A) Add these features to the Circle.java class from the lecture examples: • Make the 'color' attribute private • Make a constructor with two attributes for assigning a value to radius and color when the Circle is instantiated. add any missing setters or getters for the radius and color attributes.
Q: In your own word what is Cybersecurity, Threat, Risk, & Vulnerability?
A: CYBERSECURITY: Cyber security is the use of technology, procedures, and policies to prevent cyber…
Q: Describe the requirement for a continuous information security maintenance programme.
A: Intro We store and access information on various devices like computers, mobiles, records, etc.…
Q: In the physical layer, multiplexing is done via TDM, FDM, and CDM. Is it possible to explain the…
A: Multiplexing Multiplexing is a common networking technology that combines numerous analogue and…
Q: What is the most popular routing protocol used by Autonomous Systems to route traffic within…
A: Introduction: Border Gateway Protocol (BGP) is a standardised outside gateway protocol used on the…
Q: Write a program that prompts the user to enter two integer numbers A and B. The program must check…
A: Using if else and for loops we can solve this problem.
Q: Q5-What will be the output of the following code?A=100; if(A>99) clear A; end A never gets stored in…
A: Given: What is the output of the following code .
Q: What is the function of information security management in today's society?
A: Intro Information security management describes the set of policies and procedural controls that IT…
Q: Where will the network's physical and virtual networking equipment be kept?
A: Given: It is the physical devices that enable the hardware on a computer network to connect with and…
Q: --Problem -3 -Create a flowchart design that depicts the solving of the following problem: Asks user…
A: Please refer to the following step for the complete solution of the problem above.
Q: Do you agree that technological developments usually result in better games? What is your…
A: Better games are always the outcome of technological advancements.
Q: Pointer design considerations are discussed. The majority of pointers in computer languages are…
A: Thank you _______ This is called levels of pointers. According to ANSI C, each compiler must have…
Q: Computer science Describe the four fundamental components of counter-controlled iteration.
A: Introduction: When the user knows how many times the statement block should be executed, a…
Q: There are several needs (goals) for information security; please identify three of them.
A: Intro Requirements for Information Security: Information Security is the process of securing…
Q: The current state of information security management
A: Introduction: Information security management defines and manages controls that ensure a corporation…
Q: Summarize information security and related upgrading requirements on a single slide.
A: Intro Overview of information assurance and the associated upgrade needs .Information Assurance
Q: System Description Data Dictionary (Description of each table and attribute) Conceptual Model…
A: A data entity is a data item or component. In an ER diagram, an entity is represented by a…
Q: This is possible because computers nowadays are so powerful. What factors, and what evidence, have…
A: Computer Education: Online education and research are both possible with computers. Students may…
Q: List and describe FOUR (4) data mining and predictive analysis applications.
A: List and describe FOUR (4) applications of data mining Answer: Applications of data mining are:…
Q: ) Using booth algorithm, find out the following signed multiplications: 7 x (-5) 2) Convert the…
A: Note:- As per our guidelines, we are allowed to answer only first question of multiple questions.…
Q: In what ways does the Unix operating system excel and where does it falter?
A: 1 - Ecommerce - Big online stores use UNIX or Linux servers to host their websites. 2- Portable - It…
Q: An example of how the knowledge of the existing cybersecurity defences may help a company to…
A: The answer is as follows.
Q: Why does a good information security programme start with a policy? List and briefly describe three…
A: Introduction: According to the question, we need to know why a good information security programme…
Q: What exactly are security control families?
A: Intro security controls are to avoid security risks. The security control families are divided to…
Q: Assume there is a villiage with 3 houses whose owner's strongly dislike eachother. So they wish to…
A: Ans:) I have given two diagrams with justification below. please check according to requirments. The…
Q: When it comes to installing and administering both physical and virtual networking devices across a…
A: SDN controller: For better network administration and application performance, software-defined…
Q: Describe the flaws with the pointer's design. Which variable may be pointed to using pointers in…
A: Introduction: Here we are required to explain flaws with the pointer's design.
Q: Conver to MIPS code: d[3] = d[2] + a %3D
A: # let consider d is stored in $s0# and 'a' in stored in $s1# first load the d[2]lw $t0, 2($s0) # t0…
Q: Why are Firewalls required in a system? Explain different types of firewalls.
A: A Firewall is a network security device that monitors and filters approaching and outgoing network…
Q: Knowing the cybersecurity defences available may help companies select risk mitigations as part of a…
A: The answer is as follows.
Q: What is the hash function's purpose? And how exactly does it work?
A: Introduction: The hash function is a delicate mathematical technique that is crucial in obtaining…
Q: Hackers and their and companion viruses are an increasing problem, especially on the internet. What…
A: Keep your gadget secure Try to download suggested refreshes from your gadget's producer or working…
Q: Define the many forms of information security policies.
A: Intro What are Information Security Policies Those security policies that state or describes the…
Q: How would you describe the aim of a system security policy as an information systems security…
A: Intro A brief, high-level statement defining what is and is not permitted during the operation of…
Q: Explain your response. Is it True or False? - Regular member functions are slower than virtual…
A: A virtual function is a member function that is declared within the base class and is overridden by…
Q: n FDM from a TDM. A one-page summary of your findings would be much appreciated.
A: Introduction: TDM stands for Time Division Multiplexing and is a multiplexing technology. TDM can…
Q: Write (and clearly label) the pre-, in-, and post-order sequences of traversal for the given tree in…
A: To determine the pre-order, in-order and post-order traversal of the tree, there are different…
Q: Computer science WHAT ARE THE BENEFITS OF USING CRYPTOCURRENCY PRACTICALLY?
A: Introduction: Cryptography is a means of securing communication in the presence of malicious third…
Q: Explain and demonstrate the three main methods of file management.
A: The three primary file management techniques are as follows: Ordinary files are used to store data…
Q: Why neural network is very suitable for federated learning? Select one: a. Federated Learning can…
A: The above question is solved in step 2:-
Q: Create a form of the hybrid merge-join method that is appropriate for the situation in which both…
A: Hybrid merge join algorithm is a version of the merge join procedure, which is done on unsorted…
Q: Provide a normalized version of the Index metadata relation and explain why utizing it will result…
A: Metadata: There are a number of methods to talk about metadata. In other words, data that tells us…
Q: A single LAN connects 200 workstations and four servers through switches. You're noticing too many…
A: The answer is given in the below step
Q: Provide a normalized version of the Index metadata relation and explain why utilizing it will result…
A: Normalization: Normalization is a scaling technique that shifts and rescales values to make them…
Q: When it comes to network configuration and management, where will physical and virtual networking…
A: It's unclear exactly where the network's hardware and software management infrastructure will be…
Q: On the Internet, where can you get credible information?
A: Sorts of sources There are three sorts of sources: essential, auxiliary, and tertiary. Essential…
Q: What are some examples of wireless architectures? When would you utilise each?
A: Introduction: We must pick which wireless network will be constructed in the network region while…
Q: What is the difference between the Kernel and the Shell in the context of Unix?
A: The question is to write the difference between the Kernel and the Shell in the context of Unix.
Q: what the term "salt" implies in the context of cryptography You should talk about how passwords are…
A: Introduction: Cryptography is the process of converting data into scrambled code that can be decoded…
Q: Is hacktivism distinct from other forms of cybercrime in terms of cybercrime and terrorism?
A: Answer: Hacktivism is the peaceful application of unlawful or legally unclear digital tools for…
Q: Write a program that reads from the user two integers of three digits each. The program finds the…
A: import java.util.Scanner;//to readinputpublic class Main{ public static void main(String[] args) {…
~Using java~
Having problems with sovling the three bullet points
~The second screenshot is the circle.java code we are using
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- Java program: 1. A list of students (student ID, first name, last name, list of 4 test grades) will be transformed intoStudent objects. We will provide this file for you.a. Each feature will be separated by commas, however; the grades will be separated byspaces, as shown in this example line: 82417619,Erik,Macik,95.6 85 100 88[Hint: It seems like you might need to use the split method twice]b. Your program should work with any file with any number of lines.2. A menu will be displayed on loop to the user (meaning after a user completes a selection, themenu will be displayed again, unless the user exits).The menu options should be the following:a. View Student Grade and Averageb. Get Test Averagec. Get Top Student per examd. Exit3. Your system shall incorporate the following classes. Each class will require one file.GRADE CALCULATORPurposeA class that contains useful methods that can be used to calculate averages andconvert grades to letter gradesAttributes:…Design and implement Java program as follows:(1) There will be a Gift class with following attributes: id (combination of numbers and letters),size (values S, M, or L), and price(2) There will be two child classes FruitBasket and SweetsBasket with the following additionalattributes: FruitBasket: number of fruits, include citrus fruits indication (true or false) SweetsBasket: include nuts indication (true or false)(3) The Gift class hierarchy must provide the following Functionality: On creation, a gift instance must be given all attribute values except price which must becalculated and number of fruits which must be set by system All attribute values can be changed after creation except id and the values that arecalculated or set by the system Price is calculated as follows:o There is a flat fee of 19.99 for S gift, 29.99 for M gift, and 39.99 for L gift.o Fruit basket gift has additional fee of 5.99 when it has citrus fruits. Number of fruits in a basket is as follows: Small…This discussion assignment examines variable scope. For this assignment, we will be examining the Beverage2 class (an updated version of the Beverage class from discussion 1), its subclass Espresso, and the TestBeverage2 class. This time, assume that all source files are in the same package. Note that some lines may wrap, but are still considered on one line. Examine the code below. Recall that variables have four kinds of scope: static, instance, local, and block. For each variable listed below, identify its scope (static, instance, local, or block) and describe the scope using complete sentences. An example description is provided, after the code listing, for the ounces variable in the Beverage2 class. Please describe the scope for the following variables: The num variable in the Beverage2 class The price variable in the Beverage2 class The shots variable in the Espresso class The b variable in the TestBeverage2 class The j variable in the TestBeverage2 class public abstract…
- Java program * Interfaces 1. Modify the class Rectangle to implement the Comparable interface, as shown in the following UML class diagrams. Apply the required changes in the class’s header.2. Then, in the Rectangle class override the method compareTo(), so if this object’s area is greater than the specified (given through the parameter) object’s area return 1, if it is less than return -1, and 0 otherwise. 3. Create a test class named Test2. Then complete the following tasks: a. Create an ArrayList and add to it 4 Rectangle objects with different width and height values. b. Print out the elements of the ArrayList. c. Sort the elements of the ArrayList using the static method sort of the class java.long.Collections. This would be possible only, if you implemented the method compareTo() correctly in the Rectangle class. d. After sorting the elements of the ArrayList, print the elements again. 4. Run the Test class. Here is the rectangle's class program public class Rectangle extends…Please code in C++ and U can take time for this one and please follows all the instruction. Thank you so much. A. Create an abstract base class called Currency with two integer attributes, both of which are non-public (Python programmers - it is understood that there is nothing private in Python but try to not access the attributes directly from outside the classes). The int attributes will represent whole part (or currency note value) and fractional part (or currency coin value) such that 100 fractional parts equals 1 whole part. B. Create two derived classes - Dollar and Pound - with one additional non-public string attribute which will contain the name of the currency (Dollar or Pound) respectively. DO NOT add this attribute to the base Currency class. C. In your base Currency class, add public methods for the following, where appropriate (C++ students are allowed to use friend methods as long as a corresponding class method is defined as well): Default Construction (i.e. no…This lab must be done in C++ Assignment: In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it. In this lab you will write a program to decode a message that has been encrypted. Detailed specifications: Define three classes. Each one should be in a separate file. You can choose to define the class and its functions inline, all in a header file, or have a .h and .cpp file for each class. Abstract base class with the following: A variable to hold an encrypted message. This variable should be a string which is initialized in the constructor. A status variable that will tell whether the message was loaded successfully. A constructor that receives one parameter: a string variable with a file name and uploads its content to the string variable that is supposed to store it. A pure virtual function called decode. This function will be defined in derived classes. A function that prints the message on the…
- Answer this in C++: Given main(), complete the Calculator class (in files Calculator.h and Calculator.cpp) that emulates basic functions of a calculator: add, subtract, multiple, divide, and clear. The class has one private data member called value for the calculator's current value. Implement the following constructor and public member functions as listed below: Calculator() - default constructor to set the data member to 0.0 void Add(double val) - add the parameter to the data member void Subtract(double val) - subtract the parameter from the data member void Multiply(double val) - multiply the data member by the parameter void Divide(double val) - divide the data member by the parameter void Clear( ) - set the data member to 0.0 double GetValue( ) - return the data member Given two double input values num1 and num2, the program outputs the following values: The initial value of the data member, value The value after adding num1 The value after multiplying by 3 The value after…(Java) Q 1,2 ANSWER BOTH PART 1 AND 2!!! Explain the answer step-by-step and include verbal explanation. Thank you! PART 1: 1. Given the below Car class, write a child class of Car named Tesla. The Tesla class has an additional private boolean variable named autoPilotEnabled. It also has two constructors - a default constructor and a three argument constructor. Both constructors call the appropriate constructors of the parent class. Tesla also has a getter and setter for the autoPilotEnabled variable. Finally, it has a toString method that calls the toString of Car, as well as concatenating the autoPilotEnabled variable. public class Car { private String make;private String model;public Car() {make = "Make unknown";model = "Model unknown";}public Car(String make, String model) {this.make = make;this.model = model;} public String getMake() {return make;}public String getModel() {return model;}public void setMake(String make) {this.make = make;}public void setModel(String model)…use java (ArrayList, inheritance, polymorphism, File I/O and basic Java) Student class: First, you need to design, code in Java, test and document a base class, Student. The Student class will have the following information, and all of these should be defined as Private: A first name (given name) A last name (family name/surname) Student number (ID) – an integer number (of type long) The Student class will have at least the following constructors and methods: (i) two constructors - one without any parameters (the default constructor), and one with parameters to give initial values to all the instance variables of Student. (ii) only necessary set and get methods for a valid class design. (iii) a reportGrade method, which you have nothing to report here, you can just print to the screen a message “There is no grade here.”. This method will be overridden in the respective child classes. (iv) an equals method which compares two student objects and returns true if they…
- Python:Please read the following. The Game class The Game class brings together an instance of the GameBoard class, a list of Player objects who are playing the game, and an integer variable “n” indicating how many tokens must be aligned to win (as in the name “Connect N”). The game class has a constructor and two additional methods. The most complicated of these, play, is provided for you and should not be modified. However, you must implement the constructor and the add_player method. __init__(self,n,height,width) The Game constructor needs to initialize three instance variables. The first, self.n, simply holds the integer value “n” provided as a parameter. The second, self.board, should be a new instance of the GameBoard class (described below), built using the provided height and width as dimensions. The third, self.players, should be an initially empty list. add_player(self,name,symbol) The add_player method is provided a name string and a symbol string. These two values should be…JAVA - PersonWrite the classes as shown in the following class diagram. Add a tester where you make an array of 5 person and ask the user to enter them. Then loop over the array and print them. The user may enter a Student, a Staff or even a Person. The ‘-‘ symbol means private field or method and ‘+’ means public. The classes Student and Staff inherit from Person1. Write a Graph class in Java. This class should represent undirected graphs. You can choose one of the representationsfrom object model, sets of nodes and edges, adjacency matrix, or soon, whichever you feel most comfortable with.● Include comments in your Java file to explain how nodes and edges are represented.● Assume that only one edge can exist between two nodes.● Assume that it is possible to have an edge connecting a node to itself, ie that a nodecan be connected to itself via an edge.● Because edges are undirected, an edge between v and w is also one between w and v.● Your constructor method should take one parameter: the number of nodes of thegraph. Add a method to your class: boolean addEdge that takes two parameters, v andw (representing two modes v and w which are connected together by the edgebeing added). If successful, the method should return true. The method should return false when it isunsuccessful, which is in the following cases: the edge is already in the…