Consider an online holiday booking system. The users can register to book a holiday package. Currently, the design model includes the classes: User and Booking. Assume the class, Group_Booking, is a sub-class of the class, Booking. Which of the following cannot be inherited by the Group_Booking class in the object-oriented design? Select one: O a. The protected attributes of the Booking class O b. The protected methods of the Booking class O c. The constructors of the Booking class Od. The public methods of the Booking class
Q: How do hash table collisions occur, and what can be done to prevent them? Permit me to illustrate…
A: Handling collisions in a Hash Table: A hash desk is a facts shape this is used to keep keys/fee…
Q: [F] Is each of the following statements true or false? (21) "If two graphs are isomorphic, then…
A: The degree sequence of a graph is the sequence of the degrees of the vertices in ascending order.
Q: This is wrong can you read the question again
A: To display the Manager first name, last name, employee first name, last name. To Group by the…
Q: How does this code work? How is the i decided? How is newWord decided? Why does newWord =…
A:
Q: When it comes to protecting your business's network, what kinds of measures have you considered so…
A: Introduction The process of developing a comprehensive defensive strategy to protect a company's…
Q: If three inputs are 1 on a priority encoder and the rest are 0, which of those three will be…
A: Dear Student, The answer to your question is given below -
Q: b. Consider a relation R = {A, B, C, D, E} with the following dependencies. {A, B} ⇒ {C} {C, D} ➜…
A: Introduction Functional dependency: A functional dependency in a database management system, as the…
Q: What is the result of inserting a nextLine() command after a nextInt() or nextDouble() ne? Make sure…
A: Dear Student, The sufficient answer for your question is given below -
Q: The Committee on the Stability, Objectivity, and Implementation of ERM (COSO ERM) 2017 is a…
A: Introduction: Enterprise risk management (ERM) is a process management system that detects,…
Q: dsolve Symbolic solution of ordinary differential equations. dsolve will not accept equations as…
A: In this question we have been given three differential equations and we need to write a MATLAB…
Q: 1. A Rook-y Move! In chess, a rook can move horizontally or vertically to any square in the same row…
A: ALGORITHM : 1. Start2. Create a 2D array of size nxn and set all the entries to 0.3. Set the entry…
Q: If a large computer process or program is broken down into smaller ones, do the resulting subsystems…
A: Processes are segmented. Segments are non-uniform software portions. Segmentation gives users a…
Q: Python data structures: write a function that takes in a list (L) as input, and returns the number…
A: Here we are going to solve the above problem using the merge short Algorithm Follow the below steps…
Q: Assume there are two 3*3 matrices A and B as follows. Using Cannon's algorithm to calculate the…
A: Cannon's Algorithm: Consider two n × n matrices A and B partitioned into p blocks. A(i , j) and B(i…
Q: At your university or workplace, is there an AUP in place? What are some prohibited activities…
A:
Q: Multiprocessor system identification necessitates an understanding of how such systems function.
A: GIVEN: To recognise multiprocessor systems, they must first be comprehended.
Q: n java Create a class for Student and implement all the below listed concepts in your class. Read…
A: The class in java is a blueprint that acts as the base for objects. The objects are the instances of…
Q: Discuss how you may employ each of these three parts of Cybersecurity+ in the workplace and when you…
A: Introduction: We must discuss a few crucial factors that must be considered and used in…
Q: How does your organization prevent security flaws in its networks from becoming actual issues?
A: Given: How does your business find security holes in the network before they become a problem?
Q: 2.3 An alias provides a mechanism to rename a column or an expression. Under what conditions should…
A: An alias name is alternate or substitute of a column name in table.
Q: Draw a diagram of the 128M x 16 chip built from 32M x 8 chips. Include the range of addresses for…
A: Given that, The diagram 128M*16 chip must contain 32M*8 chips. That means at first level, 128/32= 4…
Q: 4.2) In the given table, there two similar names (JOHNSON and Johnson). Assume you are required to…
A: The brief introduction to SQL is as follows: It stands for a structured query language, SQL is used…
Q: What command must be issued to access the Windows PE network command prompt? O DiskPart Network Net…
A: Introduction Windows Preinstallation Environment & WinPE are additional names for Windows PE.…
Q: you
A: Dear Student, The answer to your question is given below -
Q: A tile of a monkey puzzle has four monkey halves that can be labelled as north (N), east (E), south…
A: The issue with making judgments under uncertainty is that the majority of the knowledge we have…
Q: From a moral and ethical perspective, why is it crucial for website designers to provide accessible…
A: Introduction: Reasons to build accessible websites include the fact that more people will visit them…
Q: Ara Howard created a project called Fattr which implements a common desire among Ruby developers: a…
A: Here is an illustration of the issue. You would have to create the method yourself in order to…
Q: Consider an online holiday booking system and the User class in the design. Which of the following…
A: Let's see the answer:
Q: Question 1 A company is implementing Dynamics 365 and is scheduled for a cloud solution…
A: The above question is solved in step 2 :-
Q: The use of encapsulation is fundamental to object-oriented programming. A developer who makes use of…
A: Introduction: Object-oriented programming uses encapsulation (OOP). It defines combining data and…
Q: Ara Howard created a project called Fattr which implements a common desire among Ruby developers: a…
A: Here’s an example of the problem. In order to take something as simple as attr_accessor :color and…
Q: IF YOU CANT USE JSP , SERVELET AND MYSQL PLEASE LEAVE IT .IF YOU USE ANY OTHER STACK I WILL REPORT…
A: E-Commerce shop index.php <?php session_start(); ?> <!DOCTYPE html> <html>…
Q: A real-time system executing four different periodic tasks Ti(p,t) is given, with p and t…
A: Introduction: To be considered a real-time system, the response time must be guaranteed within a…
Q: 429668.2827918.qx3zqy7 Jump to level 1 Write multiple if statements: If car_year is before 1967,…
A: The above question is solved in step 2 :-
Q: Indicate the rules of inference used and the corresponding premises used
A: The premises are : 1.~(rVs) 2.~p->s 3.p->q
Q: What is the minimum number of address bits for 1024K words?
A: A software programme called a database management system (DBMS) is used to store and retrieve user…
Q: What are the various cyber security threats that you should expect and prepare for when developing a…
A: Denying services: A computer or network is flooded during a denial of service (Do's) assault, taking…
Q: What are some recommendations for governments and organizations to ensure that
A: Dear Student, The answer to your question is given below -
Q: In Java Assume code that has imported Scanner and instantiated it for keyboard input as stdln.…
A: I have provided JAVA CODE along with CODE SCREENSHOT and OUTPUT…
Q: Question AAch Full explain this question and text typing work only We should answer our…
A: Interpretation of the question As per the graph the following points are given :- This graph…
Q: How many states can a FSM have as a maximum if the state register is able to store 6 bits?
A: Introduction Finite state machine: Pattern recognition is performed using finite state machines.…
Q: What is a firewall's primary purpose? Currently, I am developing a packet filtering system. Where do…
A: Definition: We can keep hackers from getting into our computer system with the help of computer…
Q: What constitutes a good security awareness program when there is no yearly cyber security training,…
A: Introduction: Network protection and cybersecurity threat best practisesYour company's data is…
Q: Write a brief note on Analysis of the BinarySearchTreeList Implementation
A: A binary search tree follows the some order to arrange the elements.
Q: Discuss the most common sources of risk in IT projects and the steps used to lessen or eliminate…
A: IT: IT stores and retrieves data using computer systems. It's leveraging technology to make business…
Q: Given a list (43, 74, 88, 35, 60, 98) and a gap array of (3, 2, 1): What is the list after shell…
A: Shell sort is based on the Insertion sorting algorithm and it belongs to the group of very efficient…
Q: 1. Function (subroutine) implementation requires Control instructions. (T/F) 2. We have one register…
A: “Since you have asked multiple questions, we will solve the first question for you. If you want any…
Q: write algorithm GetTerm (s, i) pre-cond: s is a token string, and I is an index indicating a…
A: provided information: pre-cond: s is a token string, and I is an index indicating a starting place…
Q: The ancient Indian game of Chaturanga-from which the modern game of chess was apparently derived-was…
A: Introduction Recurrence relation: An equation that depicts a series based on a rule is called a…
Q: this code gives me an error Traceback (most recent call last): File "main.py", line 2, in from…
A: Advantages of python:- 1)Interpreted Language2)Easy to Read and Learn 3)Easy to Write4)Portability
Step by step
Solved in 3 steps
- Which (if any) of the following conditions are necessary for using polymorphism? Select all correct answers. The classes involved are in the same hierarchy. None of the classes can be abstract. All of the subclasses involved override the same method. The object reference cannot be of an interface type. An object reference of the superclass is used to call any methods. A superclass object is referenced by a subclass reference. Which of the following (if any) are true of abstract methods? Select all correct answers. Abstract methods must have a method body. Abstract methods cannot be declared in a class that isn't abstract itself. Abstract methods cannot be private or static. Abstract methods can only be declared in an interface. Abstract methods cannot be called.What does the super keyword represents and where can it be used? Give an example of a superclass and subclass. Be sure to make all the instances variables of the super class private. Include at least one constructor in each class and ensure that the constructor of the subclass calls the constructor of the superclass. Also include a toString method in both classes that returns the values of the instance variables with appropriate labels. Ensure that the toString method of subclass calls the toString method of the superclass so that the string returned contains the values of all the inherited instance variables.Now we are going to use the design pattern for collecting objects. We are going to create two classes, a class AmazonOrder that models Amazon orders and a class Item that models items in Amazon orders. An item has a name and a price, and the name is unique. The Item class has a constructor that takes name and price, in that order. The class also has getters and setters for the instance variables. This is the design pattern for managing properties of objects. The setName() method should do nothing if the parameter is the empty string, and the setPrice() method should do nothing if the parameter is not positive. The class also has a toString() method that returns a string representation for the item in the format “Item[Name:iPad,Price:399.99]”. For simplicity, we assume an Amazon order can have at most 5 items, and class AmazonOrder has two instance variables, an array of Item with a length of 5 and an integer numOfItems to keep track of the number of items in the…
- This is the question - Create an abstract NewspaperSubscription class with fields for the subscriber name, address, and rate. Include get and set methods for the name field and get methods for the address and subscription rate; the setAddress() method is abstract. Create two subclasses named PhysicalNewspaperSubscription and OnlineNewspaperSubscription. The parameter for the setAddress() method of the PhysicalNewspaperSubscription class must contain at least one digit; otherwise, an error message is displayed and the subscription rate is set to 0. If the address is valid, the subscription rate is assigned $15. The parameter for the setAddress() method of the OnlineNewspaperSubscription class must contain an at sign (@) or an error message is displayed. If the address is valid, the subscription rate is assigned $9. Code I was given - public class DemoSubscriptions { public static void main(String args[]) { PhysicalNewspaperSubscription pnsGood = new…Consider an online holiday booking system. The initial design model contains the classes, Booking, Individual_Booking and Group_Booking via inheritance. Which of the following is used to describe the relationship of the three classes in the object-oriented design? a. The has-a relationship b. The get-a relationship c. The set-a relationship d. The is-a relationshipWrite a class named Employee which implements Comparable Interface with name and salary as data field. Add a constructor with argument name and salary. Add getter and Setter for name and salary. Add CompareTo() method for the data Name. Write a class named Manager which inherits the Employee class. Add an instance variable, named department, of type String. Add a constructor in the subclass class with arguments name, salary, department and a toString() method that prints the manager’s name, department, and salary [Hint: Add a toString( ) method in the super class as well] Create 3 objects of Manager with following arguments 1. (Zayed, 500), 2. ( Ahmed, 700) 3. ( Faisal, 600) Create an Array object Add the above 3 objects into an Array object and Sort by Name and Display Create an object Employee class with argument (Zayed, 500, IT) Display the 1. Name 2. Salary 3. Department by using tostring() method.
- We have two classes, Person and Employee. Both have a field, firstName. We have instances of these objectsPerson p and Employee e. Both p and e have the same value for firstName, specifically, p.firstName = “joe”and e.firstName = “joe” Which of the following statements is necessarily true? Group of answer choices 1. p.equals(e) will return true because they contain the same firstName. 2. We don’t know if either class will have an equals method. 3. There is not enough information to tell what p.equals(e) will return. 4. p.equals(e) will return false but p == e will be true.Which of the following is true about abstract classes? Note that if a class can be sub-classed, this simply means that it can be derived from. Abstract classes can only contain abstract methods. They cannot be sub-classed. Abstract classes cannot be instantiated, but they can be sub-classed. Abstract classes can only contain abstract methods. They can be sub-classed. Abstract classes can be instantiated, but they cannot be sub-classed. Can an interface ever contain method bodies (i.e. content between {})? Unknown Yes No SometimesConsider the above scenario, where Billing class has composition relationship with Doctor having private instance variables (docName, docID and docFee) and a public getDocID() method, Patient having private instance variables (pName, pID, pDisease), Medicine having private instance variables (medID, medName, medQty, medPrice), and MedicalTest having private instance variables (testID, testName, testPrice). In addition, each class shall have toString method to display its object state. Also define getDocInfo method in Billing class that shall return the doctor. Implement getPaymentAmount() method in Billing class that shall return the total billing amount that includes doctor fee, medicine cost and medical tests fee. Considering the above scenario, write code that shall perform the following in the driver/test class: Get an amount from user. Traverse the ArrayList<Billing> using enhanced for loop. Print the billing details of those bills having total billing amount greater or…
- 1) Change the visibility of the variables and constructor in the Employee class to be more secure 2) Add an Admin class with the following features: a) The Admin class is a child of the Employee class b) Admin objects have an instance string password variable c) The Admin class has a 4 parameter constructor. One parameter sets the string, the other three parameters are used as arguments for a parent constructor call. d) Admin objects have an instance getInformation() method with a void return and an Employee object parameter. The method will request the calling Admin’s password and check user input. If input matches the password, the method will display the information of the Employee parameter Please use ***C Sharp** Language to answer the codeQ2. Write a program (Abstract+Interface) Define a class named Point containing: Two private instance variables x and y of type int. A full parametrized constructor Getters for all instance variables Define an abstract class named Shape containing: An instance variable named s of type Point. A full parametrized constructor A method named getS that returns the value of instance variable An abstract method named Area that has a return type double. Define an interface named Printable containing a method print without parameters and returning void. Define a class named Rectangle which is extended from class Shape, implements the interface printable and containing: Three instance variables named Length, Width of type int and an instance variable named d of type Point. A constructor with two parameters of type Point which initializes all the instance variables. The lengthis the difference in y-coordinates of any top and bottom point. length= Math.abs(s.getY()-d.getY()); The…Problem B Now we are going to use the design pattern for collecting objects. We are going to create two classes, a class AmazonOrder that models Amazon orders and a class Item that models items in Amazon orders. An item has a name and a price, and the name is unique. The Item class has a constructor that takes name and price, in that order. The class also has getters and setters for the instance variables. This is the design pattern for managing properties of objects. The setName() method should do nothing if the parameter is the empty string, and the setPrice() method should do nothing if the parameter is not positive. The class also has a toString() method that returns a string representation for the item in the format “Item[Name:iPad,Price:399.99]”. For simplicity, we assume an Amazon order can have at most 5 items, and class AmazonOrder has two instance variables, an array of Item with a length of 5 and an integer numOfItems to keep track of the number of items in the…