Part 1. Create a new package named HW6. Create an abstract Parent Class named "Watch" based on the UML in the package HW6. Add comments stating where data fields, constructors, toString() and other methods(if any).
Q: SELECT P.BRAND_ID, B.BRAND_NAME, B.BRAND_TYPE,MAX(AVGPRICE) FROM LGPRODUCT P INNER JOIN LGBRAND B ON…
A: Given: SELECT P.BRAND_ID, B.BRAND_NAME, B.BRAND_TYPE,MAX(AVGPRICE) FROM LGPRODUCT P INNER JOIN…
Q: Consider the company's database schema we have been discussing Employee (NationallD., FName, MName,…
A: The SQL query to obtain the names of all managers born in December is shown below.
Q: er the grammar define ng production IP * Q + QIR
A:
Q: A wide variety of diagnostic tools and fundamental utilities are available for use in network…
A: Given: Standard tools control and diagnose network issues. How would you debug a workstation's…
Q: Is there a specific reason why a company shouldn't have a wide range of information systems to pick…
A: I was given the following: What difficulties arise from the enterprise's use of various information…
Q: Perform the Encryption for the Hill Cipher where the Plain text: "POH" and the key is: "GYBNQKURP".
A: The solution is given below with step by step explanation
Q: Give a specific instance of a sensor that might be used in a mobile device.
A: Introduction: The following are examples of sensors found in mobile devices:Motion Sensors: Motion…
Q: How to change this SQL query to PL\SQL command line or code? SELECT username, account_status FROM…
A: logic:- declare a variable of rowtype from dba_users open a cursor c1 and store all record from…
Q: Differentiate between an OS with system calls and one without system calls. Why and how would you…
A: Definition: First of all, let's talk about how the operating system works. It's an active system…
Q: However, we are not qualified to talk about the inner workings of operating systems and how they…
A: In general, a process is defined as a thing that symbolizes the primary task that will be carried…
Q: What is the overarching concept that must be adhered to when developing the microkernel of an…
A: Given: What is the fundamental of principle of the microkernel? What distinguishes modular the most?…
Q: If the request is too large to fit in the cache, the CPU will send it to the main memory, and the…
A: Given: So, precisely what should happen when a processor sends a request that fails to be fulfilled…
Q: a) Explain why you think Assembler is better than a compiler and why you think a high-level language…
A: Assembly language program runs faster. Writing of assembly language programming is easy.
Q: what is the code in STATA to decompose hidden poverty?
A: NOTE :- Below i explain the answer in my own words by which you understand it well. The…
Q: Evaluate and debate the various Al methods now in use. Provide evidence for your arguments and do it…
A: methods using artificial intelligence : There are four distinct approaches. machines that react…
Q: Put up a list of all the web resources that facilitate your interaction. You just have a few phrases…
A: People use the Internet's services to talk to each other, do business, market their products,…
Q: Companies may find it difficult to reach a consensus on what features constitute a hack or a virus.
A: Given: A hacker is a skilled programmer who knows much about computer operating systems. These…
Q: Think the PDCA Cycle is useful? What are the permitted applications?
A: Electronic data transfer (EDI): EDI is the electronic exchange of business information in a standard…
Q: Based on the names of the classes, which of these Derived Class - Base Class pairs makes the most…
A: The solution is given below with explanation
Q: Analyze the threats and attacks in the context of information security. Provide concrete evidence to…
A: A threat is a potential security risk that could take advantage of a system's or asset's weakness.…
Q: The Access Security Software protects your data by doing what exactly?
A: Definition: The intention is to provide users access to just the information that has been…
Q: Does the company you work for employ a common firewall design? Why? Explain.
A: Introduction: The Screened Subnet Firewall is the most popular form of firewall currently in use…
Q: Problems may arise from implementing a data system that isn't connected to others.
A: Information technology (IT): It is a sociotechnical organizational framework for data collection,…
Q: To what extent are organizations obligated to implement specific plans in the event of a security…
A: Security Violation: It occurs when an organization's basic security mechanisms are circumvented,…
Q: 6. Assume the names variable references a list of strings. Write code that determines whether 'Ruby'…
A: Since you have asked multiple question we will answer the first one only according to the…
Q: Explanation of the OS's two main functions.
A: Introduction: Once a boot programme has loaded the necessary system files, the remainder of the…
Q: A catastrophic event may have an effect on the cloud computing market. I'm curious as to what…
A: Reboots, network failures, and downtime may happen in the cloud, just like everywhere else. These…
Q: Correct and detailed answer will be Upvoted In C Question: How can the function,…
A: The function, matrix_initialize_unopt, be optimized in the given below code in C programming.
Q: Problem 4: For each degree sequence below, determine whether there is a graph with 5 vertices that…
A: Graph: Graph is a non-linear data structure. It consists of vertices and edges. A graph can be…
Q: How can the most vital components of a cybersecurity architecture be shielded from intrusion?
A: Introduction: to talk about the essential components of the architecture for cyber security and how…
Q: Create an activity diagram that instructs the soda vending machine above to sell the correct soda to…
A: Create an activity diagram that instructs the soda vending machine above to sell the correct soda to…
Q: We will start with a high-level overview of real-time OSes and then move on to more specific…
A: Continuity of operation in real time: It's common practise when a flood of events must be received…
Q: An introduction to Internet of Things (IoT) security, including the nature of loT network attacks…
A: Introduction The Internet of Things (IoT) provides software tools and compatible communication…
Q: In the process of designing the microkernel of an operating system, what should serve as the guiding…
A: Given: What principle underlies the development of the microkernel in an operating system? What…
Q: NAND2TETRIS HARDWARE SIMULATOR (HARDWARE DESCRIPTION LANGUAGE (HDL)) implement simplified Z80…
A: Check next step for the solution
Q: You'll find concise explanations here of the two most crucial elements of operating system…
A: Running System: The operating system on a computer is software. A piece of software called an…
Q: Use a weighted the Colley Method which ranks games won (loss) early in the season as 0.5 wins…
A: Here is the explanation regarding weighted Colley method:
Q: Is there any specific reason why a microkernel must always be part of an OS? This strategy is quite…
A: Given: What is overriding principle governs the development of an operating system's microkernel?…
Q: Write the adjacency matrix for the following graphs. a C b d f
A: Introduction to Adjacency matrix : An adjacency matrix is a square matrix used to represent a finite…
Q: tail the steps involved in the 4 phases of the SSL Handshake Message Pro
A: Introduction: Sessions are established using the Handshake Protocol. By exchanging a series of…
Q: Use a table to compare Pfsense, Opnsense, and other commercial wireless router software's advanced…
A: Sense Nonsense Untangle Sense works with Windows and Linux. Nonsense is a FreeBSD 10 firewall OS.…
Q: 100n +0.01² 0.01n + 100m² 2n + n0.5 +0.5n¹1.25
A: The dominant term is the term one that gets the biggest ( i.e dominant ) as N gets bigger. The Big O…
Q: al core processor, consider first four letters of your name coming as processe
A: The answer is
Q: If you can think of at least two, please list them below, that can be utilized to create visual…
A: Introduction : Because it allows the reader to form their own mental picture of the information,…
Q: X marks the spot! Arr! Did you think that just because we’re pirates, we wouldn’t ask the Coding…
A: Step-1: StartStep-2: Declare variable sailor and take input from userStep-3: If sailor is greater…
Q: Problem 4 (Searching a list of Student objects) Write a function called find_by_ID(students, id)…
A: The solution is given below for the above given question:
Q: Apply the merge sort on the following list and sort the list in decreasing order: 47 98 29 33 93 98…
A: NOTE - I have used C++ programing language to solve the problem. Here I have defined the recursive…
Q: Establishing the firewall's role in ensuring the security of the network is a prerequisite to going…
A: Given:It's crucial to comprehend how firewalls operate to safeguard and secure networks. To…
Q: What are some applications of teamwork conducted in the cloud? The advantages of collaborative cloud…
A: Emails, calendars, Skype and WhatsApp are examples of cloud computing that we use every day. They…
Q: der the scenario when system calls are unavailable b still functions properly. Is there a good…
A: Introduction: When a process in user mode needs access to a resource, system calls are typically…
Please write the code in Java eclipse.
Step by step
Solved in 2 steps
- Person and Customer Classes Write a class named (Person) with data attributes for a person’s name, address, and telephone number. Provide accessors/getters and mutators/setters for each attribute. Write a displayPerson() to print out the attributes of the Person. Next, write a class named (Customer) that is a subclass of the (Person) class. The (Customer) class should have a data attribute for a customer number, and a Boolean data attribute indicating whether the customer wishes to be on a mailing list. Provide accessors/getters and mutators/setters for each attribute. Write a display customer() to print out the attributes of the Customer. Demonstrate an instance of the (Customer) class in a simple program.The class "Car" has the following attributes: plate (String), mark (String), model (String), year (int), km (int).Write a constructor method for the "Car" class that takes values as parameters for all these attributes.Extend the ItemToPurchase class per the following specifications: Private fields string itemDescription - Initialized in default constructor to "none" Parameterized constructor to assign item name, item description, item price, and item quantity (default values of 0) Public member methods setDescription() mutator & getDescription() accessor printItemCost() - Outputs the item name followed by the quantity, price, and subtotal printItemDescription() - Outputs the item name and description Ex. of printItemCost() output: Bottled Water 10 @ $1 = $10 Ex. of printItemDescription() output: Bottled Water: Deer Park, 12 oz.
- In c++Create a lecturer class with member-data name (name) and department (department). For the Lecturer class, write constructors, get & set methods, and the toString () method, which returns the textual description of the object. Write a Lecture class with data member:- subject (discipline)- weekday (day of the week when it takes place)- hour (start time, integer)- online (boolean value, whether remote or not)- lecturer (object of class Lecturer)For the Lecture class, write:- constructors- get & set methods- method isItMorning (), returning a Boolean value, the result of checking whether the lecture starts at 7-11- give a new implementation of the toString () method so that it returns the text description of the Lecture objectIn the test function main ()1. Create objects of both classes and illustrate the use of all possible methods for them.2. Create an array of Lecture objects and display it on the screen and in a file.Design a Friend class that the following members: • A field for the name of the friend (a string). •A field for the cell phone number of the friend (a string). • A field for the gender of the friend (a character F or M). • A static field numObjects (integer). Constructors: A default constructor and a parameterized constructor. Accessors methods for the data fields. Set methods for the cell phone data field and the numObjects field. A toString() method that displays the data fields. Design a testFriend driver class that has an arrFriends array that can hold up to a maximum of 15 objects. Write a static fillArray() method that receives the arrFriends array and allow the user to enter the information of a number of friends. Save the objects to the array. Return the array to the call statement. Write a static displayArray) method that receives the arrFriends array as parameter and display a numbered list of information on the objects saved in the array. Write a static sortData() method…Define the Circle2D class that contains: Two double data fields named x and y that specify the center of the circle with get methods. A data field radius with a get method. A no-arg constructor that creates a default circle with (0, 0) for (x, y) and 1 for radius. A constructor that creates a circle with the specified x, y, and radius. A method getArea() that returns the area of the circle. A method getPerimeter() that returns the perimeter of the circle. A method contains(double x, double y) that returns true if the specified point (x, y) is inside this circle. See Figure 10.14(a). A method contains(Circle2D circle) that returns true if the specified circle is inside this circle. See Figure 10.14(b). A method overlaps(Circle2D circle) that returns true if the specified circle overlaps with this circle. See the figure below. Figure (a) A point is inside the circle. (b) A circle is inside another circle. (c) A circle overlaps another circle. Draw the UML diagram for the class.…
- Create a class BeautyProduct with name, color, brand. Provide Constructors, getters, setters and also write toString method. Now create a class Lipstick which extends the class BeautyProduct as Lipstick is-a Beauty Product it has totalVolume, remainingVolume, price, texture (gloss, matt) as private data members. Provide Constructors, getters, setters and an apply() method whenever this method is called a beauty item is applied and its volume decreases by 10.This should also check that volume must not be zero if it then u have to throw exception. Also write toString method which prints all details like name, color, brand, price, texture and volume. Create another class foundation having totalVolume, remainingVolume, price, texture (liquid, cake) and lastingTime (number of hours foundation remain intact on face and does not crease) as private data members. This also extends the base class i.e. BeautyProduct. Provide Constructors, getters, setters and an apply() method whenever this…Step 1: Extend the ItemToPurchase class per the following specifications: Private fields string itemDescription - Initialized in default constructor to "none" Parameterized constructor to assign item name, item description, item price, and item quantity. Public member methods setDescription() mutator & getDescription() accessor printItemCost() - Outputs the item name followed by the quantity, price, and subtotal printItemDescription() - Outputs the item name and description Ex. of PrintItemCost() output: Bottled Water 10 @ $1 = $10 Ex. of PrintItemDescription() output: Bottled Water: Deer Park, 12 oz. ShoppingCart.java - Class definition ShoppingCartManager.java - Contains main() method Build the ShoppingCart class with the following specifications. Private fields String customerName - Initialized in default constructor to "none" String currentDate - Initialized in default constructor to "January 1, 2016" ArrayList cartItems Default constructor Parameterized…The class "Plant" has the following attributes: name (String), family (String), lifeSpan (int). Write a constructor method for the "Plant" class that takes values as parameters for all these attributes. A- BI II !!
- (1) Extend the ItemToPurchase class to contain a new attribute. item_description (string) - Set to "none" in default constructor Implement the following method for the ItemToPurchase class. print_item_description() - Prints item_description attribute for an ItemToPurchase object. Has an ItemToPurchase parameter. Ex. of print_item_description() output: Bottled Water: Deer Park, 12 oz. (2) Build the ShoppingCart class with the following data attributes and related methods. Note: Some can be method stubs (empty methods) initially, to be completed in later steps. Parameterized constructor which takes the customer name and date as parameters Attributes customer_name (string) - Initialized in default constructor to "none" current_date (string) - Initialized in default constructor to "January 1, 2016" cart_items (list) Methods add_item() Adds an item to cart_items list. Has parameter ItemToPurchase. Does not return anything. remove_item() Removes item from cart_items list.…hello! can you help debug my program? it's in Java! here are the errors I'm getting: line 189: total_weight cannot be resolved or is not a fieldline 93: the type Snake must implement the inherited abstract method Animal.makeNoise()line 139: the method actual_num_animals(int) is undefined for the type Zooline 152: the left-hand side of an assignment must be a variableline 169: syntax error, insert } to complete Blockline 152: syntax error, insert “. class” to complete expressionline 139: syntax error on token “<“, ( expectedline 139: syntax error on token “{“ invalid AssignmentOperatorline 152: i cannot be resolved to a variableline 152: i cannot be resolved to a variableline 154: i cannot be resolved to a variable here is my code: package zoo; public abstract class Animal { private String name; private double weight; private int age; public Animal() { name=""; weight=0; age=0; } public Animal(String name, double weight, int age) { this.name = name; this.weight = weight;…Create abstract class Pet , which is the abstract superclass of all animals. Declare a integer attribute called legs, which records the number of legs for this animal. Define a constructor that initializes the legs attribute. Declare an abstract method eat. Declare a concrete method walk that prints out something about how the animals walks (include the number of legs). Create the Dog class. The Dog class extends the Pet class. This class must include a String attribute to store the name and food of the pet Define a default constructor that calls the superclass constructor to specify that all dogs have 4 legs and name. override the eat and walk method. Create the Cat class that extends Pet. This class must include a String attribute to store the name of the pet, and a string to save food . Define a constructor that takes one String parameter that specifies the cat's name and food. This constructor must also call the superclass constructor to specify that all cats have four legs.…