1. Which design pattern lets you define a new operation without changing the classes of the elements on which it operates? A) Visitor B) Command C) Decorator D) Chain of Responsibility 2. Which design pattern decouples the object that invokes the operation from the one that knows how to perform it? A) Command B) Strategy C) Visitor D) State 3. Which pattern to use when more than one object can handle a request and the handler is unknown? A) Chain of Responsibility B) State C) Visitor D) Command
Q: We propose adding a new tier to Flynn's taxonomy. Is there anything special about today's computers…
A: Computer architecture:- Computer architecture is the engineering blueprint of a computer system,…
Q: What function does MVC provide in web application architecture as a whole? How can an MVC…
A: Required: How can MVC help with web application organisation? What benefits come with employing an…
Q: Do the Hamming codes follow any kind of formula? Explain
A: Introduction of Hamming Code: Hamming code is a type of error-correcting code used in digital data…
Q: Tell me about some of your experience working with digital infrastructure. Please explain the…
A: Introduction: So, in its simplest form, what is Critical Concern? Multiple forms of appreciation are…
Q: If a CPU makes a cache-unfulfilled request while a block is being flushed from the write buffer back…
A: When a block is being flushed from the write buffer back to main memory when a CPU makes a…
Q: n Essay On Software Engineering,In 4pages, A
A: We know Software engineering is the process of designing, coding, testing, and maintaining software…
Q: What are the advantages of utilizing design patterns while creating software? What are three…
A: In software development, a design pattern is a general, reusable solution to a frequent issue. The…
Q: How does the use of foreign keys contribute to the reliability and comprehensiveness of the…
A: An entity or set of entities in a relational database connection known as a foreign key serves as a…
Q: If a database can demonstrate that it fulfills the criteria for entity and referential integrity,…
A: Data integrity is ensuring that data is accurate and consistent throughout its lifetime. It is…
Q: There are several things to think about while putting up a software development team. How do you…
A: Introduction Software development is the method of designing, coding, testing, & maintaining…
Q: Create a Java program to output information for two payees including the following information about…
A: Introduction Classes in Java are the basic building blocks of code and are used to define objects…
Q: What kinds of software engineering and computer-related technological advances have been made in…
A: Software engineering refers to the application of engineering principles to the creation of computer…
Q: To what extent are software modeling techniques distinct from software development procedures?…
A: Software modeling techniques and software development procedures are interrelated but distinct…
Q: How time-consuming is it to calculate a full jackknife estimate of accuracy and variance for an…
A: Introduction : A nearest-neighbor classifier is a type of supervised machine learning algorithm that…
Q: What would happen if you set reboot.target as the system's default runlevel/target?
A: reboot.target is the system target and the run level for this target is 6. This reboot.target is…
Q: Here's an example: you're looking for a freelancer to develop a program that, in functionality,…
A: Freelancer: As a freelancer, my goal is to develop a program that mimics the functionality of…
Q: How does having a connection all over the world affect cloud computing, and what are some of the…
A: In this question we need to explain effect of global connection on cloud computing along with its…
Q: 10. Using the concept of hybrid Inheritance write a C++ program with following specification
A: Program Approach:- 1.Include header file 2.Create the class Student 3.Data Member:- rollnumber…
Q: Every source-level statement's required number of instructions is calculated by this function.
A: Introduction Machine-level language, also known as machine code or assembly language, is a low-level…
Q: ata cable between two office labs that are 80 meters apart. What is two advantages of using a copper…
A: Twisted pair cable One type of wiring is twisted pair wire, which consists of two conductors from a…
Q: Which four functions do all routers serve?
A: 1. A computer network refers to interconnected computing devices that can exchange data and share…
Q: What kinds of systems are the best suitable for agile development?
A: Introduction Agile development: Agile development is an iterative process that focuses on…
Q: For those who may not be familiar, what exactly does it mean to give anything "critical…
A: For those who may not be familiar, what exactly does it mean to give anything "critical…
Q: Define and illustrate data manipulation, forgery, and web jacking.
A: Data tampering Data tampering refers to modifying data without authorization before entering a…
Q: How does a compiled language fare against an interpreted one, and what are the benefits of the…
A: Compiler and Interpreter:- Compiler: A compiler is a program that takes source code written in a…
Q: Why should we go from using servers that are housed on our premises to using a model that is based…
A: Using the infrastructure as a service (Ia As) deployment paradigm, charity management maintains the…
Q: When and why were languages designed specifically for use with computers first developed?
A: An computer is electronic devices which takes input from user and produce desired output.
Q: How far do the benefits of object-oriented analysis and design go beyond those of conventional…
A: In numerous instances, the advantages of object-oriented analysis and design (OOAD) surpass those of…
Q: Describe the procedure that is followed in order to acquire documents and save them in Microsoft…
A: You can acquire a document in several ways, including copying and pasting text from another…
Q: What would be the point of throwing an exception into the process?
A: Exceptions are a fundamental mechanism for error handling in many programming languages. When an…
Q: 1) What is the source IP address at point 3? 2) What is the destination IP address at point 3?
A: Given diagram contains three networks and all these are connected to a Router. There are four…
Q: Is the class {{x} : all sets and atoms/elements x} a set? Why yes or no. Is the class {{x} : all…
A: 1)No, the class {{x} : all sets and atoms/elements x} is not a set. The reason is that it would…
Q: When conducting an analysis of the capabilities offered by cloud computing, what kinds of safety…
A: When evaluating the security measures needed for cloud computing, it is important for a business to…
Q: When modelling software-intensive systems, what perspectives must to be taken into account in the…
A: Introduction : Software-intensive systems are computerized systems that depend heavily on software…
Q: The question is whether data or control parallelism at the programme level is more suited to SIMD.…
A: The answer is given in the below step
Q: Which type of delay(processing , queuing, transmission, propagation) can have more variable values…
A: Introduction of delay in networking: Delay in networking is the amount of time it takes for a packet…
Q: Please explain why an object-oriented strategy is preferable for creating new computer systems.…
A: An object-oriented strategy is often preferred for creating new computer systems because it provides…
Q: int i cannot be changed with int pos I have to fill in the program that is missing in the middle by…
A: The code is given below with output screenshot
Q: In the process of designing models for software-intensive systems, which views need to be taken into…
A: In software design, various views or perspectives need to be considered to have a comprehensive…
Q: When it comes to installing and configuring server software, what are the benefits of automating the…
A: The benefits of automating the installation and configuration of server software include:…
Q: instructio
A: Reduced instruction set computer Reduced instruction set computer (RISC) microprocessors are…
Q: It's common for character devices to transfer data more quickly than block devices. Is that…
A: Both block devices and character devices are included here. The normal processing speed of block…
Q: Can you confirm or deny that this is the case? Assume that the most recent SampleRTT on a TCP…
A: This is true, of course. The maximum amount of time that can pass before a connection is deemed lost…
Q: Should we plan for the continued development of legacy systems? When should a system be completely…
A: Intro An estate plan is a procedure that is planned, carried out, and used in a totally distinct…
Q: Both array lists and linked lists are examples of how a list may be implemented. Discuss a scenario…
A: List implementations include linked lists and array lists. Give an instance when an array list…
Q: Write a program that captures input from the user and swaps the letters two at a time in the string.…
A: Your c++ program is given below as you required with an output.
Q: Building a Set Steps for Completion 1. Define the function list_to_set to take an argument of a list…
A: Algorithm of the code: 1. Start 2. Initialize an empty dictionary 3. Iterate through the list of…
Q: Summarize the three most popular cloud-based computing services.
A: Cloud Computing: Instead of executing applications on local computing devices like servers, PCs,…
Q: What does the word "reduced" imply when used to a computer with a restricted set of instructions?
A: RISC: Reduced Instruction Set Computer. When compared to computers with complicated instruction…
Q: Do you believe error correction improves the performance of wireless applications? Include specific…
A: Correction of errors The use of error correction in wireless applications or networks is preferred,…
1. Which design pattern lets you define a new operation without changing the classes of the elements on which it operates?
A) Visitor
B) Command
C) Decorator
D) Chain of Responsibility
2. Which design pattern decouples the object that invokes the operation from the one that knows how to perform it?
A) Command
B) Strategy
C) Visitor
D) State
3. Which pattern to use when more than one object can handle a request and the handler is unknown?
A) Chain of Responsibility
B) State
C) Visitor
D) Command
4. The Tic-Tack-Toe is a classical
A) Strategy
B) Visitor
C) Chain of Responsibility
D) Command
Trending now
This is a popular solution!
Step by step
Solved in 4 steps
- Solve as C++ Code please: 1- Creates a class Student with 3 attributes: name, id and level. a. Add a constructor able to create a Student; b. Add the methods getId and getLevel; c. Add the method display able to display the attributes, 2- Creates a class StudentPhD extending the class Student with two more attributes: specialty and supervisorName; a. Add a constructor to create a StudentPhd b. Add a display method: display need to override (polymorphism) the previous display method of Student class; 3- Creates a class called College with 6 attributes: a. maxStud: a maximum number of Student into the college; b. nbStud: the current number of Student into the college. When a College is created, the number nbStud is equal to 0; c. Student Stud[]: an array of Student. The size of this array is equal to maxStud; d. maxPhdStud: a maximum number of PhDStudent into the college; e. nbPhdStud: the current number of PhDStudent into the college. When a College is created, the number nbPhDStud is…10. Please do in java code DJ classDesign, implement and test a DJ class. A DJ object has a name - djName and an isHired attribute (boolean). Also, a DJ object has 3 musicTypes. These are references to the Music class, where the musicType is declared. In Stage 2 you will be required to declare these 3 instance variables as 1 array.A DJ object can return the value of each of its attributes, and change the value of each of its attributes. It can also display itself in the form:Kongapa, Play List: Disco, Rap, Heavy Metal is hiredImpressions, Play List: House, Hip Hop, Jazz is availableC++HurdleGame The HurdleGame class contains all the functions invoked as a result of a user action (i.e. when a user presses a key on the Hurdle Frontend, one of the functions in HurdleGame will be called. A HurdleGame object comprises a HurdleWords object (which stores all valid guesses and valid Hurdles), and a HurdleState object, which stores and tracks all the game states. Any action should update the HurdleState object.Each function in HurdleGame is called as a result of a user action on the Hurdle Frontend. To understand this, please read the Hurdle Backend API section below before implementing. You are responsible for implementing each of the functions below. LetterEntered ● Called by the Hurdle frontend when the user enters a letter. ● Hint: when a user enters a letter, how should the underlying HurdleState be modified to reflect the change resulting from that key press? WordSubmitted ● Called by the Hurdle front end when the user submits a guess by pressing enter. ● Hint: when…
- Using OOP and functions, create a program that allows a user to customize his/her online game character.The program should allow the user to customize two (2) characters, use objects to create the two characters.The program should allow the user to customize the following characteristics: Class, Weapon, and Skill. Use the functions declared within the class to customize the mentioned parameters. Use user defined functions, for example setClass(), setWeapon, and setSkill. · For class the user may choose from Knight, Wizard, or Archer. · For weapon the user may choose from Sword, Wand, and Bow. · For skill the user may choose from Bash, Fire Ball, and Arrow Charge. After customizing the two characters, a summary of the created characters must be printed. All invalid inputs must prompt the user that the input was invalid and should not terminate the program. You may either repeat the process or repeat where the invalid input was made.Modify class GradeBook (GradeBook.cpp, and GradeBook.h) (attached) as follows:a) Include a second private data member instructorName in the GradeBook class. It represents the course instructor’s name. The data type of the instructorName is a string.b) Create a new setInstructorName function in the GradeBook class. The function sets the instructor name. It accepts a string argument and does not return anything. c) Create a new getInstructorName function in the GradeBook class. The function retrieves the instructor name. It does not accept any argument and returns one string data.d) Modify the constructor to accept two parameters—one for the course name and one for the instructor’s name.e) Modify member function displayMessage such that it will display the welcome message and course name, then outputs "This course is presented by: " followed by the instructor’s name.f) Adjust all the necessary statements in the GradeBook.cpp file to display the required space(s) and line space(s).C++ OOP Create a Student class, where attributes associated with each student are name, registrationnumber, father name, degree and department. All attributes should not be accessed directly.One can view the details of all students. Note student attributes can not be changed by anymeans after initialization. (Hint use constant objects).In student class maintaining student count means your program could be able totell the count of student objects created. (User static counter variable)
- Add comments as appropriate. Be sure that your program output is neatly presented to the user. Add documentation comments to your functions. You are going to change the class you created in Program7 so that it has a constructor and some properties. In your GeoPoint class make the following changes (note your variable, parameter and method names may be different. Adjust as needed.): Add a constructor __init__(self, lat=0, lon=0,description = ‘TBD’) that will initialize the class variables __lat ,__lon and the __description. Notice that the constructor will also default lat and lon to zero and description to ‘TBD’ if they are not provided. Change the SetPoint method so that instead of individual coordinates SetPoint(self, lat, lon) it takes a single sequence. Add a property: Point = property(GetPoint,SetPoint). Make sure GetPoint and SetPoint are the names you used for the get and set methods you already wrote for points. Add another property: Description = property(GetDescription,…!!!FIRST READ EVERYTHING WRITTEN BELOW AND IF YOU CAN DO IT ONLY THEN START AND NO PLAGIARISM!!! Only use C++ to do this task. And I will only give thumbs up if you do not plagiarize from another Chegg or internet source. Also only if you will follow all the below instructions 100%. Only write typed answer. No handwritten. Code must visibly shows the functions and class. Attach the screenshot of output and code must be 100% complete and correct. Write a Twitter class that sets the Twitter user first (who is to be followed) and lets the client add up to 5 followers, which will be stored in an array with a capacity of 5. These users/followers could be in the form of string or Profile but both must be of same type. (Note that the followers are not stored as users, but as strings or Profiles). At any time, your main program should be able to remove any user, x from following another user, y (i.e., x is no longer in the array of followers of y). You are free to design your program as you…Rules: Corner cases. By convention, the row and column indices are integers between 0 and n − 1, where (0, 0) is the upper-left site. Throw an IllegalArgumentException if any argument to open(), isOpen(), or isFull() is outside its prescribed range. Throw an IllegalArgumentException in the constructor if n ≤ 0. Unit testing. Your main() method must call each public constructor and method directly and help verify that they work as prescribed (e.g., by printing results to standard output). Performance requirements. The constructor must take Θ(n^2) time; all instance methods must take Θ(1)Θ(1) time plus Θ(1)Θ(1) calls to union() and find().
- This is the question that is confusing me - A. Create a CollegeCourse class. The class contains fields for the course ID (for example, CIS 210), credit hours (for example, 3), and a letter grade (for example, A). Include get and set methods for each field. Create a Student class containing an ID number and an array of five CollegeCourse objects. Create a get and set method for the Student ID number. Also create a get method that returns one of the Student’s CollegeCourses; the method takes an integer argument and returns the CollegeCourse in that position (0 through 4). Next, create a set method that sets the value of one of the Student’s CollegeCourse objects; the method takes two arguments—a CollegeCourse and an integer representing the CollegeCourse’s position (0 through 4). B. Write an application that prompts a professor to enter grades for five different courses each for 10 students. Prompt the professor to enter data for one student at a time, including student ID and course…Book Donation App Create a book-app directory. The app can be used to manage book donations and track donors and books. The catalog is implemented using the following classes: 1. The app should have donors-repo.js to maintain the list of donors and allow adding, updating, and deleting donors. The donor object has donorID, firstName, lastName, and email properties. This module should implement the following functions: • getDonor(donorId): returns a donor by id. • addDonor(donor): adds a donor to the list of donors; donorID should be autoassigned a random number. • updateDonor(donor): updates the donor having the matching donorID. • deleteDonor(donorID): delete the donor with donorID from the list of donors, only if they are not associated with any books. 2. The app should have books-repo.js to maintain the list of donated books and allow adding, updating, and deleting books. The book object has bookID, title, authors, and donorID properties. • donorID references the book’s donor. This…Java OOP Write a complete address book maintenance application. The user of the program has four options: Add a new person, delete a person, modify the data of a person, and search for a person by giving the name. Use the AddressBook class, either the original one from the chapter or the modified one from the previous exercises. You have to decide how to allow the user to enter the values for a new person, display person information, and so forth.