After entering 2 in the priceJTextField and 14 in the hammersJTextField, a user clicks the JButton named calculateJButton to calculate the total price for the specified number of hammers. What is the result of the click, given the following code?

```
1 private void calculateJButtonActionPerformed( ActionEvent event )
2 {
3 totalPriceJTextField.setText( String.valueOf(
4 Integer.parseInt( priceJTextField.getText() ) *
5 Integer.parseInt( hammersJTextField.getText() ) ) );
6
7 } // calculateJButtonActionPerformed
```


This event handler reads the two values entered (2 and 14), and converts them from text into integer values, multiplies those two integers, converts the result of the calculation into text and uses that text to set the text property of totalPriceJTextField. The value dis- played is 28.

Computer Science & Information Technology

You might also like to view...

You can use the Relationships group on the ____ tab to create, view, and modify relationships between the tables in a database.

A. DATABASE B. DATABASE TOOLS C. TABLES D. DETAILS

Computer Science & Information Technology

List the limitations on the amount of information leaked per second through a covert channel in a multiaccess computing system

What will be an ideal response?

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 1: Human Resources ApplicationAn application used by the human resources (HR) department needs to be improved. You need to use various string manipulation properties and methods to ensure all data entered by a user are accurate and stored correctly. In order to remove both dashes from the SSN, you should first ____.

A. use the Length property to see how many characters are in the variable B. use the index value to loop to examine each character in the variable, character by character C. use the Contains method to see if any dashes are anywhere within the variable D. use the Insert method to insert dashes

Computer Science & Information Technology

What process involves using or manipulating people inside the networking environment to gain access to that network from the outside?

A. Internal virus B. Inside attack C. Hacking D. Social engineering

Computer Science & Information Technology