
Starting Out with Programming Logic and Design (5th Edition) (What's New in Computer Science)
5th Edition
ISBN: 9780134801155
Author: Tony Gaddis
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Textbook Question
Chapter 2, Problem 9TF
Hand tracing is the process of translating a pseudocode
Expert Solution & Answer

Want to see the full answer?
Check out a sample textbook solution
Students have asked these similar questions
(团)
(四)
The Dog class has a constructor that takes two parameters. The first parameter is a String
representing a dog's name and the second parameter is an int representing the dog's age, in months.
9
Mark for Review
ARC
The following code segment appears in a class other than Dog.
Which of the following best describes the contents of dog1 and dog2 as a result of executing this code
segment?
Dog dogl new Dog ("Rex", 4);
Dog dog2
dogl
dog1;
new Dog("Fido", 60);
dog1 and dog2 are Dog variables that each contain the same Dog object, which
represents a dog named "Fido' that is 60 months old.
dogl is a Dog variable that contains a Dog object representing a dog named
"Fido" that is 60 months old, and dog2 is a Dog variable that contains
a Dog object representing a dog named "Rex" that is 4 months old.
dogl and dog2 are Dog reference variables that each contain a reference to the
same memory address that contains the Dog object representing a dog named
"Fido' that is 60 months old.
dogl is a…
The following code segment is intended to assign to newword the result created by removing the first
occurrence of "a" from word. Assume that the String variable word has been properly declared
and initialized. This code segment works for some, but not all, values of word.
int aLoc
word.indexOf("a");
String newword word.substring(0, aLoc) + word.substring(aLoc + 1);
18
Mark for Review
Which of the following conditions best describes the condition in which this code segment will not work a
intended and will result in a runtime error?
is the first character in word.
is the last character in word.
word does not contain the character "a".
word contains only a sequence of multiple "a" characters.
Consider the following code segment, which is intended to create a String that consists of the last
character in word and assign it to the variable lastChar
String word / initialization not shown */;
// line 1
int len word.length();
// line 2
String lastChar word.substring(len);
// line 3
17
Mark for Review
Which of the following best describes why this code segment will not work as intended?
substring needs to be called with two parameters, so the method call in line
3 should be changed to word.substring(len, len + 1).
len is not the correct index of the last character in word, so the method call in
line 3 should be changed to word.substring(len - 1).
len is not the correct index of the last character in word, so the method call in
line 3 should be changed to word.substring(len + 1).
substring cannot be called with a variable as the parameter, so the method
call in line 3 should be changed to word.substring (word.length()).
ABC
Chapter 2 Solutions
Starting Out with Programming Logic and Design (5th Edition) (What's New in Computer Science)
Ch. 2.1 - Who is a programmers customer?Ch. 2.1 - What is a software requirement?Ch. 2.1 - What is an algorithm?Ch. 2.1 - What is pseudocode?Ch. 2.1 - Prob. 2.5CPCh. 2.1 - Prob. 2.6CPCh. 2.2 - Prob. 2.7CPCh. 2.2 - Prob. 2.8CPCh. 2.2 - What is a sequence structure?Ch. 2.2 - Prob. 2.10CP
Ch. 2.2 - Prob. 2.11CPCh. 2.2 - Prob. 2.12CPCh. 2.2 - Summarize three common rules for naming variables.Ch. 2.2 - Prob. 2.14CPCh. 2.2 - Look at the following pseudocode statement: Input...Ch. 2.2 - Prob. 2.16CPCh. 2.2 - Prob. 2.17CPCh. 2.2 - What two steps usually take place when a program...Ch. 2.2 - What does the term user-friendly mean?Ch. 2.3 - Prob. 2.20CPCh. 2.3 - When you assign a value to a variable, what...Ch. 2.3 - Summarize the mathematical order of operations, as...Ch. 2.3 - Prob. 2.23CPCh. 2.3 - Prob. 2.24CPCh. 2.4 - What two items do you usually specify with a...Ch. 2.4 - Does it matter where you write the variable...Ch. 2.4 - What is variable initialization?Ch. 2.4 - Prob. 2.28CPCh. 2.4 - What is an uninitialized variable?Ch. 2.7 - Prob. 2.30CPCh. 2.7 - Prob. 2.31CPCh. 2.7 - Prob. 2.32CPCh. 2 - A error does not prevent the program from running,...Ch. 2 - Prob. 2MCCh. 2 - A(n) _______ is a set of well-defined logical...Ch. 2 - An informal language that has no syntax rules, and...Ch. 2 - A ____ is a diagram that graphically depicts the...Ch. 2 - Prob. 6MCCh. 2 - Prob. 7MCCh. 2 - Prob. 8MCCh. 2 - Prob. 9MCCh. 2 - A(n) _____ is a message that tells (or asks) the...Ch. 2 - A(n) ________ sets a variable to a specified...Ch. 2 - In the expression 12 + 7, the values on the right...Ch. 2 - A(n) _____ operator raises a number to a power. a....Ch. 2 - A(n) _________ operator performs division, but...Ch. 2 - A(n) ____ specifies a variable's name and data...Ch. 2 - Assigning a value to a variable in a declaration...Ch. 2 - Prob. 17MCCh. 2 - Prob. 18MCCh. 2 - A debugging process in which you imagine that you...Ch. 2 - Prob. 20MCCh. 2 - Programmers must be careful not to make syntax...Ch. 2 - In a math expression, multiplication and division...Ch. 2 - Variable names can have spaces in them.Ch. 2 - In most languages, the first character of a...Ch. 2 - Prob. 5TFCh. 2 - In languages that require variable declarations, a...Ch. 2 - Uninitialized variables are a common cause of...Ch. 2 - The value of a named constant cannot be changed...Ch. 2 - Hand tracing is the process of translating a...Ch. 2 - Prob. 10TFCh. 2 - What does a professional programmer usually do...Ch. 2 - What is pseudocode?Ch. 2 - Computer programs typically perform what three...Ch. 2 - What does the term user-friendly mean?Ch. 2 - What two things must you normally specify in a...Ch. 2 - What value is stored in uninitialized variables?Ch. 2 - Design an algorithm that prompts the user to enter...Ch. 2 - Design an algorithm that prompts the user to enter...Ch. 2 - Write assignment statements that perform the...Ch. 2 - Assume the variables result, x, y, and z are all...Ch. 2 - Write a pseudocode statement that declares the...Ch. 2 - Write a pseudocode statement that declares the...Ch. 2 - Write a pseudocode statement that assigns the...Ch. 2 - Write a pseudocode statement that assigns the sum...Ch. 2 - Write a pseudocode statement that subtracts the...Ch. 2 - Write a pseudocode statement that multiplies the...Ch. 2 - If the following pseudocode were an actual...Ch. 2 - Prob. 12AWCh. 2 - If the following pseudocode were an actual...Ch. 2 - If the programmer translates the following...Ch. 2 - The following code will not display the results...Ch. 2 - Find the error in the following pseudocode....Ch. 2 - Find the error in the following pseudocode....Ch. 2 - Find the error in the following pseudocode....Ch. 2 - Find the error in the following pseudocode....Ch. 2 - Personal Information Design a program that...Ch. 2 - Sales Prediction A company has determined that its...Ch. 2 - Land Calculation One acre of land is equivalent to...Ch. 2 - Total Purchase A customer in a store is purchasing...Ch. 2 - Distance Traveled Assuming there are no accidents...Ch. 2 - Sales Tax Design a program that will ask the user...Ch. 2 - Miles-per-Gallon A cars miles-per-gallon (MPG) can...Ch. 2 - Tip, Tax, and Total Design a program that...Ch. 2 - Weight Loss If a moderately active person cuts...Ch. 2 - Amount Paid Over Time A person pays a fixed amount...Ch. 2 - Leftover Pizza Youre planning a pizza party and...Ch. 2 - Celsius to Fahrenheit Temperature Converter Design...Ch. 2 - Stock Transaction Program Last month Joe purchased...Ch. 2 - Cookie Calories A bag of cookies holds 40 cookies....Ch. 2 - Male and Female Percentages Design a program that...Ch. 2 - Ingredient Adjuster A cookie recipe calls for the...
Additional Engineering Textbook Solutions
Find more solutions based on key concepts
The boom supports the two vertical loads. Neglect the size of the collars at D and B and the thickness of the b...
INTERNATIONAL EDITION---Engineering Mechanics: Statics, 14th edition (SI unit)
This optional Google account security feature sends you a message with a code that you must enter, in addition ...
SURVEY OF OPERATING SYSTEMS
Why is the tool insulated in the ECM schematic?
Degarmo's Materials And Processes In Manufacturing
Big data Big data describes datasets with huge volumes that are beyond the ability of typical database manageme...
Management Information Systems: Managing The Digital Firm (16th Edition)
Assume a program has the following variable definitions: int units; float mass; double weight; and the followin...
Starting Out with C++ from Control Structures to Objects (9th Edition)
1‘21 Same as Problem 1.20, excepi the anicle should be
on safety as related to su rveying-
Elementary Surveying: An Introduction To Geomatics (15th Edition)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Consider the following code segment. String one String two "computer"; "science"; String concat / missing code */; System.out.println(concat); 2 16 Mark for Review ARC Which of the following expressions can be used to replace/missing code / so that the code segment prints the string "pun"? one.substring(3, 4) + two.substring(4, 4) one.substring(3, 5) + two.substring(4, 5) one.substring(4, 5) + two.substring(5, 5) one.substring(4, 6) + two.substring(5, 6)arrow_forwardPlease R show code and output for the following questions.arrow_forwardGo through Chapters 2-4 of the 9th edition of Foundations of Information Systems: What do you like or not like about the student registration process? Do you believe that a university should be allowed to monitor emails sent and received on the university computers? Why or why not? Support your answer. Is security a technical issue? A business issue? Both? Support your answer.arrow_forward
- Thank You Computer SciencePlease provide source code in C and also the state diagram in drawing form not text Design a state diagram to recognize one form of the comments of the C- based programming languages, those that begin with /* and end with */. Submission: a state transition diagram (no source code required) specifying all necessary components.arrow_forwardHello, Mistakely submitted blurr image please skip otherwise unhelpful. Computer science.arrow_forwardMistakely submitted blurr image please skip otherwise unhelpful. Computer science.arrow_forward
- Subject = Computer Science i mistakely submitted blurr image please skip it.arrow_forwardOR AND Neg-AND D A Output D A Output B D Output AB Output AB Output AB Output AB 00 01 10 00 00 01 10 10 11 NOR 11 10 |1|1 NAND Neg-OR B A Do A Output B Do A Output Output B AB Output AB Output AB Output 00 00 00 01 01 01 10 10 10 11 |11 XOR XNOR NOT A Output Output Output B B AB Output AB Output A Output 00 00 01 01 0 1 10 10 11 |1|1arrow_forwardData Representation Part 3 HW3 1. Convert each decimal number to its 9's complement (use as many digits as shown): a) 73 b) 40512 c) 980034 d) Perform subtraction using 9's complement: 5042-671 2. Convert the following decimal numbers to the 10's complement: a) 128 b) 4097 c) 56020 d) Perform subtraction using 10's complement: 3205-4879 3. Perform the following multiplications. Assume that all values are unsigned numbers. (No problem with unsigned (always positive) numbers, just use the same standard techniques as in base 10.) a) 10112 × 01012 b) 011012 × 001112 c) 1100102 × 10112 d) 10110102 x 111012 4. Perform the following multiplications. Assume that all values are signed 2's complement numbers. a) 11002 01112 b) 00102 x 10102 - first multiply without sign-extending (show the wrong result), then redo with proper sign-extension. c) 111002 × 000112 5. Perform the following divisions. Assume that all values are unsigned numbers. a) 1011012 ÷ 1102 b) 1000112 ÷ 1012arrow_forward
- From MATLAB Calculate the following scalars, matrices and vectors, using the matrices from problem 5. Outputs of the commands are required. (mean, sum, det, find, transpose (aka the apostrophe operator)arrow_forwardModify the car purchase algorithm presented in class (on Chapter 1's slide set) so that the gasprice is no longer a constant, but instead it is subjected to an inflation of 5% yearly. Run thealgorithm and tabulate the costs year by year. (No need to program in C++ for this problemunless you really want to. You can use a spreadsheet or hand calculations.) Which car is abetter deal and by how much? Explain your algorithm welll.arrow_forwardProblem 12. Consider the following grammar: <S> → a <S> c <B> | <A> | b <A> → c <A> | c <B> → d | <A> Which of the following sentences are in the language generated by this grammar? a. abcd b. acccbd c. acccbcc d. acd e. acccarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Programming with Microsoft Visual Basic 2017Computer ScienceISBN:9781337102124Author:Diane ZakPublisher:Cengage LearningProgramming Logic & Design ComprehensiveComputer ScienceISBN:9781337669405Author:FARRELLPublisher:CengageEBK JAVA PROGRAMMINGComputer ScienceISBN:9781337671385Author:FARRELLPublisher:CENGAGE LEARNING - CONSIGNMENT
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning

Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:9781337102124
Author:Diane Zak
Publisher:Cengage Learning
Programming Logic & Design Comprehensive
Computer Science
ISBN:9781337669405
Author:FARRELL
Publisher:Cengage

EBK JAVA PROGRAMMING
Computer Science
ISBN:9781337671385
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT

Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Introduction to Computers; Author: Tutorials Point (India) Ltd.;https://www.youtube.com/watch?v=-AP1nNK3bRs;License: Standard YouTube License, CC-BY
Computers for Beginners: Introduction; Author: Carson City Library;https://www.youtube.com/watch?v=jH8pgGfG9HY;License: Standard Youtube License