class A {protected int x1,1,2; public: A(a, b,c):x1(a+2),y1(b-1),z(c+2) { for(i=0; i<5;i++) x1++;y1++++;}); class B {protected: int x,y; public: B(a,b):x(a+1),y(b+2) { for(i=0; i<5;i++) x+=2; y+=1;}); class D:public B, virtual public A { private: int a,b; public: D(k,m,n): a(k+n), B(k,m),b(n+2),A(k,m,n) { a=a+1;b=b+1;}}; int main() {Dob(4,2,5);} what the values of x1,y1 and z
Q: In order for a player to navigate your game, you will need to develop a function or functions using…
A: declaration rooms = { 'Great Hall' : { 'South' : 'Bedroom', 'North': 'Dungeon', 'East' :…
Q: me of the advantages and dis
A: Solution - In the given question, we have to specify some advantages and disadvantages of storing…
Q: What types of concerns and issues and problems are raised by using a fragmented information system?
A: The answer is given below step.
Q: semiconductor memory
A: Question a DRAM utilized as the primary memory of the computer Each Dram unit is comprised of a…
Q: List a few issues with global information systems and provide a short explanation.
A: Definition: Global information systems are the ones that many nations throughout the world have…
Q: What are the most recent advancements in information systems, information technology, and…
A: The answer for the above question is given in the below steps for your reference.
Q: Find NFA, Grammar, and regular expression of this Set of all strings containing odd number of a's…
A:
Q: Please provide the names and short descriptions of 10 international organizations that are involved…
A: Write the names of 10 major international organisations in computer science and information…
Q: Write down a program to accept user’s First and Last Name. Print full name of the user. Print the…
A: As per rule, I am entitled to answer the first question only Program Approach:- 1. Include header…
Q: Information technology has an impact on how people conduct their daily lives and interact with one…
A: The answer is given in the below steps.
Q: Instructions: Write a Pseudocode for these problems: 1. Finding the biggest of two numbers. 2.…
A:
Q: List the several design models that we use throughout the software development lifecycle's analysis…
A: There are different approaches or model which uses SDLC phases in order to develop a quality…
Q: Talk about the development of the information system, paying particular attention to the individuals…
A: INTRODUCTION Information systems are perhaps the main time frame throughout the entire existence of…
Q: l interpersonal sk
A: Interpersonal SkillsInterpersonal abilities are described as the ability to convey or communicate…
Q: Cost Benefit Analysis (CBA) is a method of economic evaluation and assessment that determines all of…
A: A cost benefit analysis, often known as a CBA, is a method of economic evaluation and assessment…
Q: What actions are taken in the forensic data recovery procedure from a solid-state drive?
A: Although the forensic recovery process is distinct from the other recovery processes, it may provide…
Q: How do you feel about the idea of cloud computing? Do you believe it to be a good idea? Why?
A: Cloud computing is on-demand access to PC assets like data. storage and computing power, without…
Q: There are several techniques to retrieve legally sound data from a solid-state disk.
A: The following is the technique that should be followed in order to recover data in a forensically…
Q: Name three different types of semiconductor memory and briefly describe each one's key…
A: RAID-Redundant array of independent The data storage virtualization method known as RAID, or…
Q: what is Identity-Based Public-Key Cryptography? explain with example.
A: Encryption is a process to ensure that the messages are…
Q: n security" mean?
A: Introduction:A computer software package known as an application, sometimes known as an application…
Q: The array a[] contains 10 integers. Starting from the second element in a[ ], the difference between…
A: Here is the c program of above problem. See below step for code and output.
Q: What warning signs point to the impending failure of a software project? Why elucidate?
A: The indicators indicate a software project is in trouble going to fail include the following: The…
Q: How the Operating System Finds Data on a Disk?explain step by step.
A: process to find data on disk by operating system is in next step:
Q: What deliverables specifically are included in software development projects?
A: Start: All tangible and intangible products that are produced within the parameters of a project are…
Q: Provide at least five examples of how augmented reality has been or may be utilized in ways that the…
A: Augmented Reality (AR) is a digital economy driver. By 2020, the AR market might be worth $100…
Q: Please describe the downsides of cloud computing for students and teachers. Can we get out of this…
A: - We have to talk about the drawbacks of cloud computing for students and teachers.
Q: According to certain hypotheses, the growth of information technologies may be fueled by people and…
A: An information system, in technical terms, is a set of linked components that collect (or retrieve),…
Q: Include details on the communications, software, and hardware that comprise the basis of information…
A: Information technology Information technology (IT) is the process of accessing information through…
Q: There are several methods for achieving forensically sound data recovery from a solid-state disk.
A: By using bit stream imaging of hard drives as a criterion for admission into court, practitioners…
Q: Look at the various information management techniques used by various businesses.
A: Introduction : Data driven firms need information management to make better decisions and accomplish…
Q: explain what information security means.
A: To be decided: Why information security is important Keeping information secure Information is…
Q: Do you evaluate the efficacy and application of interpersonal skills throughout the planning and…
A: The Answer is in step2
Q: Describe the five types of data transfer in a computer
A: ANSWER:- There are five types of data transfer in a computer. 1-Use an External Storage Media.…
Q: bes a software project need to explain its needs for any particular reason?
A: The answer of this question is as follows:
Q: There are several techniques to retrieve legally sound data from a solid-state disk
A: Yes, there are several solutions are there to recover sound data from a solid-state disk. 1. use…
Q: Make a list of all the many ways that a network may help companies save money. Along with other…
A: The answer for the above motioned question is given in the following steps for your reference.
Q: Write a C/C++ program to extract the sign bit, exponent field, and the fraction field of a 32-bit…
A: Below I have provided C++ Programming. Also, I have attached the screenshot of the code and output…
Q: What precisely does the phrase "cloud-based data storage" refer to, and what are some of the biggest…
A: IntroCloud storage is a form of cloud processing that saves data on the Internet through a cloud…
Q: What actions are taken in the forensic data recovery procedure from a solid-state drive?
A: Even though forensic recovery is different from the other recovery processes, it may yield outcomes…
Q: 7. Write a C/C++ program that reads in a sequence of positive integers and prints out their BCD…
A: The answer for the above question is given in the below steps for your reference.
Q: Include some examples taken from real-world scenarios together with a review of the education and…
A: The following are reasons why training and certification are required: Certification may be granted…
Q: Include details on the communications, software, and hardware that comprise the basis of information…
A: Information technology's (IT) foundation: The computer utilizes IT to store, receive, transmit, and…
Q: There are several techniques to retrieve legally sound data from a solid-state disk.
A: About Solid State Disk (SSD) A form of storage device used in computers is called a solid-state…
Q: Why was early Internet research so crucial, and what was its main purpose? Is there a fix for these…
A: Computers all around the globe are connected by a huge global network called the Internet.Why was…
Q: How can you help an employee if they aren't working to their full potential?
A: Bring additional clarity to their perspective. To be of assistance to them in reaching their…
Q: How can you assess how well interpersonal skills are being employed while creating and delivering a…
A: INTRODUCTION: It is the kind of ability we use to communicate in daily life, such as speaking,…
Q: class A Q5: Correct the following code fragment and what will be the final results of the variable a…
A: Modified code with output provided in next step
Q: How interdependent are systems, and what does that word really mean?
A: Introduction: In order to properly build their systems and service levels, IoT service providers…
Q: Write a PHP function that checks whether a passed string is a palindrome or not? A palindrome is a…
A: A palindrome is a word, phrase, or sequence that reads the same backward as forward
Step by step
Solved in 2 steps with 1 images
- Class Inheritance with abstract class Define a class Employee with the following fields: _name, _empId, _department, _position (_title), _yearlySalary, _fullTime (a boolean: true/false) , _month , _year (time of hire) Add constructor and properties Define an abstract method GetBiMonthlySalary() (if the employee is paid twice a month) Define an abstract method GetVacationTime() that returns the number of vacation time this employee would have based on time of hire Override the ToString() method to return a string that contains the information pertaining to an employee such as: name, empId, department, and where full time or not. Define a class HourlyEmployee that inherits from Employee. This class should have 2 fields of its own: _hours (hours worked in half a month) and _wage (hourly wage) Provide necessary constructor, properties and methods Override the ToString() to also return the additional fields Gets 3 days of vacation after first year if the employee works…Inheritance in Java Instructions: Construct a class called “Rectangle”. A “Rectangle” has both a length and a width (both positive integers). Access to them should be only inside the class and within the inheritance hierarchy. Then implement the following: - lone constructor that accepts two integers for the length and the width. Prints “Rectangle Constructor” getters and setters - area - prints “Rectangle Area” and returns the area of the rectangle - perimeter - prints “Rectangle Perimeter” and returns the perimeter of the rectangle Create a class called “Square”. The square is a rectangle. Therefore, have Square inherit from Rectangle. Square construction prints “Square Constructor” and accepts one integer which is the length of a side. The version of the area and perimeter of Square prints “Square Area” and “Square Perimeter”, respectively. Inputs A positive integer representing the length of the side of a Square. 2 Sample Output Enter side length: 2 Rectangle Constructor Square…Convert the UML class diagram above into a java code with the following conditions The methods in the Pet class are abstract. Create a class called test. The main() method in the test class should create three Cat objects and two Budgie The main() method should also create indirectly an object of the Pet class. Demonstrate polymorphism in your test
- language: Java Class Inheritance with an abstract class Define a class Employee with the following fields: _name, _empId, _department, _position (_title), _yearlySalary, _fullTime (a boolean: true/false) , _month , _year (time of hire) Add constructor and properties Define an abstract method GetBiMonthlySalary() (if the employee is paid twice a month) Define an abstract method GetVacationTime() that returns the number of vacation time this employee would have based on time of hire Override the ToString() method to return a string that contains the information pertaining to an employee such as name, empId, department, and where full time or not. Define a class HourlyEmployee that inherits from Employee. This class should have 2 fields of its own: _hours (hours worked in half a month) and _wage (hourly wage) Provide necessary constructor, properties and methods Override the ToString() to also return the additional fields Gets 3 days of vacation after first year if the…(Java) Make the 2 following classes: Employee.java EmployeeTest.java Copy and paste the below starter code into Employee.java: /** * Employee.java extends Person.java * @author * CIS 36B, Activity 11.1 */public class Employee extends Person { private static int numEmployees = 0; private double salary; private String title; /** * Default constructor for the * Employee class. Calls the * default constructor of the * superclass and also initializes * salary and title to default * values */ public Employee() { } /** * Multi-argument constructor for the * Employee class. Calls the * multi-argument constructor of the * superclass and also initializes * salary and title to the * specified values */ public Employee(String name, int age, String gender, Address a, double salary, String title) { } /** * Returns the annual salary * @return the salary */ public double…Make a class Person, with instance variable name, age, and gender. Make a class Employee inheritfrom Person, with extra data for salary, and hiring date. Make another class Student inherit from Person,with data for program name, level (undergraduate/graduate), and program year. Supply required methods forthe superclass and the subclasses. Make a subclass Manager from Employee, with bonus salary, andoverride the corresponding method(s). Provide toString method for the Employee class and its subclass,Manager, such that it returns employee name, type of the employment, and salary. For instance if you createan object, manager1, from Manager class, with name=”John Smith” and annual salary of $125,000 and bonusweekly bonus of $200, and then write a print statement like System.out.println(manager1); , the output willbe:John Smith, Manager, Salary = $125,000/year, Weekly bonus = $200
- Course Title: Modern Programming Language Please Java Language Code and Correct Code Please Question : Design an abstract class GeometricObject. GeometricObject must ensure that its children must implement calcArea() method. Design Rectangle18ARID2891 and CircleMJibranAkram Classes as children of GeometricObject class with overridden toString() method to return “Rectangle18ARID2891 with w Width and h Height is drawn” OR “CircleMJibranAkram with r Radius is drawn”. The attributes of Rectangle18ARID2891 are length, width. The attribute of CircleMJibranAkram is radius Hint: Area of circle=πr2 , Area of rectangle= width*lengthAP COMPUTER SCIENCE A (JAVA) Draw a class hierarchies diagram to show the inheritance among the following classes: Greeting card Holiday greeting card Birthday card Valentine card Get well card Christmas greeting card Hanukkah greeting card Kwanzaa greeting card Lunar New Year greeting card Identify the attributes and methods for each of the classes, and identify which of the fields and methods can be inherited in the class hierarchy diagram.Define a Java class namely Customer containing: Instance variables: ⁃ id. A private static instance variable of type integer initialized to 0 (id=0). ⁃ name: A private instance variable of type string. ⁃ discount: A private instance variable of type integer initialized to 10 (discount=10). Methods: ⁃ A parameterized constructor: a constructor method to initialize the name and the discount instantiated objects, the variable id incremented automatically (id=id+ 1) in each instantiate of an object Customer. ⁃ setName(xxx): acts as the set method for the attribute name ⁃ setDiscount(xxx): acts as the set method for the attribute discount (0<= discount<=100). ⁃ getld: acts as the get method for the attribute id ⁃ getName(): acts as the get method for the attribute name ⁃ getDiscount (): acts as the get method for the attribute discount ⁃ toString(): returns the attributes id, name, and discount (with using the getter methods only) in the following format: id name:…
- Implement a JAVA application that keeps track of package deliveries to consumers. Theapplication consists of the following classes:• Item: Create a class called Item. The class has two member variables oftype String named name and description and provides getter and settermethods for both.• Mail (abstract class): Implement an abstract class called Mail . The class hasa member variable of type String named address and a getter method for it.• Letter: Implement a class called Letter that inherits from Mail . The classhas one member variable of type String named contents.• Package: Implement a class called Package that inherits from Mail . Theclass has one member variable of type Item[] named items and a gettermethod for it.• DeliveryTruck: Implement a class called DeliveryTruck with a singlemember variable of type Mail[] of length 10. Add the following method:o void load(Mail mail): This method stores the given mail argumentat the next available spot in the member variable.Java Programming Problem 2 – Message Encoder, Decoder Create an interface MessageEncoder that has a single abstract method encode(plainText), where plainText is the message to be encoded. The method will return the encoded message. Create a class SubstitutionCipher that implements the interface MessageEncoder, as described above. The constructor should have one parameter called shift. Define the method encode so that each letter is shifted by the value in shift. Defne the method encode so that each letter is shifted by the value in shift. For example, if shift is 3, a will be replaced by d, b will be replaced by e, c will be replaced by f, and so on. (Hint: You may wish to define a private method that shifts a single character.) Create a class ShuffleCipher that implements the interface MessageEncoder, as described above. The constructor should have one parameter called n. Define the method encode so that the message is shuffled n times. To perform one shuffle, split the message…For this problem you are to join the following classes into a hierarchy (use the UML diagrams from Module 2 to get started): Player - Super Class Archer - Subclass Barbarian - Subclass Cleric - Subclass Rogue - Subclass Warlock - Subclass