Answer:
14.0
Explanation:
(a) What are binary digits?
Answer: A binary digit, or bit, is the smallest unit of information in a computer.
Explanation:
The value of a bit is typically stored above or below an allocated level of an electrical charge within a capacitor inside a memory module. For devices that use positive logic, value 1 (true value or high) is positive voltage relative to the electrical ground and value 0 (false value or low) is 0 voltage.
https://www.techopedia.com/definition/2678/binary-digit-bit
I need this now!
Which term best describes a network device?
A server running an email application
A node on the network whose purpose is to control or direct network traffic
A tablet streaming a movie
A computing device using a network
i need big help so everyday my computer add new tabs when im working and what i do is check for viruses and watch vidoes how to fix and it dosent work i even resatrt my computer and scan for malware what shoul i do? and every day i fix it but then the next day it happens again pls help. and dont tell me to get a computer.
Answer:
1 Broken or malfunctioning keyboard: A broken key in your keyboard or a malfunctioning keyboard can cause such issues.
2 Problematic Keyboard Drivers: Outdated or corrupted keyboard drivers may trigger actions that make your computer alt tab on its own.
3Problematic Graphics Drivers: Corrupted graphics drivers may bug the overlay, which is likely why your games keep alt tabbing.
4Virus Or Malware: Virus and malware are known to take over applications and make them behave wierdly. This can be one of those situations.
5 A Task is running in the background: A task may be running in the background while you are playing a game on fullscreen. This may bug the task window and make it alt tab every few seconds.
6Background applications and services: Similar to a task running in the background, other applications, and services running in the background can also get bugged and alt tab on their own.
7Corrupted system files and outdated Windows: Outdated Windows and corrupted system files are also known instigators for such issue.
have great day
factors to consider when selecting a requirement gathering method in software requirements
Answer:
They may describe such factors as encryption, security, hosting, environment, disaster recovery, business continuity
They may describe such factors as encryption, security, hosting, environment, disaster recovery, business continuity.
What is software development?A set of computer science activities dedicated to the process of creating, designing, deploying, and supporting software is referred to as software development.
The set of instructions or programs that tell a computer what to do is known as software. It is hardware-independent and allows computers to be programmed.
Domain experience, platform experience, programming language experience, problem solving ability, educational background are the suggest five factors that might be considered when selecting people for a software development team.
Operating systems, disk management, utilities, hardware management, and other operational necessities are provided by system software.Text editors, compilers, liners, debuers, and other code creation tools are provided by programming software.
Therefore, They may describe such factors as encryption, security, hosting, environment, disaster recovery, business continuity.
Learn more about disaster on:
https://brainly.com/question/13154257
#SPJ2
Write an algorithm that determines the square root of a number
The Square Root Algorithm
Pairing: Starting from the right, group the digits of the given number in pairs of two. Initial guess: Start with the leftmost group.Note down the number obtained from the previous step at the top. Now, bring down the next group's digits next to the remainder. Hit and trial:What is Square Root Algorithm?The way the square root technique is set up, we can calculate the square root of a number as (X + R)2. It is evident that (X + R) is this number's square root. R denotes the remaining portion of the number after the approximation, and X denotes the current square root approximation.
Using the square root function, you can convert rational numbers into algebraic numbers (which are a subset of rational numbers). The Euclidean norm (and distance) and generalisations like Hilbert spaces both depend on the square root of a nonnegative number.
TO learn more about square root visit:
https://brainly.com/question/3120622
#SPJ10
The Web Engineering methods landscape encompasses a set of technical tasks that enable a Web engineer to understand, characterize, and then build a high-quality Web Applications. Discuss the following Web Engineering methods:
a) Communication methods.
b)Requirements analysis methods.
c) Design methods.
d) Construction methods.
e) Testing methods.
Answer:
A
Explanation:
I did the test,
answer in java.
Write a class named TestScores. The class constructor should accept an array of test scores as its
argument. You will need to do a deep copy of the array, don’t just copy the address of the array. The
class should have a method that returns the average of the test scores. If any test score in the array is
negative or greater than 100, the class should throw an IllegalArgumentException.
Write an exception class named InvalidTestScore. Create a setScores() method in TestScores which
accepts an array of test scores. Validate each item in the array and if any test score in the array is
negative or greater than 100, the class should throw an InvalidTestScore Exception.
Next create another method in TestScore called getScoresFromFile(). This method should open a file
that you created in Notepad and it should contain a list of test scores, some valid and others not. Read
in each of these test scores and store into an array. The first entry in the file should be the number of
scores that should be read. This number should be used to properly create the test score array. The
method should properly handle the potential FileNotFoundException. If file does not exist the program
should stop and exit with your own error message. As each score is read from the file (use nextInt())
throw either an IllegalArgumentException or an InvalidTestScore if the number read is not between 1
and 100 inclusive. You also need to handle an InputMismatchException. This means that either a
string was encountered or a floating-point number was encountered while reading the file. When this
happens issue an error message, but continue processing the file until you reach end of file. Note:
When this happens the entry you will add to the test score array will contain 0. How you accomplish
this is up to you. Feel free to discuss with your instructor.
Demonstrate all this functionality in a main() program
Using the knowledge of computational language in JAVA it is possible to write a code that a class named TestScores. The class constructor should accept an array of test scores as its argument.
Writting the code:import java.util.Scanner;
class TestScores
{
int scores[];
TestScores(int array[])
{
scores=new int[array.length];
for(int i=0;i<array.length;i++)
{
scores[i]=array[i];
}
}
double calAverage()
{
double avg;
int sum=0;
for(int i=0;i<scores.length;i++)
{
sum=sum+scores[i];
}
avg=sum/scores.length;
return avg;
}
}
class TestDriver
{
public static void main(String args[])
{
try
{
Scanner s=new Scanner(System.in);
int count;
System.out.print("Enter number of test scores : ");
count=s.nextInt();
int array[]=new int[count];
System.out.println("\nEnter test scores ");
for(int i=0;i<count;i++)
{
array[i]=s.nextInt();
if(array[i]<0||array[i]>100)
{
throw new IllegalArgumentException("Test scores must have a value less than 100 and greater than 0.");
}
}
TestScores ts=new TestScores(array);
double avg=ts.calAverage();
System.out.println("\n Test Scores average is : "+avg);
}catch(IllegalArgumentException e)
{
System.out.println(e.getMessage());
}
}
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
Please help
When communicating online, it is important to understand there is no vocal tone or body language, as there is in face-to-face conversation. What are some things you can do when communicating online to maintain appropriate netiquette? Use details to support your answer.
Need this now!!
Write 10 python calculations using a variety of operations. Have a real-life purpose for each calculation.
For example, one calculation could be determining the number of gallons of gas needed for a trip based on the miles per gallon consumed by a car.
Sample code in a program:
print("A field 30 feet wide and 40 feet long. Area (square feet): ", area)
Sample output:
A field 30 feet wide and 40 feet long. Area (square feet): 120
Using the knowledge of computational language in python it is possible to write a code that could be determining the number of gallons of gas needed for a trip based on the miles per gallon consumed by a car.
Writting the code:# Calculate Miles Per Gallon
print("This program calculates mpg.")
# Get miles driven from the user
miles_driven = input("Enter miles driven:")
# Convert text entered to a
# floating point number
miles_driven = float(miles_driven)
# Get gallons used from the user
gallons_used = input("Enter gallons used:")
# Convert text entered to a
# floating point number
gallons_used = float(gallons_used)
# Calculate and print the answer
mpg = miles_driven / gallons_used
print("Miles per gallon:", mpg)
See more about python at brainly.com/question/18502436
#SPJ1
Can you help me solve this with the proper code?
def __init__(self,num_mins,num_messages):
self.num_mins=0
self.num_messages=0
Add the 3 program comments at the top of the program with the information needed:
Name:
Date:
Program:
Set appropriate variables for the maximum and minimum order amounts
Set an appropriate variable for the price per pound of 7.99
Get the order amount input and cast to a number and store it in a variable (Since it can contain decimals, what kind of number cast should you use?)
Write an if structure that compares the input value with the minimum and maximum values according to the creiteria below:
if over the maximum of 100 return a message indicating that
if under minimum of 0.25 return a message indicating that
if within the allowed range return a message with the calculated price rounded to 2 decimal places!
Test your program extensivel and compare with the example output below
#include <bits/stdc++.h>
typedef long double d;
int main(int argc, char* argv[]) {
d a=0.25,b=100,c;
std::cout << "Enter amount: "; std::cin>>c;
if(c>b) std::cout << "Huge amount!";
else if(c<a) std::cout << "Insufficient amount!";
else std::cout << "The price is: $" << std::ceil((c*7.99)*100.0)/100.0 << std::endl;
return 0;
}
For Python code, check the attachments.Which key in is used in combination with another key to perform aspecific task
Answer:
control key
Explanation:
the control key modifies the function of the key with which it is pressed in combination
please i need help asap i will mark brainlest
Which of the following are notes which can be electronically entered into documents without changing the content of the document?
Question 1 options:
Comparisons
Comments
Changes
Reviews
Comments are notes which can be electronically entered into documents without changing the content of the document. Thus, the correct option for this question is B.
What are the characteristics of word documents?The characteristics of word documents are as follows:
It allows a user to construct professional write-ups.It has editing and formatting tools that modify the existing documents.It authorizes the user to insert charts, tables, diagrams, etc. within the document to make it more attractive.In this question, the significance of a comment is better understood by the fact that it represents the notes a reader can normally insert within the existing document in order to modify or highlight the required text in the document.
Therefore, comments are notes which can be electronically entered into documents without changing the content of the document. Thus, the correct option for this question is B.
To learn more about Documents, refer to the link:
https://brainly.com/question/1218796
#SPJ1
hello bbmb vhnvjv jhgvjjgvkv
Drag the tiles to the correct boxes to complete the pairs.
Match each task to the type of control structure represents.
switch case
sequence
repetition
if else
assembling structure step by step
choosing between two subjects
selecting a color out of five colors
testing a product until free of bugs
Answer:
A structure choosing between two subjects - Switch case sequence
Selecting a color out of five colors - If else assembling
Testing a product until free of bugs - Repetition
Steps of
Steps of Diagram and remove cables inside a computer
Based on the image of the Steps of Diagram and remove cables inside a computer, the arrangement in the right order are 5-2-3-6-1-4:
5 Back up data.
2. Press and hold power button.
3 Power down system .
6 Unplug computer.
1. Open case cover Instruction.
4 Clip ESD strap to case.
What is the computer cable removal about?The first thing to do is to disconnect the computer's power line from the wall and the power supply, then turn off the device's power. Find every screw holding the side panels to the computer's rear. For the case, there could be one to six screws. From the case, remove the side panels.
Make sure to put on a wrist strap that is antistatic. Connect the conductor's other end to the wristband. Attach the conductor's opposite end with a clip to a metal, unpainted portion of the case.
Lastly, also find the power source, then carefully unplug any motherboard power connections. Any case fans, video cards, and any other connections to which the power cords were attached should be disconnected. Find and remove each and every screw holding the power source.
Learn more about computer cables from
https://brainly.com/question/898009
#SPJ1
Malware refers to any malicious software designed to harm a digital host examples of malware include viruses, adware, and, spyware
Malware refers to any malicious software designed to harm a digital host examples of malware include viruses, adware, and, spyware: True.
What is a malware?A malware simply refers to any type of software program or file that is designed and developed to be intentionally harmful to the host computer, website, server, or network, especially for the purpose of wreaking havoc, disruption, and destruction such as a Trojan.
The examples of malware.In Computer technology, some examples of malware include the following:
VirusesTrojansZombiesRootkitWormsAdwareSpywareIn conclusion, we can reasonably infer and logically deduce that a malware is designed and developed to cause harm to a digital host.
Read more on malware here: brainly.com/question/17209742
#SPJ1
Complete Question:
Malware refers to any malicious software designed to harm a digital host examples of malware include viruses, adware, and, spyware. True or False
A while loop reads characters from input. Write an expression that executes the while loop until character 's' is read.
An expression that executes the while loop until character 's' is read is given below:
The Expression// Takes character input, tallies periods, stops on dollar sign
#include <iostream>
using namespace std;
int main() {
char i; // input received
int j = 0; // counter for # of periods
cout << "This program will accept single-character entries and report the number of periods you've entered.\n";
for (;;) {
do {
cout << "Please enter a single character, using $ to stop: ";
cin >> i;
if(i == '.')
j++;
} while(i != '$');
if(i == '$')
cout << "Total number of periods entered is " < < j < < " .";
break;
}
return 0;
}
Read more about programming here:
https://brainly.com/question/23275071
#SPJ1
You see a picture of three people having fun in an IG post. Beneath the photo is a text about a prty. You wrongly assume this picture was taken at a prty when it was actually taken during a family dinner. This type of misunderstanding is an example of
From the information given this type of misunderstanding is an example of: Communication Barrier.
What are communication Barriers?Communication obstacles prohibit us from accurately receiving and accepting the messages used by others to transmit their information, thoughts, and ideas. Communication difficulties include information overload, selective perceptions, workplace gossip, semantics, gender disparities, and so on.
It is to be noted that the Assumption that you comprehend what the other person is saying is one of the most significant communication barriers. People frequently make assumptions based on their own experiences and interpretations. You don't always know you're not talking about the same subject.
Learn more about Communication Barrier:
https://brainly.com/question/8588667
#SPJ1
Answer:
error, i think.
An attacker discovered an input validation vulnerability on a website, crafted a URL with additional HTML code, and emailed the link to a victim. The victim unknowingly defaced (vandalized) the web site after clicking on the malicious URL. No other malicious operations occurred outside of the web application’s root directory. This scenario is describing which type of attack?
This scenario is describing attack of:
Computer BotsCommand & ControlWhat are computer bots?A computer programme known as a "bot," short for robot, executes automatic, repeated operations. Usually, bots mimic or take the place of human users. As automated systems, they perform tasks considerably more quickly than do consumers who are humans.
Which types of bots are there?Bots come in two flavours: good bots and bad bots, both of which are relevant to web security. Both make attempts to use web resources (such as websites, web applications, APIs, etc.) or carry out other normal human user actions on the web, but for quite different reasons.
How do computer bots work?A bot (short for robot) is a software application programmed to perform tasks through Robotic Process Automation, or RPA. Bots work by automatically going through a set of instructions, and they carry out tasks and processes much faster, more accurately, and at a higher volume than it would otherwise take humans.
What is computer bots malware?Here's a quick malicious bot definition: A malicious bot is an automated malware program that can infect a system, steal data, or commit other fraudulent activities.
To learn more about computer bots visit:
https://brainly.com/question/28540266
#SPJ10
Answer: (D) Cross-site scripting (XSS)
Explanation: Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
Some one please help me
It should be noted that:
the Cabling for 1000BASE-T Ethernet standards is RJ-45 Connector.the cable for ethernet standards 10GBase-SR is Copper for Fiber cabling. It must be an SPF+, multi-mode fiber cable with an 850 nm laser. This is the most often utilized cable in fiber-based 10 GbE networks. SR stands for "Short Range," and depending on the generation of MMF, it can run up to 400 m.The cable for WAN Link is CAT5e or CAT6 cable.The cable for ethernet standard 100base-t is an RJ-45 cable for physical linkage and supports segment lengths of up to 100 meters.What are the Ethernet standards?The IEEE Standard 802.3 Ethernet standard was created by the Institute of Electrical and Electronic Engineers (IEEE). This standard outlines how the pieces of an Ethernet network communicate with one another as well as the rules for creating an Ethernet network.
IEEE 802.3 is a standards body and a set of standards that define wired Ethernet's physical layer and data link layer media access control. The standards are developed by the Institute of Electrical and Electronics Engineers' working group.
Learn more about Ethernet Standards:
https://brainly.com/question/13267410
#SPJ1
3. What is a process in software engineering
Some one please help me
Answer:
Makes no sense
Explanation:
Que tecnología son afectadas por digital trust?
Estas 4 tecnologías de confianza digital monitoreo basado en IA, confianza de datos, cadena de bloques y tecnologías cuánticas pueden ser útiles cuando se usan en conjunto, ayudándolo a mejorar la reputación de su marca al proteger sus datos, además de mejorar y optimizar sus procesos.
(Monitoreo basado en IA, fideicomisos de datos, blockchain y tecnologías cuánticas)
what is a network card?
For each of the following questions, be sure to choose not only the correct answer but the *canonically correct* answer. There may be one or more answers which are correct, but some of those answers may not be conventional use.
Question 1 (1 point)
Which of the following will allocate a buffer suitable for 4 integers?
Question 1 options:
int *ptr = (int *)malloc(sizeof(int) * 4);
int *ptr = (int * 4)malloc(sizeof(int));
int *ptr = (int *)malloc(4);
int *ptr = malloc[4];
Question 2 (1 point)
For the following program, which satement best fits as a parameter for the printf() call?
#include
typedef union u_foo {
int iValue;
float fValue;
} Foo;
void main(int argc, char **argv) {
Foo foo;
foo.iValue = 42;
printf("The value of foo is %d\n", );
}
Question 2 options:
foo.fValue
foo.iValue
(&foo)->iValue
(*(&foo)).iValue
Question 3 (1 point)
In the following makefile, what is the target `foo` dependent upon?
all: foo
foo: foo.c
gcc -o foo foo.c bar.c
bar: bar.c
gcc -o bar bar.c
clean:
rm foo bar
Question 3 options:
foo.c and bar.c
bar
all
foo.c
Question 4 (1 point)
For the following header file, which statement best declares a function that takes 2 integer parameters?
#ifndef SOMETHING__H
#define SOMETHING__H
#endif // SOMETHING__H
Question 4 options:
int foo(int a, int b);
extern int foo(int a, int b);
extern int foo(int *a, int *b);
static int foo(int a, int b);
Question 5 (1 point)
For the following program, what line is best applied to release the allocated memory?
#include
int main(int argc, char **argv) {
char *buf = malloc(32);
// assume buf is used appropriately here
}
Question 5 options:
release(buf);
free(buf);
free(32);
delete(buf);
Question 6 (1 point)
In the following program, which statement will properly copy the contents of `foo` to `bar`?
#include
#include
#include
int main(int argc, char **argv) {
char *foo = "This is a statement of intent";
char bar[16];
memset(bar, 0, 16);
}
Question 6 options:
memcpy(bar, foo, 15);
strncpy(bar, foo, 16);
strcpy(bar, foo);
strcpy(foo, bar);
Question 7 (1 point)
For the following program, which statement best fits as a parameter for the printf() call?
#include
typedef struct t_foo {
int value;
} Foo;
void main(int argc, char **argv) {
Foo foo = { 42 };
Foo *pFoo = &foo;
printf("The value of foo is %d\n", );
}
Question 7 options:
pFoo->value
*pFoo->value
pFoo.value
(*pFoo).value
Question 8 (1 point)
For the following program, which statement best fits as a parameter for the printf() call?
#include
typedef struct t_foo {
int value;
} Foo;
void main(int argc, char **argv) {
Foo foo = { 42 };
printf("The value of foo is %d\n", );
}
Question 8 options:
(*foo).value
foo->value
*foo.value
foo.value
Question 9 (1 point)
For the following header file, which line of code is missing?
#ifndef SOMETHING__H
extern int foo;
#endif
Question 9 options:
#define SOMETHING__H
// SOMETHING__H
static int foo();
typedef foo something;
Question 10 (1 point)
What is the size in bytes of the following structure?
struct t_foo {
int bar: 6;
int baz: 5;
int bat: 2;
};
Question 10 options:
12
13
16
2
Question 11 (1 point)
For the following program, what is the best way to get a block of memory on the heap for the variable `foo`?
#include
typedef struct t_foo {
int value;
} Foo;
void main(int argc, char **argv) {
Foo *foo = ;
}
Question 11 options:
malloc(sizeof(t_foo))
malloc(8)
{ 42 }
malloc(sizeof(Foo))
Question 12 (1 point)
For the following program, which line of code will place the contents of the file into the memory for the variable `buf`?
#include
void main(int argc, char **argv) {
FILE *fp = fopen("somefile.txt", "rt");
int fsize = // ASSUME WE GET THE SIZE OF THE FILE HERE
char buf[128];
// MORE PROGRAM CODE HERE
}
Question 12 options:
fread(fp, buf, fsize)
fread(buf, fp, fsize, 1)
fread(fp, fsize, buf, 1)
fread(buf, fsize, 1, fp)
Question 13 (1 point)
For the following program, which line of code will get the size of the file in question?
#include
void main(int argc, char **argv) {
FILE *fp = fopen("somefile.txt", "rt");
fseek(fp, 0, SEEK_END);
fseek(fp, 0, SEEK_SET);
}
Question 13 options:
int fsize = ftell(fp);
int fsize = fp.position;
int fsize = ftell(&fp);
int fsize = fread(fp, 1);
Question 14 (1 point)
For the following program, which is the best type for the variable `next`?
#include
typedef struct t_foo {
int value;
next;
} Foo;
void main(int argc, char **argv) {
Foo foo;
}
Question 14 options:
struct t_foo
Foo
struct t_foo*
Foo *
Question 15 (1 point)
In the following program, what is the value of `*ptr`?
#include
int main(int argc, char **argv) {
int foo[] = { 0, 1, 2, 3, 4 };
int *ptr = &foo;
do {
++ptr;
} while (!ptr);
}
Question 15 options:
foo[1]
2
0
1
Answer:
12
Explanation:
enters integral values
What is SDLC & Agile Development
Effective PivotCharts should include as many metrics as possible.
O True
O False
It is true that effective pivot charts should include as many metrics as possible. Hence, the statement is true.
What is a Pivot Chart?A PivotTable to compile, examine, research, and display summary data In order to help you quickly see comparisons, patterns, and trends, PivotCharts add visualizations to the summary data in a PivotTable. You can use both pivot tables and pivot charts to make well-informed judgments regarding important business data.
You can connect to PivotTables in order to access other data sources such SQL Server tables, SQL Server Analysis Services cubes, Azure Marketplace, Office Data Connection (.odc) files, XML files, Access databases, and text files. Additionally, you can create new tables by utilizing already-existing pivot tables.
To get more information about Pivot Chart :
https://brainly.com/question/13198104
#SPJ1
Prompt the user to enter two words and a number, storing each into separate variables. Then, output those three values on a single line separated by a space
The coding for completing the program is by using two words and a number, storing each into separate variables.
What are variables?In coding or any computer language like python, the variables are the things that are taken in the subject.
def userdetails():
words = input("Enter a word: ")
word2 = input("Enter a word: ")
numm = input("Enter a number: ")
pw1 = words+"_"+word2
pw2 = numm+words+numm
print("You entered: {} {} {}" .format(words,word2,numm))
print("First password:",pw1)
print("Second password:",pw2)
print("Number of characters in",pw1,":",len(pw1))
print("Number of characters in",pw2,":",len(pw2))
Thus, the code for given words and numbers is given above.
To learn more about variables, refer to the below link:
https://brainly.com/question/14679709
#SPJ1
Design a flowchart and code for a program that tabulates contributions collected by an organization. The organization wishes to accept contributions until a total of $10,000,000 is met. Once this total is hit, no further contributions should be accepted.
The organization wants the program to read data from an input file (input.in). The following data should be written to a file called results.out
a.The total number of contributions needed to meet the goal of 10 million dollars
b.The amount of the largest and smallest contribution accepted
c.The average contribution size
d.The final total of the contributions accepted
In this exercise we have to use the knowledge of computational language in JAVA to write a code that Design a flowchart and code for a program that tabulates contributions collected by an organization.
Writting the code:import java.io.*;
import java.util.Random;
import java.util.Scanner;
class Contribution {
public static void main(String[] args) {
String fileInput = "contributions.txt"; // input file
String fileOutput = "results.out"; // the output file to write the result
final double UPPER_LIMIT = 10000000; // declare constant for 10,000,00
double min = 0, max = 0;
double contribution, total = 0;
int counter = 0;
try {
// read the input file using scanner class
Scanner fileReader = new Scanner(new File(fileInput));
// loop as long total contribution is less than max there are contributions in the file
// read line by line
while (fileReader.hasNextDouble() && total < UPPER_LIMIT) {
// read the contribution amount from the file
contribution = fileReader.nextDouble();
// increment counter
counter += 1;
// update the min value
if (counter == 1 || min > contribution) min = contribution;
// update the max value
if (counter == 1 || max < contribution) max = contribution;
// running total of all contribution so far
total += contribution;
}
// close the input file
fileReader.close();
// write the data to the output file now
double average = total / counter;
FileWriter writer = new FileWriter(new File(fileOutput));
writer.write(String.format("It took %d contributions to reach the goal.\r\n", counter));
writer.write(String.format("The maximum contribution received was $%,.2f\r\n", max));
writer.write(String.format("The minimum contribution received was $%,.2f\r\n", min));
writer.write(String.format("The average contribution received was $%,.2f\r\n", average));
writer.write(String.format("A total of $%,.2f was collected.\r\n", total));
writer.flush();
writer.close(); // close the output file
} catch (IOException e) {
System.out.println("Error: could not read/open file: " + fileInput);
}
}
}
See more about JAVA at brainly.com/question/12975450
#SPJ1