LTE . The classes Name and Date are separate classes used as properties in the Employee class. 9:59 Class Employee is the superclass of the classes SalariedEmployee and HourlyEmployee The superclass has the
Q: Tell me about the difficulties you've encountered when using Business Intelligence.
A: Business Intelligence: BI analyses business data such software, domains, technologies, etc. To…
Q: The size of the intersection divided by the size of the union is used to determine how similar two…
A: Let's start with a brute force approach as this problem looks fairly challenging. It will at the…
Q: Why are wiretapping and network sniffing seen as a passive threat yet they share many similarities?
A: Wiretapping refers to the unauthorized interception or recording of private or confidential…
Q: Write a program that lists all ways people can line up for a photo (all permutations of a list of…
A: According to the information given:- We have to follow the instruction in order to get desired…
Q: Create a function named min that accepts an integer array and its size and returns the smallest…
A: Please refer to the following steps for the complete solution to the problem above.
Q: Why would you choose to utilize a Web Service rather than a more conventional application?
A: Protection of your data:web applications offer a good way to securely access centralized data.
Q: How many mistakes in a message may be detected by using a parity bit?
A: According to the information given:- We have to describe number of mistakes in a message may be…
Q: Given how often these two key components change, it is practically impossible to maintain top…
A: Any programming language requires the usage of different variables to store data when programming.…
Q: When developing multipurpose software, why should you stay away from assembly language? When might…
A: Introduction Multipurpose Software: Multipurpose software is a type of software that can perform…
Q: Avalanches: what are they? a block cypher with an avalanche effect? Be particular
A: In cryptography, an avalanche effect is a desirable property of block ciphers, where a small change…
Q: Create a Java program to output information for two payees including the following information about…
A: Introduction Classes in Java are the basic building blocks of code and are used to define objects…
Q: How do Boolean expressions work? What are they used for?
A: What does a Boolean expression actually mean? A logical assertion that can only be TRUE or FALSE is…
Q: A web server is a specific sort of computer that is used to deliver material from the internet.
A: A web server is a software program that runs on a computer and is designed to serve web pages to…
Q: For the following exercises, give a regular expression that represents that described set. 2. The…
A: Introduction: A regular expression (regex) is a character sequence that defines a search pattern.…
Q: diagrams depicting the software development process
A: 1. Programming is the process of creating a set of instructions that tells a computer how to perform…
Q: Which kind of parallelism in a program, data or control, is optimal for SIMD implementation? Can you…
A: Introduction : SIMD stands for Single Instruction, Multiple Data. It is a type of parallel computing…
Q: Describe your reasoning for selecting time-sharing processing versus batch processing.
A: Process time-sharing When jobs are assigned a certain amount of time and the operating system…
Q: Think about the importance of wireless networks in today's emerging countries. In many places,…
A: Introduction: WLANs provide a LAN in a confined space, such as a home, school, computer lab, campus,…
Q: Write an essay outlining the distinctions between wide-area and local-area networks, focusing on…
A: A collection of computers and related peripherals in a constrained space, such as a classroom, lab,…
Q: When it comes to debugging, using print statements or manual walkthroughs both have their own set of…
A: About: What Is RST Debugging, exactly?A developer will instrument their application with "print"…
Q: What exactly do you mean when you talk about "web pages"?
A: Web pages are a kind of hypertext document (a collection of text, images, audio, and video, among…
Q: Describe ebool format.
A: An eBook is a reflowable and non editable book which is converted into the digital format and this…
Q: Can you explain what a boolean expression is?
A: Introduction: In computer languages, a Boolean expression is a kind of expression. When this…
Q: What exactly is the purpose of the term "debugging"?
A: Introduction: Finding and fixing weaknesses in software code, sometimes referred to as "bugs," that…
Q: For instance, wireless networks are crucial in today's developing countries. Wireless technology has…
A: Wireless technology has mostly superseded wired local area networks (LANs) and cables. Drawbacks to…
Q: Give a practical example of data manipulation, forgery, and online jacking to illustrate your point.
A: INTRODUCTION: The protection of computer systems and the information they contain against damage,…
Q: Five software development projects are under your direction. The project's qualities are as follows:…
A: The model or strategy to use for a project would depend on the specific requirements and constraints…
Q: Defining the impact of setting your system's default runlevel/target to runlevel 6 or rebooting.…
A: Rebooting:- Rebooting is the process of restarting a computer or device. It is usually done to fix…
Q: ow does a Type 1 hypervisor vary from a Type 2 one?
A: A Type 1 hypervisor, also known as a bare-metal hypervisor, runs directly on the host's physical…
Q: Consider a relation (p, q, r, s, t, u, v) with functional dependencies as given below: p➜q r➜s,t…
A: A candidate key is a set of attributes in a relation that uniquely identifies a tuple in the…
Q: Find and replace all instances of the text "Salaries" with Salary. (Hint: You should find and…
A: The formula for find and replace in MS Excel is: Go to Home or Press Ctrl+H > Find & Select…
Q: What distinguishes conceptual data modeling, relational data modeling, and relational data modeling?
A: Introduction Relational data modeling and conceptual data modeling are two distinct methodologies…
Q: What is data modeling such an essential tool?
A: Data modelling is an essential tool for organizations to accelerate their application development…
Q: The similarity of two documents (each with distinct words) is defined to be the size of the…
A: To solve this problem, we can use a hash table (dictionary) to store the documents, where the key is…
Q: Differenciate between Sistema y Sistemas Embedidos Let's have a look. Can Embedded applications be…
A: The Spanish term for "system" is sistema. The term "Embedded Systems" refers to computer systems…
Q: In what ways are RAM useful? Create a list containing just two groups. Is flash memory used for the…
A: RAM (Random Access Memory) is useful in a number of ways, including: Speed: RAM is much faster…
Q: Consider the following generalization of the maximum matching problem, which we call…
A: Answer: The proof that Strict-Matching is NP-complete is shown through a reduction from the…
Q: Python code to calculate the eigenvalues and eigenvectors of a matrix from the numpy linalg library…
A: Introduction Numpy is a Python library that provides support for large, multidimensional array and…
Q: All these topics are related to cyber security so give me 1. long introduction of personal security…
A: Introduction Cyber security: Protecting networks, systems, and software from online dangers is the…
Q: 1. Company X is conducting a survey on their redesigned spinning drives. They need to compare the…
A: 1a. The average booting time using spinning drive is 37.5 seconds. b. The histogram for booting…
Q: How can Microsoft Office be utilized to boost workplace effectiveness and productivity?
A: The following are some of the numerous ways in which the efficiency and productivity of the…
Q: erred to as debug
A: Introduction: Debugging is the process of identifying and fixing bugs (defects or issues that…
Q: x86 Assembly Language Programming What will be the final value in EDX after this code executes? mov…
A: A computer is a digital electronic machine that can be programmed to automatically perform a series…
Q: In your experience as a manager, what have you come to expect? Tell me about the attractive and…
A: The following qualifications are necessary for a management position: • You need to have the ability…
Q: Consider the following recursive function GUESS(n, m) written in pseudocode. Hand trace the code to…
A: I have converted the above pseudocode into c++ code. I have provided C++ CODE along with CODE…
Q: odels of machine learning are taught using datasets that are rich in features (or attributes). On…
A: The "utility" of a feature in a machine learning model refers to its relevance and importance in…
Q: Briefly define the following crimes
A: Briefly define the following crimes in your own words. No need for further explanation, just define…
Q: Is there anything else besides a PKI-based solution that provides key recovery that someone like…
A: Given: To prevent Peter from forgetting his password, are there any tools that he or someone else…
Q: Take a look around Ford's exterior and inside. opportunities and threats, and Ford's internal and…
A: The SWOT analysis of a project evaluates its strengths, weaknesses, opportunities, and threats. It…
Q: Can today's automated systems, such as Mechanical Turk, be fooled? What would set today's Turks…
A: using an automated to dupe people: "No," you cannot deceive people using a method like Mechanical…
OOPs
In today's technology-driven world, computer programming skills are in high demand. The object-oriented programming (OOP) approach is very much useful while designing and maintaining software programs. Object-oriented programming (OOP) is a basic programming paradigm that almost every developer has used at some stage in their career.
Constructor
The easiest way to think of a constructor in object-oriented programming (OOP) languages is:
Step by step
Solved in 2 steps
- Make a class Person, with instance variable name, age, and gender. Make a class Employee inheritfrom Person, with extra data for salary, and hiring date. Make another class Student inherit from Person,with data for program name, level (undergraduate/graduate), and program year. Supply required methods forthe superclass and the subclasses. Make a subclass Manager from Employee, with bonus salary, andoverride the corresponding method(s). Provide toString method for the Employee class and its subclass,Manager, such that it returns employee name, type of the employment, and salary. For instance if you createan object, manager1, from Manager class, with name=”John Smith” and annual salary of $125,000 and bonusweekly bonus of $200, and then write a print statement like System.out.println(manager1); , the output willbe:John Smith, Manager, Salary = $125,000/year, Weekly bonus = $200(Keeping mutables safe) Suggest a simple scheme for creating a new classSafeMember that would allow us to export a reference to a Member. Theclasses outside the system should be unaware of this additional class, and accessthe reference like a reference to a Member object. However, the reference wouldnot allow the integrity of the data to be compromised.Create a Cycle class, with subclasses Unicycle, Bicycle and Tricycle. Demonstrate that an instance of each type can be upcast to Cycle via a ride( ) method. Using the above Cycle hierarchy, add a balance( ) method to Unicycle and Bicycle, but not to Tricycle. Create instances of all three types and upcast them to an array of Cycle. Try to call balance( ) on each element of the array and observe the results. Downcast and call balance( ) and observe what happens.
- create an Abstract class AbstractCat with the sameproperties and methods as Cat.... Create class AbstractCat. How to secure data?To protect it from direct access and manipulation from outside of the classwe need to make our instance data fields private. To let clients still manipulate data under our control we can provide thempublic getters and setters.. create getters, setters, constructors and toString(). Test AbstractCat classa package ParentPackage, define a class Code Tantra with the instance variables-student name, registration number, a float array of length 7 (to store the marks scored in 7 questions in TermEnd exam), total marks and percentage. Define a constructor that receives the name, registration number and an array of 7 marks and adds the top 5 marks and stores the sum in total marks in the same package, define a class Percentageclass with a method to calculate the percentage Define a subpackage ChildPackage" with a class GradeClass that inherits the PercentageClass and includes a method to print the count of S. A. B, C D E and 'F' grades, based on the percentage obtained(Java Code)Create an abstract NewspaperSubscription class with fields for the subscriber name, address, and rate. Include get and set methods for the name field and get methods for the address and subscription rate; the setAddress() method is abstract. Create two subclasses named PhysicalNewspaperSubscription and OnlineNewspaperSubscription. The parameter for the setAddress() method of the PhysicalNewspaperSubscription class must contain at least one digit; otherwise, an error message is displayed and the subscription rate is set to 0. If the address is valid, the subscription rate is assigned $15. The parameter for the setAddress() method of the OnlineNewspaperSubscription class must contain an at sign (@) or an error message is displayed. If the address is valid, the subscription rate is assigned $9. Finally, write an application that declares several objects of both subscription subtypes and displays their data fields
- Assume ContractEmployee, HourlyEmployee, CommissionEmployee, FixSalaryEmployee are sub-classes of Employee class. Define the body of below method suchthat it shall print how many employees of each type the ArrayList object passed as parametercontains? Static void countAndPrintAllTypesOfEmployee (ArrayList employees) { }Model a room class, whose member data is three integers length, width and height. The classcontains two constructors to initialize the room class objects, first is no argumentconstructor, while the second in three arguments constructor. Class also contains threemember functions i.e., getdatat) to get the data from user and store in the memory of callingobject and showdata) to show the room data of calling object, int volume(int I, int w, int h)function should receive the length, width and height values from the objects one by one andreturn the volumes of the three objects respectively.Write a main program to declare the three object rl, 12, and 13 of room class. Two objectwill store the values through three argument constructor and third object will get the datafrom user by calling getdata function. Then all three objects should call the volumefunctions to calculate their volumes and store them in three variables of type integer. Finallythe system compare the three volumes values…This is the question - Create an abstract NewspaperSubscription class with fields for the subscriber name, address, and rate. Include get and set methods for the name field and get methods for the address and subscription rate; the setAddress() method is abstract. Create two subclasses named PhysicalNewspaperSubscription and OnlineNewspaperSubscription. The parameter for the setAddress() method of the PhysicalNewspaperSubscription class must contain at least one digit; otherwise, an error message is displayed and the subscription rate is set to 0. If the address is valid, the subscription rate is assigned $15. The parameter for the setAddress() method of the OnlineNewspaperSubscription class must contain an at sign (@) or an error message is displayed. If the address is valid, the subscription rate is assigned $9. Code I was given - public class DemoSubscriptions { public static void main(String args[]) { PhysicalNewspaperSubscription pnsGood = new…
- What does the super keyword represents and where can it be used? Give an example of a superclass and subclass. Be sure to make all the instances variables of the super class private. Include at least one constructor in each class and ensure that the constructor of the subclass calls the constructor of the superclass. Also include a toString method in both classes that returns the values of the instance variables with appropriate labels. Ensure that the toString method of subclass calls the toString method of the superclass so that the string returned contains the values of all the inherited instance variables.solve this by arraylist in the last of the question it has been told Create abstract class Pet , which is the abstract superclass of all animals. Declare a integer attribute called legs, which records the number of legs for this animal. Define a constructor that initializes the legs attribute. Declare an abstract method eat. Declare a concrete method walk that prints out something about how the animals walks (include the number of legs). Create the Dog class. The Dog class extends the Pet class. This class must include a String attribute to store the name and food of the pet Define a default constructor that calls the superclass constructor to specify that all dogs have 4 legs and name. override the eat and walk method. Create the Cat class that extends Pet. This class must include a String attribute to store the name of the pet, and a string to save food . Define a constructor that takes one String parameter that specifies the cat's name and food. This constructor must also…Assume that we have four classes: Person, Teacher, Student, and PhDStudent. Teacherand Student are both subclasses of Person. PhDStudent is a subclass of Student.A.Which of the following assignments are legal, and why or why not?Person p1 = new Student();Person p2 = new PhDStudent();PhDStudent phd1 = new Student();Teacher t1 = new Person();Student s1 = new PhDStudent();Suppose that we have the following legal declarations and assignments:Person p1 = new Person();Person p2 = new Person();PhDStudent phd1 = new PhDStudent();Teacher t1 = new Teacher();Student s1 = new Student();B.Based on those just mentioned, which of the following assignments arelegal, and why or why not?s1 = p1;s1 = p2;p1 = s1;t1 = s1;s1 = phd1;phd1 = s1;