Program that prompts the user to enter blood sugar level

Assignment Help Basic Computer Science
Reference no: EM131428062

Write java program that prompts the user to enter blood sugar level after eating. The program should match the input sable and display one of options in the table below:

blood sugar level after eating Type of diabetes

Less than 140 Normal

140-199 Pre-diabetes

More than or equal to 200 Level 1 or level 2 of diabetes

Input:

- blood sugar level after eating

Output

- Type of diabetes

The program must include:

- Use Scanner to enter blood sugar level after eating

- Program class called Diabetes.

- Your name, your ED.. your group number as paragraph comments.

- Only soft copy file is accepted (no hard copy)

- File extension format must be .java (e.g. Diabetes Java) or notepad file .text (e.g. Diabetese.text)

Note 1: each student must submit the assignment alone (no group work required)

Note 2: each student must submit the assignment through blackboard

Distribution of marks:

- Correct Class name and void main lines (0.5 M)

- Correct lines of import Scanner, declaring new Scanner, saving variable, asking user to enter number of absent hours (1.5 M)

- Correct lines of if else/ switch (2 M)

- Correct lines for output ( 1 M)

Reference no: EM131428062

Questions Cloud

Results of naming and shaming : Do you think that the results of naming and shaming is related to the type of government? In other words, naming and shaming may be more effective in the United States, a democracy, while not effective at all in North Korea, a totalitarian countr..
Want more challenge-responsibility-recognition-advancement : While leaders commonly “want more challenge, responsibility, recognition, and advancement,” many “long to make an impact with their work” . How true is this statement of you as a current or prospective leader?
Comparing racial and class inequalities in childrens : Describing and comparing racial and class inequalities in children's academic performance. In this section, we will consider two sources of inequality-class and race
Explain the interlinking model of quality and profitability : Explain the interlinking model of quality and profitability (Exhibit 4.2 of the text). How does it connect to business and operations strategy? Can you provide any examples of goods and services that support and add credibility to this model? (cengag..
Program that prompts the user to enter blood sugar level : Write java program that prompts the user to enter blood sugar level after eating. The program should match the input sable - blood sugar level after eating Type of diabetes
Who is disrupting department productivity and morale : A manager would like to discharge an employee who is disrupting department productivity and morale, but this employee has a history of filing formal complaints against coworkers. How should HR proceed?
Baby needs a new crib : An on-line retailer that sells home and children’s items, such as children’s furniture, clothing, and toys, was seeking a way to reach a new audience and stop the declining sales and revenue trends it was suffering. Should the retailer pursue this ne..
Explain gordon allports approach to personality theory : Explain Gordon Allport's approach to personality theory. Describe Gordon Allport's theory of motivation and functional autonomy. Describe McCrae and Costa's Five-Factor Theory.Describe Eysenck's Biologically Based Factor Theory.
How relevant is an employees personality or credit history : After a potential predictor of employee performance is identified, it is necessary to observe its relationship with one or more criterion measure(s) of work related behaviors and/or performance. The criterion measures selected for employee perform..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Finds median of an unsorted array

Suppose we have a O(n) time algorithm that finds median of an unsorted array

  Effect of fragmentation and of compacting memory

Its a programming code, so as discussed its program source code, and all the working will be shown with the program running.In this exercise, we simulate a memory allocation (we just want to see the effect of fragmentation and of compacting memory..

  Managing cyber crime to protect business

Provide a scenario of a cyber crime by way of example that will demonstrate to your business a situation that might occur.

  What is primary security risk users acknowledge using macros

Write a 200- to 300-word response that answers the following question: Based on the article by Lenning (2005), what is a primary security risk that users should acknowledge when using macros?

  Define the consulting engagement approach

Define the consulting engagement approach. This will include a statement of the way the firm works with clients and how projects are managed.

  Draw the timing diagram for maximum concurrency

Draw the timing diagram for maximum concurrency given four-way interleaved memory.

  What about a 1024*768 pixel graphics screen

Assuming that it takes 2 nsec to copy a byte, how much time does it take to completely rewrite the screen of an 80 character ´ 25 line text mode memory-mapped screen? What about a 1024 ´ 768 pixel graphics screen with 24-bit color?

  Convert the following c-like code

Convert the following C-like code, which calculates the greatest conunon divisor (GCD) of the two 8-bit numbers a and b, into a high-level state machine.

  Compare and contrast the update styles of microsoft

From the e-Activity, compare and contrast the update styles of Microsoft's Internet Explorer and Google Chrome and determine which style you believe to be more effective for organizations. Justify your response.

  Different collection views provided by maps

What are the different collection views provided by Maps?

  Would you describe this distribution as symmetric or skewed

Would you describe this distribution as symmetric or skewed? Explain.

  Computer systems architecture

Windows hides most of its configuration in a binary file called a registry. Special Windows tools must be used to read and modify the registry. What are the advantages and disadvantages of this approach as opposed to using text-based configuration fi..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd