Highest and lowest temperatures

Assignment Help Basic Computer Science
Reference no: EM131069732

Write a program that uses a two-dimensional array to store the highest and lowest temperatures for each month of the year. The program should output the average high, average low, and highest and lowest temperatures of the year. Your program must consist of the following methods:

a. Method getData: This method reads and stores the data in the two-dimensional array.

b. Method averageHigh: This method calculates and returns the average high temperature of the year.

c. Method averageLow: This method calculates and returns the average low temperature of the year.

d. Method indexHighTemp: This method returns the index of the highest temperature in the array.

e. Method indexLowTemp: This method returns the index of the lowest temperature in the array.

(These methods must all have the appropriate parameters.)

Reference no: EM131069732

Questions Cloud

Create and populate a linkedlist : Create and populate a LinkedList using a one dimensional array. Add 6 numbers to this LinkedList. Search this LinkedList and find the smallest number.
What would you use to validate your forecasting model : How would you gather your data? What would you use to validate your forecasting model? Would you look at the forecasting errors? What program would you use to make your forecast (i.e. Excel or Excel QM)
Department names of the oracle departments : What are the department names of the Oracle departments that have the same location ID as Seattle?
Find the mode i and mode ii stress intensity factors : You may assume that the depth of the substrate beneath the punch is infinitely large.
Highest and lowest temperatures : Write a program that uses a two-dimensional array to store the highest and lowest temperatures for each month of the year. The program should output the average high, average low, and highest and lowest temperatures of the year. Your program must ..
Argue that tactics used by followers to get noticed : What do you say to those who argue that tactics used by followers to get noticed by their leader (such as impressions management, ingratiation, and selfpromotion) are shameful and self-serving and should be avoided?
What is dns : 1. How would you organize a network for an organization that had five departments? Where would you place the servers, both physically and logically? Specify the types of servers (e-mail, web, application, database, etc.) and provide some justific..
Movies dealing with the prison or college environment : Movies dealing with the prison or college environment often depict one or two prisoners or students who seem to have more influence over other prisoners or students than even the guards or administrators.
What is a hamiltonian cycle : write a two- to three-page paper that responds to each of the following questions: What is a Hamiltonian cycle? What is a Euler cycle? What is a minimum length Hamiltonian cycle

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Define the fibonacci binary tree of order n as follows

Define the Fibonacci binary tree of order n as follows: If n=0 or n=1, the tree consists of a single node. If n>1, the tree consists of a root, with the Fibonacci tree of order n-1 as the left subtree and the Fibonacci tree of order n-2 as the rig..

  Cloud computing and ip collapse

Cloud computing and IP Collapse. The use of cloud computing seems to be growing. Companies must be much more sensitive to their intellectual property (IP) assets in those situations,

  Each cycle in an instruction cycle

Suppose each cycle in an instruction cycle takes an average of 5 clock cycles. Determine the number of clock cycles needed to process 10 instructions without and with a pipeline

  A company without a history of project best practices

a company without a history of project best practices

  Discuss how a cyber warrior can use a social networking

Discuss the vulnerabilities associated with four of the ten networks described in your readings. Make sure you identify the network, potential vulnerabilities, and what the result could be from an attack against it.

  Outlining the key ideas and the sequence

First of all, you are to prepare a background paper on your overall topic, briefly outlining the key ideas and the sequence of learning from Foundation Year to Year 7, but focused on ‘locating' your particular sub-topic and learning objectives wit..

  Which of the following runs as a dedicated server only

Which of the following runs as a dedicated server only?

  What''s the difference between encoding, encryption

What's the difference between encoding, encryption, and hashing?

  You may have observed such a situation before a highly

you may have observed such a situation before a highly publicized and outrageous crime has taken place and the suspect

  Problem regarding different business functions

1. Companies generally need to use more than one information system to support all their different business functions. These functions are frequently referred to as either front- office information systems or back- office systems.

  Why would a manufacturer choose such a peculiar number

A certain computer can be equipped with 1,073,741,824 bytes of memory. why would a manufacturer choose such a peculiar number, instead of an easy-to-remember number like 1,000,000,000?

  Science question

Only those class members that are presented to the users of the class are part of the ______ of the class.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd