The details of each work out must be stored in a class called WorkOut object shown in the class diagram. Use the class diagram to code the WorkOut object. WorkOut start: DateTime end: DateTime description : string level : integer - points: real numWorkOuts: integer + LOW: integer <=4 + MEDIUM : integer 8 + Constructor (p: real, n:integer) + Constructor (s:string, e:string, d:string, 1:integer) + get Points () : real + getNumWorkOuts (): integer
Q: When we buy a packaged data model, we receive whatever element we obtain as part of the deal.
A: Start: The package data model depicts the link between database tables containing package…
Q: Draw the equivalent one flip-flop per state. PQ = 00 A 2 X B Link 2 1 с 0 X X Link 3 PQ-01 Link 4…
A: Here is the two flip-flops are P and Q.
Q: visual studio
A: Most of the programming langauge thata is used for 2d game are Unity, C#, UnityScript
Q: How many different types of languages are there in computer science?
A: Introduction: Computer science's language: Way to instruct the machine/hardware Help to communicate…
Q: Identify the many types of hacks and viruses, and provide an explanation of how a business may…
A: Given: Reduce noise pollution by driving an electric automobile or requiring quieter engines, tires,…
Q: For Linux, everything is considered a file, including regular files, directories and hardware…
A: The answer is given below... Check it out...
Q: Following the completion of the first rendering, the graphics pipeline proceeds to the next stage,…
A: Given: The graphics pipeline: The second phase of the graphics pipeline is transformation. In your…
Q: Why is it thought that the issue of system security is more complex than the problem of system…
A: System Safety and System Security both are the necessity of the system but if we compare the…
Q: Computer animations are created by arranging and displaying a series of still pictures in a certain…
A: Explain: Computer animations are the sequencing and presentation of a group of pictures to produce…
Q: Which two of the following are the most compelling arguments in favor of layered protocols? Please…
A: Your answer is given below. Introduction :- A layered protocol architecture is a notion for…
Q: What specific computer science knowledge do I require?
A: You must be familiar with basic's of programing, the processes of designing and creating…
Q: In a network that is switched as well as routed, how can the department ensure that users always…
A: Given: Below, the department ensures network access in a switched and routed network. A host may…
Q: Machine Learning You are given the scatter of points (x,y) = (1, 1.5), (4, 3.5), (7, 9), (10, 8).…
A:
Q: To what end does incorporating animation into a presentation serve?
A: Introduction: Animating a PowerPoint presentation may help it become more lively and memorable. Two…
Q: Two distinct types of intrusion detection and prevention systems (IDPS) are distinguishable from one…
A: In a more complicated information technology setting, it is more difficult to analyze network…
Q: What are some of the downsides of using symmetric encryption, particularly when it comes to key…
A: Start: Symmetric encryption uses a single key to encrypt and decrypt data. When you encrypt a…
Q: To transmit the data 1011000 to his friend using hamming code technique. Calculate (i) number of…
A: 1. 4 bits [0,1,0]2. 7, 6, 5, 4, 3, 2, 13. 7 bits4. 10110105. After using the hamming code…
Q: In the context of artificial intelligence, what exactly are rationality
A: The answer is
Q: A firm's awareness of current cybersecurity defensive measures may help it prioritize risk…
A: Given: In most firms, the notion of an information security perimeter with trusted goods "inside"…
Q: a proxy firewall in the DMZ that may access an internal Web server using a "server farm" setup…
A: Given: A server farm, also known as a server cluster, is a collection of computer servers maintained…
Q: The term "visual computing" is broken down into its component parts.
A: Start: One of the most intriguing fields of computer science is visual computing. Computers have…
Q: What are the benefits of using distributed systems? (describe both its strengths and its weaknesses)
A: A distributed system is a computing environment in which various components are spread across…
Q: Which technique is more effective: a bottom-up one or a top-down one?
A: In the given question top-down approach relies on higher authority figures to determine larger…
Q: 1. Perform the following subtraction using 10's complement on 532 - 794.
A: subtraction using 10's complement 532-794
Q: What are the strengths and disadvantages of the NIMS system when it comes to crisis communication??…
A: Introduction: The National Event Management System (NIMS) is a rational, comprehensive method to…
Q: Where are data for marketing research obtained? Giveexamples of internal and external data
A: Data for marketing research can be obtained from internal and external sources. Subjective…
Q: Provide an example of one kind of sensor that may be found in mobile devices.
A: To write sensor examples for mobile devices.
Q: I/O addressing is usually divided into unified addressing and _______.
A: Given: I/O addressing is usually divided into unified addressing and _______.
Q: Design a Turing machine recognizing the language L = L{w : w contains the substring 01} over Σ =…
A: The output of the machine is : 0011 which contains the substring 01.
Q: {"customer_no": 54, "school": {"value": "you are me"}} I want the answr in csv format customer_no
A: In python to write output to csv file we have to import csv package. Python dictionary is an…
Q: Why are watchdog clocks necessary in so many of the embedded devices that we use today? Embedded…
A: Launch: This section explains the need of watchdog clocks in embedded systems. Embedded systems are…
Q: What exactly is the distinction between symmetric and asymmetric key cryptography?
A: Answer: A key in cryptography is a piece of information, usually a string of numbers or letters that…
Q: Show that the following grammar is ambiguous: S SAYIY Y→Y/TIT T-SI CHAR CHAR→al blc|d
A:
Q: To transmit the data 1011000 to his friend using hamming code technique. Calculate (i) number of…
A: Answer: Given transmitting the data 1011000 and our policy is answer the first three from the first…
Q: this and the following question, consider those TMs that satisfy all of the following properties: •…
A: The Answer is
Q: с В D E
A: Answer - As the given graph has a cycle so we cannot use the backtracking approach. We need to use…
Q: To put Razor Technology into perspective, think of it as the cloud-based disaster recovery service…
A: Disaster recovery is the process of rapidly restoring essential business services in the event of a…
Q: Consider the following source code : c = a + b d = c c = c – e a = d – e b = b * e b = d/b…
A: Given source code is c = a + b d = c c = c – e a = d – e b = b * e b = d/b
Q: Create a single regular expression that matches a string of digits and contains exactly two fives.…
A: Hence there is no programming language mentioned so, I have used python for the solution. please…
Q: Describe some of the data security measures that are utilized in tandem with software-based…
A: Software-based security: The inquiry is interested in learning more about the software-based…
Q: are so many people nowadays so eager to communicate with one another over the
A: Lets see the solution.
Q: Make a list of the characteristics you'd want to see in an entity identification property.
A: Answer:
Q: How would you recommend moving the view of your Visual Studio project to a new form?
A: INTRODUCTION: Adjusting the position, size, and behaviour of windows in Visual Studio enables users…
Q: Examine and brief thoroughly the tools and methods used to in below (Include the Pros and Cons For…
A: A failure mode is a cause of failure or one possible way a system can fail. When a system has many…
Q: Discuss the relevance of rules and processes and a business continuity strategy with your…
A: The following are some of the reasons why corporate policies and processes are so important: 1) The…
Q: Describe the patterns used in distributed architecture. Critically!!, talk about the benefits and…
A: In a distributed architecture, components are displayed on separate platforms, and several members…
Q: Write a python code that asks the user to enter several numbers that are a multiple of 5. If the…
A: Please upvote, I am providing you the correct answer below. Please please please,
Q: Fix the bug
A: In computer technology, a bug is a coding error in a computer program. It is used to describe any…
Q: DRaaS: Disaster Recovery as a Service and Razor Technology provide similar services. To what extent…
A: Given: Disaster recovery as a service (Dramas) is a cloud computing service model that allows an…
Q: Race conditions are possible in many computer systems. Consider an accounting system of an…
A: For the most part, A race condition happens inside the basic segment. In OS terms basic segment is…
Step by step
Solved in 2 steps
- Develop a sequence diagram for the process of booking a seat on an airplane flight with the below minimum requirements. 4.1 Create instances (objects) for the classes UserInterface, Airline, Flight, Traveller4.2 Create a minimum of 6 messages and represent the message calls between all the objects.4.3 Make sure the object lifelines and the activations are well represented and clear.Note: Assume that there are no complex interactions that need to be displayed. NOTE: please note that i need answers from 4.1 to 4.3 seprately as shown in pictures.For Example, just give answer for 4.1 seprately, then for 4.2 seprately and lastly 4.3 seprately. i dont want all 3 questions answer in one, 3 questions 3 answers, all need seprately. Thank you.answer for task 2 only the question also refers to some of the stuff on task 1 skip 1 Draw the UML class diagrams for the following classes: An abstract Java class called Person that has the following attributes: a String called idNumber a Date called dateOfBirth representing the date of birth. a String for name A class called VaccineRecord with the following attributes: an enum called type of VaccineType a Date called date a String called batchCode A class called Patient that extends the Person class and has the following attributes and behaviours: an ArrayList that contains VaccineRecord objects called vaccinationRecord a public method called vaccinate that takes a VaccineRecord with the following signature: public void vaccinate(VaccineRecord vaccineRecord); a public boolean method called isVaccinated that returns whether or not the Patient has had a vaccine. A MedicalPractitioner class that extends the Person class and has the following attributes and behaviours: a…Develop a sequence diagram for the process of booking a seat on an airplane flight with the below minimum requirements. 4.1 Create instances (objects) for the classes UserInterface, Airline, Flight, Traveller4.2 Create a minimum of 6 messages and represent the message calls between all the objects.4.3 Make sure the object lifelines and the activations are well represented and clear.Note: Assume that there are no complex interactions that need to be displayedKindly Draw a neat and clean diagram using staruml.
- Develop a sequence diagram for the process of booking a seat on an airplane flight with the below minimum requirements. 4.1 Create instances (objects) for the classes UserInterface, Airline, Flight, Traveller4.2 Create a minimum of 6 messages and represent the message calls between all the objects.4.3 Make sure the object lifelines and the activations are well represented and clear.Note: Assume that there are no complex interactions that need to be displayed. NOTE: please provide and fill the answers from 4.1 to 3.3 seprately as shown in pictures.object oriented programming (oop) please give me full answer thanks Learning Objective:1. Classes and Object Creation 2. Access specifies. How to use it? 3. What is Constructor. 4. Practical walk through. 5. ExercisesClasses and Objects A class is like a blueprint of data member and functions and object is an instance of class. For example, let’s say we have a class Car which has data members (variables) such as speed, weight, price and functions such as gearChange(), slowDown(), brake() etc. Now let’s say I create a object of this class named FordFigo which uses these data members and functions and give them its own values. Similarly, we can create as many objects as we want using the blueprint(class)class Car { //Data members char name[20]; int speed; int weight; public: //Functions void brake(){ } void slowDown(){ } }; int main() { //ford is an object Car ford; } Access specifies (Private, Public and protected) The body of the class contains two unfamiliar keywords: private and…This is the question - Create an abstract NewspaperSubscription class with fields for the subscriber name, address, and rate. Include get and set methods for the name field and get methods for the address and subscription rate; the setAddress() method is abstract. Create two subclasses named PhysicalNewspaperSubscription and OnlineNewspaperSubscription. The parameter for the setAddress() method of the PhysicalNewspaperSubscription class must contain at least one digit; otherwise, an error message is displayed and the subscription rate is set to 0. If the address is valid, the subscription rate is assigned $15. The parameter for the setAddress() method of the OnlineNewspaperSubscription class must contain an at sign (@) or an error message is displayed. If the address is valid, the subscription rate is assigned $9. Code I was given - public class DemoSubscriptions { public static void main(String args[]) { PhysicalNewspaperSubscription pnsGood = new…
- A class called Book is designed (as shown in the class diagram) to model a book written by one author. It contains: Four private instance variables: name (String), price (double) static, and qty (int); Two constructors: public Book (String name, double price) { ...... } public Book (String name, double price, int qty) { ...... } getters/setters methods getName(), getPrice(), setPrice(), getQty(), setQty(). A toString() that returns book values. A class called Author is designed to model a book's author. It contains: Four private instance variables: name (String), email (String), and gender (char of either 'm' or 'f') and arrayList of Books. One constructor to initialize the name, email and gender with the given values; public Author (String name, String email, char gender) {......} public getters/setters. A toString() method that returns author object. A method addBook(Book b) which will add book in the Arraylist of books.…A class called Author (as shown in the class diagram) is designed to model a book's author. It contains: Three private instance variables: name (String), email (String), and gender (char of either 'm' or 'f'); One constructor to initialize the name, email and gender with the given values; public Author (String name, String email, char gender) {......} (There is no default constructor for Author, as there are no defaults for name, email and gender.) public getters/setters: getName(), getEmail(), setEmail(), and getGender();(There are no setters for name and gender, as these attributes cannot be changed.) A toString() method that returns string representation of author. A class called Book is designed (as shown in the class diagram) to model a book written by one author. It contains: Four private instance variables: name (String), author (of the class Author you have just created, assume that a book has one and only one author), price (double), and qty (int); Two constructors:…A class called Author (as shown in the class diagram) is designed to model a book's author. It contains: Three private instance variables: name (String), email (String), and gender (char of either 'm' or 'f'); One constructor to initialize the name, email and gender with the given values; public Author (String name, String email, char gender) {......} (There is no default constructor for Author, as there are no defaults for name, email and gender.) public getters/setters: getName(), getEmail(), setEmail(), and getGender();(There are no setters for name and gender, as these attributes cannot be changed.) A toString() method that returns string representation of author. A class called Book is designed (as shown in the class diagram) to model a book written by one author. It contains: Four private instance variables: name (String), author (of the class Author you have just created, assume that a book has one and only one author), price (double), and qty (int); Two constructors:…
- A class called Author (as shown in the class diagram) is designed to model a book's author. It contains: Three private instance variables: name (String), email (String), and gender (char of either 'm' or 'f'); One constructor to initialize the name, email and gender with the given values; public Author (String name, String email, char gender) {......} (There is no default constructor for Author, as there are no defaults for name, email and gender.) public getters/setters: getName(), getEmail(), setEmail(), and getGender();(There are no setters for name and gender, as these attributes cannot be changed.) A toString() method that returns string representation of author. A class called Book is designed (as shown in the class diagram) to model a book written by one author. It contains: Four private instance variables: name (String), author (of the class Author you have just created, assume that a book has one and only one author), price (double), and qty (int); Two constructors:…In the following there are two classes, Employee and Manager. Manager is a subclass of Employee. The implementation of Employee class is given (Note: no getter methods are provided, so you are not able to access instance variables through getter methods in the subclass). The skeleton of the Manager class definition is given. Complete the constructor method, and the toString method for the subclass (see the details below). public class Employee { private String name; private double salary; // Make an employee with a given name and salary. public Employee(String aName, double aSalary) { name = aName; salary = aSalary; } // Provide a string description of an employee. public String toString() { return "Name: " + name + "\tSalary: " + salary; } } public class Manager extends Employee { private String department; // Make a manager with a given name, salary, and department. public Manager(String name, double salary, String department) { // put your code below } // Provide a string…If you fly in economy class, then you can be promoted to businessclass, especially if you have a gold airline card for privateflights. If you do not have a gold card, you can "reset" fromflight if the plane is full or you are late for check-in. All thesethe conditions are shown in the diagram below. Note that all statements(operators) are numbered. You run 3 tests:Test 1 - Gold card holder upgraded to business classTest 2 - Passenger without gold card remains in economy classTest 3 - Passenger who was "thrown" off the flightWhat is the statement coverage of these three tests?A. 60%B. 70%C. 80%D. 90%