YOUUUU 1. How can a business use its customer profile to meet the objective of increasing sales? 2. Explain why a business may decide to increase its product mix. 3. Define customer profile and explain two elements that might be useful in creating a customer profile. 4. Any business that fails to conduct a sales analysis will be unable to assess the success of its marketing strategies. Discuss. 5. A business has a sales forecast of $90000 but achieves actual sales of only $25000. What does this signify? What should the business do next? 6. Darren runs a garden maintenance business and has carried out a marketing campaign in his own and neighbouring suburbs. Explain how each of the following may help him evaluate the success of that campaign: a. sales analysis b. market share analysis c. marketing profitability analysis Anthony and Cathy Smith have been married for thirty-one years. They have always had a joint bank account, discussed big expenditures, and shared household duties. Which term best describes the Smith family based on this information Use the Remainder Theorem to determine which of the roots are roots of F(x). Show your work. Polynomial: F(x)=x^3-x^2-4x+4Roots: 1, -2, and 2. If an electron has a principal quantum number (n) of 7 and an angular momentum quantum number (l) of 1, the subshell designation is ________ Suppose 1 and 2 are true mean stopping distances at 50 mph for cars of a certain type equipped with two different types of braking systems. Use the two-sample t test at significance level 0.01 to test H0: 1 2 = 10 versus Ha: 1 2 < 10 for the following data: m = 8, x = 115.6, s1 = 5.04, n = 8, y = 129.3, and s2 = 5.32.Calculate the test statistic and determine the P-value. (Round your test statistic to two decimal places and your P-value to three decimal places.)t = ________P-value = _________ A force of 44 N will stretch a rubber band 88 cm (0.080.08 m). Assuming that Hooke's law applies, how far will aa 11-N force stretch the rubber band? How much work does it take to stretch the rubber band this far? what was the first totalitarian state to emerge in Europe? Twelve less than the product of three and a number is less than 21 If you're good at trigonometry please help me with question nine a and b and show full working out tyyyyyyyy ;) how do a proton and neutron compare? Calculate the heat of reaction, H, for the following:3FeCl2(s) + 4H2O(g) Fe3O4(s) + 6HCl(g) + H2(g) Ballplayer with Three-Part Yoke and Bird Headdress Summarize the role of bacteria in keeping the nitrogen cycle balanced. Which of the following processes is increased when many trees are removedfrom an area?A. RunoffB. PercolationC. TranspirationD. Photosynthesis Angle ABC is bisected by line segment AD. If angle ABC measures 108 and one of the smaller angles created by line AD measures (5x+4), what is the value of x? Find the length of a picture frame whose width is 3 inches and whose proportions are the same as a 9-inch wide by 12-inch long picture frame. 6. ABC Company announced today that it will begin paying annual dividends next year. The first dividend will be $0.10 a share. The following dividends will be $0.20, $0.30, $0.40, and $0.50 a share annually for the following 4 years, respectively. After that, dividends are projected to increase by 2.0 percent per year. How much are you willing to pay to buy one share of this stock today if your desired rate of return is 8.0 percent If the area of a circular cookie is 28.26 square inches, what is the APPROXIMATE circumference of the cookie? Use 3.14 for . 75.2 in. 56.4 in. 37.6 in. 18.8 in.