
Concept explainers
Repeat Exercise 2 in Chapter 7, but use an instance of ArrayList instead of an array. Do not read the number of values, but continue to read values until the user enters a negative value.

Explanation of Solution
Program Plan:
- Import required package.
- Define “CountFamiles”class.
- Define main function.
- Create object for scanner class.
- Create array “incomeArr” by using “ArrayList”.
- Display the prompt statement.
- Assign “additionalValues” to “true”.
- Initializes required variable.
- Read input of income from user up to the value of “additionalValues” is “false”.
- Display prompt statement for each family.
- Read each family income from user and store it to “incomeValues”.
- If “incomeValues” is less than “0”, then set “additionalValues” to “false”.
- Otherwise, add the “incomeValues” to array “incomeArr”.
- Increment the index.
- Compute maximum income using “for” loop.
- If “incomeArr.get(i)” is greater than maximum income, then assign maximum income to “incomeArr.get(i)”.
- Display maximum income.
- Display “10” percent of maximum income by “0.1 * maximumIncome”.
- Initializes the count value to “0”.
- Compute the count of families with incomes less than “10” percentage of maximum income using “for” loop.
- Check condition. If value of “incomeArr.get(i)” is less than “0.1 * maximumIncome”, then increment count value and display the family income with less than “10” percentage of income by family wise.
- Finally display the count of families.
- Define main function.
Program:
The below java program is used to counts the number of families with less than “10” percent of maximum income using array.
“CountFamiles.java”
//Import required package
import java.util.*;
//Define "CountFamiles" class
public class CountFamiles
{
//Define main function
public static void main(String[] args)
{
//Create object for scanner class
Scanner input = new Scanner(System.in);
/* Create array "incomeArr" by using "ArrayList" */
ArrayList<Double> incomeArr = new ArrayList<Double>();
//Display the prompt statement
System.out.println("Enter the income for each family. Use a negative value to indicate the end ");
//Assign "additionalValues" to "true"
boolean additionalValues = true;
//Initializes required variable
int i = 0;
/* Read input of income from user upto the value of "additionalValues" is "false" */
while(additionalValues)
{
//Display prompt statement for each family
System.out.print("Enter Income for family " + (i +1) + ": ");
/* Read each family income from user and store it to "incomeValues" */
double incomeValues = input.nextDouble();
/* If "incomeValues" is less than "0", then */
if(incomeValues < 0)
/* Set "additionalValues" to "false" */
additionalValues = false;
/* Otherwise */
else
/* Add the "incomeValues" to array "incomeArr" */
incomeArr.add(incomeValues);
//Increment the index
i++;
}
//Compute maximum income using "for" loop
double maximumIncome = incomeArr.get(0);
for(i = 0; i < incomeArr.size(); i ++)
{
/* If incomeArr.get[i] is greater than maximum income, then */
if(incomeArr.get(i) > maximumIncome)
//Assign maximum income to "incomeArr.get(i)"
maximumIncome = incomeArr.get(i);
}
//Display maximum income
System.out.println("The maximum income is: " + maximumIncome);
//Display 10 percent of maximum income
System.out.println("10% of maximum income is: " + (0.1 * maximumIncome));
//Display prompt statement
System.out.println("\nDisplaying all families with incomes less than 10% of the maximum income income");
//Initializes the count value to "0"
int countValue = 0;
//Compute the count of families with incomes less than 10% of maximum income
for( i=0; i<incomeArr.size(); i++)
{
//Check condition
if(incomeArr.get(i) < (0.1 * maximumIncome))
{
//Increment count value
countValue++;
/* Display the family income with less than 10 percentage of income by family wise */
System.out.println("Family " + (i+1) + " had income " + incomeArr.get(i));
}
}
//Display count of families
System.out.println("Count of families with 10% of maximum income is: " + countValue);
}
}
Output:
Enter the income for each family. Use a negative value to indicate the end
Enter Income for family 1: 10000
Enter Income for family 2: 48000
Enter Income for family 3: 20000
Enter Income for family 4: 12000
Enter Income for family 5: 300000
Enter Income for family 6: 40000
Enter Income for family 7: -1
The maximum income is: 300000.0
10% of maximum income is: 30000.0
Displaying all families with incomes less than 10% of the maximum income
Family 1 had income 10000.0
Family 3 had income 20000.0
Family 4 had income 12000.0
Count of families with 10% of maximum income is: 3
Want to see more full solutions like this?
Chapter 12 Solutions
Java: An Introduction to Problem Solving and Programming (7th Edition)
Additional Engineering Textbook Solutions
Problem Solving with C++ (10th Edition)
Starting Out With Visual Basic (8th Edition)
Starting Out with Java: From Control Structures through Data Structures (4th Edition) (What's New in Computer Science)
Computer Science: An Overview (13th Edition) (What's New in Computer Science)
SURVEY OF OPERATING SYSTEMS
Starting Out with Java: From Control Structures through Objects (7th Edition) (What's New in Computer Science)
- Tech Distributors is implementing biometric authentication at all entry points to increase security at their scientific laboratories. Discuss the challenges of using biometric authentication.arrow_forwardTrendy Distributors experienced a system downtime that resulted in customers failing to make online payments or create new accounts. The disruption resulted in substantial revenue losses. Implementing continuity of operation (COOP) and business continuity (BC) strategies will ensure the organisation remains functional during and after such a disruption. Distinguish between COOP and BC, giving relevant examples.arrow_forwardTrendy Distributors experienced a system downtime that resulted in customers failing to make online payments or create new accounts. The disruption resulted in substantial revenue losses. Implementing continuity of operation (COOP) and business continuity (BC) strategies will ensure the organisation remains functional during and after such a disruption. Distinguish between COOP and BC, giving relevant examples.arrow_forward
- A network administrator at Trendy Distributors identifies sensitive files being transferred from a Local Area Network (LAN) workstation to an unauthorised outside IP address in a foreign country. An investigation determines that the firewall has not been altered, and the anti-virus on the workstation is up-to-date. What could be the MOST likely explanation for this?arrow_forwardA network administrator at Trendy Distributors identifies sensitive files being transferred from a Local Area Network (LAN) workstation to an unauthorised outside IP address in a foreign country. An investigation determines that the firewall has not been altered, and the anti-virus on the workstation is up-to-date. What could be the MOST likely explanation for this?arrow_forwardThe software testers who perform an audit are given access to the Tech Distributors’ facility and network. The testers will not be given access to the details of the custom-developed software the customer uses. However, the testers will also have access to the source code for several open-source applications and networking equipment used at the facility. These items will be within the scope of the audit. Establish and describe the appropriate software testing methods for this audit.arrow_forward
- The security manager at TwoUp Technologies’ primary role is implementing cybersecurity functions and strategising how IT services should be governed to fulfil business needs. The IT and cybersecurity framework can shape company policies by providing procedures, activities, checklists, and technologies that should be implemented. Describe the four categories governing an organisation’s system or data asset to meet the CIA triad and non-repudiation properties.arrow_forwardA supply management director of Tech Distributors is sending a payment confirmation email to one of the organisation’s regional managers. The organisation experienced a security breach when the company network was attacked by one of the employees who had plugged in a virus-infected external storage device. The company experienced a data breach of confidential customer and supplier financial details. To improve communication security and prevent breaches in the future, all communications with regional offices must be encrypted. The director has sent the encrypted email message below to a regional manager. Delineate cryptography and use the ROT13 substitution cipher to decrypt the message. Cnlzrag unf orra rssrpgrqarrow_forwardA supply management director of Tech Distributors is sending a payment confirmation email to one of the organisation’s regional managers. The organisation experienced a security breach when the company network was attacked by one of the employees who had plugged in a virus-infected external storage device. The company experienced a data breach of confidential customer and supplier financial details. To improve communication security and prevent breaches in the future, all communications with regional offices must be encrypted. The director has sent the encrypted email message below to a regional manager. Delineate cryptography and use the ROT13 substitution cipher to decrypt the message. Cnlzrag unf orra rssrpgrqarrow_forward
- The security manager at TwoUp Technologies’ primary role is implementing cybersecurity functions and strategising how IT services should be governed to fulfil business needs. The IT and cybersecurity framework can shape company policies by providing procedures, activities, checklists, and technologies that should be implemented. Describe the four categories governing an organisation’s system or data asset to meet the CIA triad and non-repudiation properties.arrow_forwardTwoUp Technologies employees have been using simple, easy-to-remember passwords, opening the company software, and making the network vulnerable to attacks. The company has experienced network attacks and data breaches in the past year. To implement security control strategies, the security manager must identify security risks within the organisation. The security manager explained to management the impact of this vulnerability and recommended eliminating unsecured networks. Expound on the different local and remote methods that attackers can use to gain access to the company network. Give an example of each path.arrow_forwardModern cybersecurity threats have become sophisticated, making the ability to describe and analyse threat behaviour necessary. Describe how you would analyse cybersecurity threats in an organisation.arrow_forward
- EBK JAVA PROGRAMMINGComputer ScienceISBN:9781337671385Author:FARRELLPublisher:CENGAGE LEARNING - CONSIGNMENTProgramming Logic & Design ComprehensiveComputer ScienceISBN:9781337669405Author:FARRELLPublisher:CengageC++ Programming: From Problem Analysis to Program...Computer ScienceISBN:9781337102087Author:D. S. MalikPublisher:Cengage Learning
- Microsoft Visual C#Computer ScienceISBN:9781337102100Author:Joyce, Farrell.Publisher:Cengage Learning,Programming with Microsoft Visual Basic 2017Computer ScienceISBN:9781337102124Author:Diane ZakPublisher:Cengage LearningNp Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:Cengage



