Create a class named "Manager". This class has two private attributes: Salary, Address. You want to access those private members from the Main class. You have to create an object of the Manager class then use the setter and getter methods to access those attributes. 2.
Q: Why would you use Wireshark to study the ARP Protocol?
A: Introduction: ARP is a basic technique for finding the MAC addresses of network machines that are as...
Q: question from database managment system (sql query) Exercise 1:Given an array of numbers as follows...
A: As per company guidelines we are suppose to answer only first 3 subparts of the question. Kindly re-...
Q: Projact a You have to create a program in C languaye in which the usen enters the maas M and radiusl...
A: Requirement: Write a C program in which the user enters the mass M and radius R of a circular disc ...
Q: C language 3. Develop a complete program that consists of three function name as triangle, rectangle...
A: As per the requirement program is completed. Algorithm: Step 1: Write the main() method Step 2: By u...
Q: Computer science What is the definition of a structural chart? With examples, describe the differen...
A: Introduction: What is the definition of a structural chart? With examples, describe the different so...
Q: What kind of computations are expected to be carried out exclusively by artificial intelligence unde...
A: Introduction: Not everyone was aware of what it was or how it might affect their firm. They were awa...
Q: Is it feasible to use the Ryze Tello Drone to develop a facemask detecting system? do you use python...
A: yes, it is possible to create a facemask detection using the Ryze Tello drone with help of python.
Q: What do you think one of the most essential uses of AI in enterprises is? Let's talk about it. Find ...
A: Introduction: Artificial intelligence and deep learning artificial intelligence technologies are rap...
Q: hat are the two most compelling arguments for using layered protocols?
A: Introduction: Layered protocols: These protocols are typically represented as a series of layers, ...
Q: Consider the value of wireless networks in developing countries today. Wireless technology has large...
A: Introduction: Wireless networks enable mobile users to access real-time information, allowing them t...
Q: In a table, compare the differences between microprocessors and microcontrollers.
A: We need to highlight the difference between microprocessor and microcontrollers.
Q: 2. Develop a complete program for currency conversion rate as defined in Table 1. In main function, ...
A: Step-1: StartStep-2: Declare two integer variable choice and usdStep-3: Declare a float variable con...
Q: What role does a foreign key play in a database? Please provide an example of why this is necessary.
A: A relation database is data represented as a set of relations(tables). Each table can have a primary...
Q: How can you aid in preventing internal and external threats?
A: What is threat ? A threat is nothing but a suspicious or malicious activity they can damage the sens...
Q: Siobhan's laptop is equipped with 8GB of RAM. Her operating system consumes 2GB of memory, while her...
A: Say, you have a RAM of 8GB, and OS is using 2gb ram and you run an app 's of 8GB. The OS will only ...
Q: What are the Advantages of Using IT Competently?
A: IT competitive advantage The enterprises derive a competitive advantage by applying the right techn...
Q: s a member of a banking system's information system staff, you are responsible for doing system main...
A: Introduction: This type of system maintenance is adaptive in the present scenario.
Q: What are two of virtualization's expected operating system ramifications?
A: Introduction: Administrators must examine many strategies before building an image deployment proces...
Q: What is the definition of a procedure? Describe how processes are represented in operating systems.
A: The process is a set of instructions for carrying out the actions indicated in the database. The pro...
Q: What kinds of research questions are appropriate for Software Engineering?
A: Introduction: Our research interests in software engineering are primarily of two types: developing ...
Q: Write a C++ program to generate a random vehicle registration number that is a string of length 10 a...
A: For numbers, random generated number from 0-9 is appended to '0' and for characters, random generate...
Q: Given an ordered array of n elements, partition the elements into two arrays such that the elements ...
A: We have an ordered array of n elements. We need to write a program that will make a partition of thi...
Q: What are the associated costs of implementing a database system?
A: Introduction: A database management system (DBMS) is software that offers an interface to a database...
Q: Why does the company want to link the PCs of its employees to a network? List the many computer netw...
A: Introduction: Topology refers to the network's structure and how all of the components are linked to...
Q: Is it the responsibility of the Database Administrator or the Server Administrator to perform backup...
A: Introduction: As we all know, creating backups is a necessary operation that must be done on a regul...
Q: Computer science What are some of the benefits of profiling data?
A: Introduction: Data profiling improves data quality, reduces the time required to complete major proj...
Q: In what capacity does a router function?
A: Capacity: A home router might theoretically have 254 devices connected to it. This is due to the IP ...
Q: What are the different forms of software design? For each kind, at least 5 lines are required. Desi...
A: Introduction: Software Design is the first phase in the SDLC, and it deals with changing user requir...
Q: number of addresses of a network whose one of the IP addresses is 72.250.220.112 / 27.
A: IP address An IP address is made up of a series of integers separated by periods. IP addresses are ...
Q: Alice signs the hash of a message. Suppose her hash function satisfies h(x) = 2ª (mod 101) and 1< h(...
A: Hash function: Hash function appeared in all information security application. It is a mathematical ...
Q: Explain why record allocation to blocks has a significant impact on database system performance.
A: Introduction: A database system is made up of a list of tables, each of which has a row and a column...
Q: One of the primary benefits of e-mail is spam. Is it true or false
A: Spam emails are also called unsolicited emails. They contain the information which needs to be sprea...
Q: What are the differences between centralised and parallel/distributed databases?
A: Introduction: The following are the distinctions between centralised and distributed databases:
Q: What are the two main sorts of files in general? What are the differences between these two file for...
A: The two types of files and the difference between these two file formats
Q: Do you think that technology advancements always lead to better games? What excuse do you have (or d...
A: Introduction: Better games are always the outcome of technological advancements.
Q: When developing a database, are there any ethical problems to consider? Whether sensitive personal d...
A: Introduction : There are other concerns that are associated to databases and database owners; thus, ...
Q: Typically, a BUS consists of multiple communication paths or lines. Each line is capable of transmit...
A: A bus is collection of wires that connects computer components. Buses carries information in form of...
Q: Write a C++ program to take an array of ints, print true if the sequence of numbers 1, 2, 3 appears ...
A: 1) Below is C++ program to take an array of ints , print true if the sequence of number 1, 2, 3 appe...
Q: List/explain 3 different ways that a system can recover from deadlock. Know the necessary conditions...
A: List/explain 3 different ways that a system can recover from deadlock 1. Process Termination: To eli...
Q: Create a MATLAB program to read input the length of the side of a cube(in cm) and then it displays t...
A: Accept length of the side of the cube. Calculate volume using the side^3 formula. Print the the volu...
Q: 2. List Registration numbers of all patients in H02, ward W18 who have been diagnosed with "Flu" b...
A: List Registration numbers of all patients in H02, ward W18 who have been diagnosed with "Flu" but fo...
Q: What are the various computer programming languages? Provide a succinct summary of each.
A: What are the various computer programming languages? Provide a succinct summary of each.
Q: Computer science Determine the most often used file characteristics and operations, as well as a br...
A: Introduction: Determine the most often used file characteristics and operations, as well as a brief ...
Q: Convert the decimal signed number -7 into 8-bit signed binary number. The signed binary number is 11...
A: Here in this question we have given a decimal number (-7) and we have asked to convert it into sign...
Q: What are the drawbacks of file processing systems?
A: Answer: Definition: A file processing system is a group of files and programs that is used to access...
Q: When it comes to Ethernet LANs, what is the maximum transmission rate?
A: A LAN is a network of computers and other electronic devices that covers a small area such as a room...
Q: opening files
A: Opening files
Q: What is the time complexity of converting a random array of size m to a heap?
A: Answer :
Q: Answer the following questions based on the boolean expression below: A'B(C B) + AB(C B)' A)Draw t...
A:
Q: Consider the following AND/OR graph to describe a simple automobile diagnostic system using IF-THEN ...
A:
Step by step
Solved in 3 steps with 2 images
- Write a class called profileID, which has data members firstName, lastName, age, and birthday. Instantiate an object ECE as an object of class profileID.Please complete the following tasks: Write a class “Actor” that contains two attributes with the appropriate level of visibility explicitly defined. “Name” which is a String, Private, “NumberofAwards” which is an integer, private Write a default Constructor for this class that initializes the name to “Bob Smith” , and the number of awards to 0. Write an overload the constructor for this class that accepts actor’s name as a parameter Write accessor methods for each of the attributes. Write a method “winsAnOscar” that increases the number of awards by one and prints “The crowd applauds for <actor’s name>!” Be sure to use accessors where appropriate. Make sure your header is complete, with the appropriate level of visibility and any required keywords.This is the question - Create an abstract NewspaperSubscription class with fields for the subscriber name, address, and rate. Include get and set methods for the name field and get methods for the address and subscription rate; the setAddress() method is abstract. Create two subclasses named PhysicalNewspaperSubscription and OnlineNewspaperSubscription. The parameter for the setAddress() method of the PhysicalNewspaperSubscription class must contain at least one digit; otherwise, an error message is displayed and the subscription rate is set to 0. If the address is valid, the subscription rate is assigned $15. The parameter for the setAddress() method of the OnlineNewspaperSubscription class must contain an at sign (@) or an error message is displayed. If the address is valid, the subscription rate is assigned $9. Code I was given - public class DemoSubscriptions { public static void main(String args[]) { PhysicalNewspaperSubscription pnsGood = new…
- 1. Create a Student class that implements the Person interface. As well as storing the students name and email, also store their course grade (e.g A, B, C) in a member variable. The grade should be accessible via a getGrade method. For the implementation of getDescription return a message along the lines of “A C grade student”, substituting the students actual grade.2. Create a Lecturer class that implements the Person interface. This class should also store the subject that the lecturer teaches. Add a getSubject method, and implement getDescription so that it returns a suitable message, e.g. “Teaches Biology”.3. Create a third class, Employee that implements the interface. This should also store the name of the department the Employee works in (available via getDepartment). Again, getDescription should return a suitable message.Is there a different way of doing this problem? Question: Create a class AccessPoint with the following attributes: x - a double representing the x coordinate y - a double representing the y coordinate range - an integer representing the coverage radius status - On or Off Add constructors. The default constructor should create an access point object at position (0.0, 0.0), coverage radius 0, and Off. Add accessor and mutator functions: getX, getY, getRange, getStatus, setX, setY, setRange and setStatus. Also, add a set function that sets the location coordinates and the range. Add the following member functions: move and coverageArea. Add a function overlap that checks if two access points overlap their coverage and returns true if they overlap. Add a function signalStrength that returns the wireless signal strength as a percentage. The signal strength decreases as one moves away from the access point location. Test your class by writing a main function that creates five access…Create a subclass of the Employee class from Question 2 named ShiftSupervisor. Add the salary and bonus attributes to it, and override_init_and_str_accordingly. Add the appropriate accessor and mutator methods and check the functionality by prompting a user to input the data for a Shift Supervisor object. Use_str__ to print the result.
- For this portion of the assignment you will need to create the Employee class * based on the instructions in the API and have implemented the Equals method for that class. * * There is one parameter being passed as to this method that you will use as part of your solution:* An Employee object reference with the identifier testEmployee* * 1) Instantiate an instance of the Employee class using the default constructor and * assign it to an object reference with the identifier defaultEmployee* * 2) Instantiate an instance of the Employee class using the alternate constructor, * passing the following arguments:* name: "Keanu Reeves"* ID: 10010* salary: 78000.00* Assign the instance to an object reference with the identifier keanuEmployee* * 3) Declare a variable of type Employee with the identifier excellentEmployee and assign it * a reference to the same object that is being referenced by the keanuEmployee object reference. * 4) Construct a selection statement that tests if testEmployee is…The Profile class constructor has a self parameter and three additional parameters: status, age, and username. Input values status1, age1, and username1 are read representing the information of a profile. Instantiate a new instance of Profile by assigning profile1 with an instance of Profile with status1 as status, age1 as age, and username1 as username.1.How do we gain access to private attributes outside of the class they are defined? Through public methods Through static methods Through private methods Through the class identifier 2. If you were designing a class called Point and the class had a static variable or function, which of the following would either define or use it correctly? self.x = x self.increaseNumPoints() def mystery(self, x, y): Point.numPoints += 1 3.To promote security and object ecapsulations, object attributes should be declared as: static protected private public 4. Two underscores ( __ ) will precede: public attributes private attributes public methods private methods Both public attributes and methods both private attributes and methods 5. Which of the following is required in a class to create unique…
- Consider an online holiday booking system. The users can register and log in to book a holiday package. The software development team is planning to apply the Gang of Four (GoF) Singleton pattern to the Security_Check class (as the Singleton class) which will monitor customers’ sign in activities. Which of the following is FALSE? Select one: a. The Security_Check class should provide a private method for the access of its object by external objects. b. The get method for the Security_Check object should be public. c. The Security_Check class should be responsible for creating one object to deal with different requests. d. The Security_Check class should have a private attribute for its object.Consider an online holiday booking system. The users can register and log in to book a holiday package. The software development team is planning to apply the Gang of Four (GoF) Singleton pattern to the Security_Check class (as the Singleton class) which will monitor customers’ sign in activities. Which of the following is FALSE? Select one: a. The Security_Check class should provide a private method for the access of its object by external objects. b. The get method for the Security_Check object should be public. c. The Security_Check class should be responsible for creating one object to deal with different requests. d. The Security_Check class should have a private attribute for its object. I just need only the answerCreate a class Client_Information, inherited from the class personType with an additional data member to store Emirates ID, Age, date of birth. (Use the class dateType to store the date of birth. Add appropriate constructors and methods to initialize, access, and manipulate the data members. Write a main function to test the classes, Make a record of 10 customer’s accounts using Arrays. in C++