
Concept explainers
Conversion
Write a program that asks the user to enter a distance in meters. The program will then present the following menu of selections:
- 1. Convert to kilometers
- 2. Convert to inches
- 3. Convert to feet
- 4. Quit the program
The program will convert the distance to kilometers, inches, or feet, depending on the user’s selection. Here are the specific requirements:
- • Write a void method named showKi1ometers, which accepts the number of meters as an argument. The method should display the argument converted to kilometers. Convert the meters to kilometers using the following formula:kilometers = meters * 0.001
- Write a void method named showlnches, which accepts the number of meters as an argument. The method should display the argument converted to inches. Convert the meters to inches using the following formula:inches = meters * 39.37
- Write a void method named showFeet, which accepts the number of meters as an argument. The method should display the argument converted to feet. Convert the meters to feet using the following formula:feet = meters * 3.281
- Write a void method named menu that displays the menu of selections. This method should not accept any arguments.
- The program should continue to display the menu until the user enters 4 to quit the program.
- The program should not accept negative numbers for the distance in meters.
- If the user selects an invalid choice from the menu, the program should display an error message.
Here is an example session with the program, using console input. The user’s input is shown in bold.
Enter a distance in meters: 500 [Enter]
- 1. Convert to kilometers
- 2. Convert to inches
- 3. Convert to feet
- 4. Quit the program
Enter your choice: 1 [Enter]
500 meters is 0.5 kilometers.
- 1. Convert to kilometers
- 2. Convert to inches
- 3. Convert to feet
- 4. Quit the program
Enter your choice: 3 [Enter]
500 meters is 1640.5 feet.
- 1. Convert to kilometers
- 2. Convert to inches
- 3. Convert to feet
- 4. Quit the program
Enter your choice: 4 [Enter]
Bye!

Learn your wayIncludes step-by-step video

Chapter 5 Solutions
Starting Out with Java: From Control Structures through Objects (7th Edition) (What's New in Computer Science)
Additional Engineering Textbook Solutions
Starting Out with Python (4th Edition)
Mechanics of Materials (10th Edition)
Problem Solving with C++ (10th Edition)
SURVEY OF OPERATING SYSTEMS
Degarmo's Materials And Processes In Manufacturing
Starting Out with Java: From Control Structures through Data Structures (4th Edition) (What's New in Computer Science)
- A network administrator at Trendy Distributors identifies sensitive files being transferred from a Local Area Network (LAN) workstation to an unauthorised outside IP address in a foreign country. An investigation determines that the firewall has not been altered, and the anti-virus on the workstation is up-to-date. What could be the MOST likely explanation for this?arrow_forwardA network administrator at Trendy Distributors identifies sensitive files being transferred from a Local Area Network (LAN) workstation to an unauthorised outside IP address in a foreign country. An investigation determines that the firewall has not been altered, and the anti-virus on the workstation is up-to-date. What could be the MOST likely explanation for this?arrow_forwardThe software testers who perform an audit are given access to the Tech Distributors’ facility and network. The testers will not be given access to the details of the custom-developed software the customer uses. However, the testers will also have access to the source code for several open-source applications and networking equipment used at the facility. These items will be within the scope of the audit. Establish and describe the appropriate software testing methods for this audit.arrow_forward
- The security manager at TwoUp Technologies’ primary role is implementing cybersecurity functions and strategising how IT services should be governed to fulfil business needs. The IT and cybersecurity framework can shape company policies by providing procedures, activities, checklists, and technologies that should be implemented. Describe the four categories governing an organisation’s system or data asset to meet the CIA triad and non-repudiation properties.arrow_forwardA supply management director of Tech Distributors is sending a payment confirmation email to one of the organisation’s regional managers. The organisation experienced a security breach when the company network was attacked by one of the employees who had plugged in a virus-infected external storage device. The company experienced a data breach of confidential customer and supplier financial details. To improve communication security and prevent breaches in the future, all communications with regional offices must be encrypted. The director has sent the encrypted email message below to a regional manager. Delineate cryptography and use the ROT13 substitution cipher to decrypt the message. Cnlzrag unf orra rssrpgrqarrow_forwardA supply management director of Tech Distributors is sending a payment confirmation email to one of the organisation’s regional managers. The organisation experienced a security breach when the company network was attacked by one of the employees who had plugged in a virus-infected external storage device. The company experienced a data breach of confidential customer and supplier financial details. To improve communication security and prevent breaches in the future, all communications with regional offices must be encrypted. The director has sent the encrypted email message below to a regional manager. Delineate cryptography and use the ROT13 substitution cipher to decrypt the message. Cnlzrag unf orra rssrpgrqarrow_forward
- The security manager at TwoUp Technologies’ primary role is implementing cybersecurity functions and strategising how IT services should be governed to fulfil business needs. The IT and cybersecurity framework can shape company policies by providing procedures, activities, checklists, and technologies that should be implemented. Describe the four categories governing an organisation’s system or data asset to meet the CIA triad and non-repudiation properties.arrow_forwardTwoUp Technologies employees have been using simple, easy-to-remember passwords, opening the company software, and making the network vulnerable to attacks. The company has experienced network attacks and data breaches in the past year. To implement security control strategies, the security manager must identify security risks within the organisation. The security manager explained to management the impact of this vulnerability and recommended eliminating unsecured networks. Expound on the different local and remote methods that attackers can use to gain access to the company network. Give an example of each path.arrow_forwardModern cybersecurity threats have become sophisticated, making the ability to describe and analyse threat behaviour necessary. Describe how you would analyse cybersecurity threats in an organisation.arrow_forward
- Go through Chapter 1 of Ralph Stair's Fundamentals of Information Systems, 9th edition. Explain the benefits and drawbacks of doing a job search online in Chapter 1.arrow_forwardConsider the following information about the getTax method The method is a static method in the PurchaseManager class The method has one double parameter The method retums a double equal to its parameter times 0.08 The following code segment appears in another s PurchaseManager class double tax-ex(100.0); System.out.println(); Auto saved at 16:24:12 2 Mark for Review What if anything is printed as a result of executing the code segment O 8.0 108.0 Nothing is printed because the method call should be PurchaseManager.getTax(100.0 Nothing is printed because the retum value from getTax cannot be assigned to thearrow_forward9 Mark for Review ARC Consider the following method. public void doSomething() { } System.out.println("Something has been done"); Each of the following statements appears in a method in the same class as doSomething. Which of the following statements are valid uses of the method doSomething? I. doSomething(); II. III. B String output = doSomething(); System.out.println(doSomething()); I only I and II only I and III only I, II, and IIIarrow_forward
- EBK JAVA PROGRAMMINGComputer ScienceISBN:9781305480537Author:FARRELLPublisher:CENGAGE LEARNING - CONSIGNMENTProgramming Logic & Design ComprehensiveComputer ScienceISBN:9781337669405Author:FARRELLPublisher:CengageEBK JAVA PROGRAMMINGComputer ScienceISBN:9781337671385Author:FARRELLPublisher:CENGAGE LEARNING - CONSIGNMENT
- C++ Programming: From Problem Analysis to Program...Computer ScienceISBN:9781337102087Author:D. S. MalikPublisher:Cengage LearningProgramming with Microsoft Visual Basic 2017Computer ScienceISBN:9781337102124Author:Diane ZakPublisher:Cengage LearningMicrosoft Visual C#Computer ScienceISBN:9781337102100Author:Joyce, Farrell.Publisher:Cengage Learning,




