Write the Student class so that the given code provides the expected output. 1. Create Student class 2. Create 3 class variable 3. Create 1 class method for object creation 4. Create 1 class method for printing
Q: Use the random substitution cipher below to encrypt the following message: Virtual Event. Write the…
A: Given message is Virtual Event We need to get each character from the original message and get the…
Q: What is 25.25 to IEEE 754 32-bit single precision floating point format (BIAS 127) 0 10000101…
A:
Q: What are the advantages and disadvantages of caching write operations on a disk?
A: Introduction: This includes initializing, analyzing, and partitioning the raw disc; initializing the…
Q: Many embedded systems need watchdog clocks for various reasons.
A: INTRODUCTION: The watchdog timer (WDT) is a component of the simplest type of embedded system. It…
Q: In programming languages, what is the difference between regular and context-free grammars, what is…
A: Introduction: Regexps can be used to describe the syntax of Tokens. Any syntactic structure defined…
Q: Are embedded computers and general-purpose computers different in terms of what they do?
A: Introduction: An embedded computer, a critical component of most embedded systems, is a mix of…
Q: dangerous function below throws an error if it is given a certain integer number a. That is, the…
A: Program - def dangerous(a): z = 9302648 x = z + a return a result = dangerous(66/0)print("The…
Q: The National Security Agency (NSA) is in need of a program that will store a message, encrypt the…
A: In this code we are asked to write a C++ program to encrypt and decrypt a string by using hash…
Q: Using Python, given a reference string followed by four more strings, create a program that…
A: The program is written in Python. Find the program below step.
Q: Draw the ER-Diagram for the following database schema. Specify the types of relationships in details…
A: Following is the diagram :
Q: 27. A memory connected to a microprocessor has 20 address lines and 16 data lines. What will be the…
A: Let's see the solution that what will be the memory capacity
Q: Are embedded computers and general-purpose computers different in terms of what they do
A: Embedded Systems Embedded systems are PC frameworks that complete few assignments. While planning an…
Q: It is recommended that a list of five typical network topologies be supplied. Which one do you…
A: Introduction: The Mazda CX-5 gets the most significant expected dependability rating in the small…
Q: Do you agree that "Network address translation is meant to save IPv4 address space"? Why do you…
A: Introduction: Network address translation (NAT) is a technique for translating one IP address space…
Q: Suppose that you have a computer with a memory unit of 24 bits per word. In this computer, the…
A: We need to find answers to questions based on given computer.
Q: Are embedded computers and general-purpose computers different in terms of what they do?
A: For the most part, there are different contrasts between Embedded systems and General-purpose PCs…
Q: Write a quick remark regarding IPv6, the Internet, virtual private networks, and voice over IP.…
A: Introduction: IPv6 is the most current version of the Internet Protocol (IP), the communications…
Q: How can I move between users without having to log out of my account?
A: Introduction: When you delete an account, it is deleted from all of the device's applications. You…
Q: Consider the differences between physical and schematic models and illustrate your points with…
A: Introduction: In order to prove your argument or make it more understandable, you might use an…
Q: So, what exactly is a distributed denial of service assault, and how can a single person carry one…
A: Introduction: DDoS (distributed denial of service) attack: Following the discovery of the limits of…
Q: The advantages and disadvantages of using parameters instead of global variables in a C programme…
A: Parameters: A parameter is a variable that is used to receive arguments when a function is called.…
Q: Which network topologies do you believe are conceivable, and which ones do you advocate as being the…
A: Topology network : A Mesh Topology network has many interconnections, making it the most practical…
Q: y1= sin(x) y2= sin(2x) • y3= sin(3x) % 1st plot is to be red and dashed % 2nd plot is to be blue and…
A: Code: x = -6:0.2:6; y1 = sin(x); y2=sin(2*x); y3=sin(3*x); plot(x,y1,'r--') hold on…
Q: Create a program that can read scores data from the keyboard in five games interactively and please…
A: In this program we have to write a code, In which programming language is not defined so, we will…
Q: if(adultRB.isSelected() = = true) decBaseFee decADULT FEE; here what is isSelected?
A: if(adultRB.is selected() == true) decBaseFee = decADULT_FEE; here what is isselected ? a) class b)…
Q: Which network topologies do you believe are conceivable, and which ones do you advocate as being the…
A: Introduction: It's the most acceptable form of advocacy when people believe they can and want to…
Q: An artificially intelligent hospital management system, PEAS (Physical Intelligence Hospital…
A: Introduction: Basics The peas structure conveys the specialist's climate presentation measure.…
Q: DATA SEGHENT MESSAGE DB "HELLO A ENDS CODE SEGMENT ASSUME DS: DATA CS:co START: MOU AX, DATA MOU DS,…
A: Below the assembly code with resolves the error
Q: Utilize a request for proposal to collect information on hardware and system software, as well as to…
A: Introduction: Without computer software, computer hardware is almost worthless. The term "software"…
Q: To put it another way, what's the difference between "data mining" and "OLAP?"
A: OLAP and data mining re-defined: OLAP is a means of searching for data in a physical data storage…
Q: 1- Add a function (copyArray) to copy the elements of the array list into a new array newList with a…
A: 1 - Add a function (copyArray) to copy the elements of the array list into a new array newList with…
Q: A variable's "type" and "other attributes" must be identified in order to properly classify it. In…
A: Introduction: If we are talking about programming languages, then a variable is the name given to a…
Q: Take a look at the advantages and disadvantages of open-source operating systems.
A: Introduction: Open-source products such as the GNU/Linux operating system, a Unix-like operating…
Q: In order to define a variable, Type' is not enough. Data types and other properties are present in…
A: Introduction: A variable or function's class label is used to identify its qualities. Several of…
Q: Describe how a current operating system is able to support a feature of a previously installed…
A: Introduction: UNIX: The design and functionality of Multics have had a considerable effect on the…
Q: Create an HTML that displays the menu items from the XML file. Fruit Bowl$10.90 Caeser…
A: XML: Extensible Markup Language is a markup language and file format for storing, transmitting, and…
Q: how do you go a
A: Introduction A cell reference in an Excel spreadsheet is a cell or range of cells that can be…
Q: language program which should display 4 items (keyboard, mouse, monitor and speaker) with their…
A: Note: As not mentioned I have solved the question in Python language Code: name = ["keyboard",…
Q: What are the methods for exchanging information under a company's information security incident…
A: Introduction: When it comes to cybersecurity risks, an incident response plan is a collection of…
Q: An incident response (R) is a collection of operations that are carried out in the course of a…
A: An incident response (IR) is a collection of operations that are carried out in the course of a…
Q: How a gulf in communication between users and designers might jeopardize the success of a project is…
A: Basics The user-designer communication gap is caused by the disparity between the underlying…
Q: Give one advantage and one disadvantage of the Microkernel operating system over the Monolithic…
A: Introduction: Memory management, file management, and process scheduling are all handled by the…
Q: You may decrease the quantity of spam you get by using opt-out links. What do you think?
A: Given statement: The most safe and trustworthy approach to decrease the quantity of spam you get is…
Q: Describe the steps involved in the processes of authentication, authorisation, recording, and…
A: Steps involved in- authentication authorisation recording auditing
Q: The distinctions between IT security solutions installed in a typical on-premises data center and…
A: Introduction: Information security is concerned with securing data in cyberspace and beyond, while…
Q: Caches are important because of how they deal with the problem. Do you have any problems with them?…
A: let us see the answer:- Introduction:-A cache is a designated storage place that collects temporary…
Q: Incident response guidelines describe the critical components of incident teams, as well as how they…
A: Introduction: In order to respond effectively to an occurrence, four factors must be present:…
Q: software engineering short question. Is it possible to test every configuration that a Mobile App…
A: Answer is given below .
Q: Write a contrast between System Software and Application Software
A: The software is essentially the characterized set of the directions and data which advises the PC…
Q: Given the following fragment C program that convert from degrees Celsius to degrees Fahrenheit,…
A: double c = 20;double f;f = (9/5) * c + 32.0;f = 52.0 b first 9/5 = 1 because 9 is int and 5 is int…
Step by step
Solved in 3 steps with 3 images
- Please complete the following tasks: Write a class “Actor” that contains two attributes with the appropriate level of visibility explicitly defined. “Name” which is a String, Private, “NumberofAwards” which is an integer, private Write a default Constructor for this class that initializes the name to “Bob Smith” , and the number of awards to 0. Write an overload the constructor for this class that accepts actor’s name as a parameter Write accessor methods for each of the attributes. Write a method “winsAnOscar” that increases the number of awards by one and prints “The crowd applauds for <actor’s name>!” Be sure to use accessors where appropriate. Make sure your header is complete, with the appropriate level of visibility and any required keywords.Create a Class Student in which we have three instance variables emp_name, emp_id, and Salary. Write getter and setters for each instance variable. Write another Display method that displays the record of Employee. In Main create five Employee’s Objects. Set their values as required and display as well. In the end Display top three employees with respect to Salary (Display those who have more Salary among all).Use the GemotricObject class and its subclassess Cirlce and Rectangle to do the following: 1.Override Object’s toString() method in Circle class to returnthe status of Circle object. 2.Override Object’s toString() method in Rectangle class to return the status of Rectangle object. 3.Overide Object’s equals() method to compare two circle objects. 4.Overide Object’s equals() method to compare two Rectangle objects. 5.Test the above statements in the main method.
- Create a class Course, which has one field: String courseName Create the constructor, accessor, and mutator for the class. Then, in the main method of this class, create an instance of the class with the name "CST1201". Write an equivalent while statement to replace the following for statement for (int i=2; i<100; i=i+2) { System.out.println(i); }Is there a different way of doing this problem? Question: Create a class AccessPoint with the following attributes: x - a double representing the x coordinate y - a double representing the y coordinate range - an integer representing the coverage radius status - On or Off Add constructors. The default constructor should create an access point object at position (0.0, 0.0), coverage radius 0, and Off. Add accessor and mutator functions: getX, getY, getRange, getStatus, setX, setY, setRange and setStatus. Also, add a set function that sets the location coordinates and the range. Add the following member functions: move and coverageArea. Add a function overlap that checks if two access points overlap their coverage and returns true if they overlap. Add a function signalStrength that returns the wireless signal strength as a percentage. The signal strength decreases as one moves away from the access point location. Test your class by writing a main function that creates five access…1. Create a class called Student, with the following attributes/variables:a. studentName (String)b. studentNumber (int)sc. regYear(long)d. faculty(String)e. department(String)2. Add the following methods in Student:a. accessors and mutators for all variablesb. toString methodi. Formulate your toString so that it only shows studentName,studentNumber and faculty3. Create a class called MyFriends, with the following attributes variables:a. studentArray(Student[])4. Add the following methods in MyFriends:a. fillArrayi. Using scanner ask how many students does the user want to inputii. Capture user input for all of his friends(Of course we are assuming all your friends would be similarUWC students, go ask around and meet new friends, alsopreferably not in the same Computer Science department … ifpossible … only if possible)b. maini. Call the fillArray methodii. Count how many Computer Science studentsiii. If half or more students are Computer Science students, thendisplay “You … need more…
- Use the code provided copied to a new file named compulsory_task_1.py: 1. Add another method in the Course class that prints the head office location: Woodstock, Cape Town2. Create a subclass of the Course class named OOPCourse3. Create a constructor that initialises the following attributes and assigns these values: --- "description" with a value "OOP Fundamentals" --- "trainer" with a value "Mr Anon A. Mouse"4. Create a method in the subclass named "trainer_details" that prints what the course is about and the name of the trainer by using the description and trainer attributes.5. Create a method in the subclass named "show_course_id" that prints the ID number of the course: #123456. Create an object of the subclass called course_1 and call the following methods contact_details trainer_details show_course_id These methods should all print out the correct information to the terminal On a side note, this task covers single inheritance. multiple inheritance is also…package1 and package2 are instances of the Box class. Attributes length, width, and height of both package1 and package2 are read from input. Then, scaling_factor1 and scaling_factor2 are read from input. In the Box class, define instance method scale_measurements() with self and one integer as parameters to: Assign attribute length with length's current value multiplied by the integer parameter. Assign attribute width with width's current value multiplied by the integer parameter. Assign attribute height with height's current value multiplied by the integer parameter.Which of the following statements is false? a. A class can contain only one constructor. b. An example of a behavior is the SetTime method in a Time class. c. An object created from a class is referred to as an instance of the class. d. An instance of a class is considered an object.
- Write a new snowflake class that extends AbstractShape. Your snowflake should be a unique and simple shape unlike any other student’s. Use the drawing methods provided in the imported Graphics class The SimpleSnowFlake is provided in the project as an additional reference. Add an equals(Object o) method that will compare unique instance variable data and return true if two of your snowflakes are the same. Your equals method should override the method from the Object class and call the equals method of AbstractShape Your snowflake should be a different color and move in a different and unique way.Create a class Rectangle with attributes length and width with are variables, each ofwhich defaults to 1. Provide methods that calculate the rectangle’s perimeter and area.It has set and get methods for both length and width. The set methods should verify thatlength and width are each floating-point numbers (double datatype) larger than 0.0 andless than 20.0. Write a Test class to test all the methods from class Rectangle.RectangleTest.java source file should looks like this:class Rectangle{//data fileds//methods}//end Rectangle classpublic class RectangleTest{ //main method}//end RectangleTest class1. Read the code below and complete tasks: public class CircleWithStaticMembers { double radius = 1; /* task 1: add a line of code to declare a static integer variable names numberOfObjects and initialize it to 0; */ /** Construct a circle with radius 1 */ CircleWithStaticMembers() { radius = 1; /* task 2: add a statement here so that each time this constructor is called, the number of static variable numberOfObjects increase by 1; */ } /* task 3: write a static method called getNumberOfObjects() which returns the value of numberOfObjects, write your code below; */ } // give the code below (assuming it’s in the main function) which calls the function getNumberOfObjects