Answer the following questions: (6* 5= 30 marks) 1. Add the following method to Publication Class, explain what should be changed in the code? And Why? public abtract void Hella(); 2. Consider the test class below: What is the type of binding used in Line 6?
Q: General Instruction: Write a python program that declares and initializes a one-dmensional list…
A: myList = [5, 10, 15, 20, 25, 30, 35]print("The element in the list are: " + str(myList) + "\n")def…
Q: To improve your comprehension, consider using cloud computing and social networking blogs.
A: SOCIAL NETWORKING BLOG and COULD COMPUTING Using the Cloud Cloud computing is the technique of…
Q: This is because computers have reached such a high level of advancement. Could you please explain…
A: Definition: Computers are incredibly powerful for a multitude of reasons. They operate at breakneck…
Q: What does technical analysis aim to achieve? Explain how and why technicians utilize it, as well as…
A: Introduction: What does technical analysis aim to achieve? Explain how and why technicians utilize…
Q: ch affect a comp
A: Cyber Security: Cyber security is the utilization of technology, methods, and approaches to…
Q: I'm curious as to whether or not you think it's a smart move to make advantage of the cloud. Why?
A: The Answer is in step2
Q: anges does the presence ofi between distinct contexts on
A: Whenever a hardware occasion happens that is offbeat to the ongoing project execution happens, an…
Q: What are the four most common types of information systems, and how can you distinguish between…
A: Find the required answer given as below :
Q: Write an algorithm that takes a list of binary numbers as an input, counts the number of O's in the…
A: Iterate over the given list and check for each of the element and if element is 0, we increment the…
Q: Provide some criteria for citing sources. What are the ramifications of plagiarizing?
A: Start: Citing other people's thoughts and ideas shows that you did a comprehensive investigation of…
Q: An interface control that is linked to a data source should be identified appropriately.
A: Intro Interface Control Document (ICD): Interface Control Document (ICD) is a document that…
Q: Differentiate between a standalone operating system and one that is built into a computer.
A: INTRODUCTION: Here we need to tell the Differentiate between an operating system that runs on a…
Q: What are the five most important dos and don'ts when it comes to email, and how can you explain them…
A: Definition: The business world changed when email became extensively utilized in the early 1990s.…
Q: A gadget that interferes with the normal operation of anything else is known as a disruptor. Why are…
A: Introduction: A hardware interrupt is an electrical signal sent to the CPU from an external device,…
Q: What is the layered structure of an application that uses a DBMS?
A: DBMS (Database Management System): A database management system (DBMS) is a software package that…
Q: Operating Systems class. Which two of these four
A: four memory allocation methods are First" fit "Best" fit "Worst" fit "Next" fit First fit operates…
Q: What exactly does it mean to have "cybersecurity," and why is it so vital that one has it?
A: Describe the term cybersecurity and why it is so crucial: Cybersecurity refers to the protection of…
Q: Write Pascal code to print all numbers in range 1 to 20 in reverse order Print 5 numbers in each…
A: Use a loop to iterate from 20 to 1 After every 5 numbers print a new line
Q: Explain the difference between a physical address, a segment address, and an offset address. What is…
A: Intro The segment address is located within one of the segment registers, defines the beginning…
Q: Specifically, what are some of the objectives of the process of verification? Why are there certain…
A: Given: First,Authentication is the process of verifying that someone or something is who they claim…
Q: How can a company prevent hackers from stealing account information?
A: GIVEN: Many firms lack the appropriate office security measures to protect their facilities and…
Q: What is the connection between the three-way handshake and the four different port scanning types…
A: Start: It was used to map the network for which the Network Administrator was in charge. Nmap is a…
Q: What are the strategic options for the development of legacy systems? If a system's software and…
A: Legacy System A legacy system in the context of computers refers to old computer systems and…
Q: Using C language create a program that Implements the function List deleteAt(List head, int pos).…
A: Using C language create a program that Implements the function List deleteAt(List head, int pos).…
Q: Q2: Develop a computer program in F90 to form the matrix A(a, n) as shown below. The program also…
A: Program Matrix INTEGER :: i,j,nwrite (*,*) 'Enter no. of n in A(n,n) - 'read *,n do i=1,n do…
Q: Describe the dictionary of data. When and where does the data dictionary keep track of the objects…
A: Answer
Q: A gadget that interferes with the normal operation of anything else is known as a disruptor.…
A: Given: What is the difference between a Disruptor and an Interrupt? An interrupt is a signal sent to…
Q: me-sharing and distributed operating systems from one ano
A: Introduction: Below the distinguishes time-sharing and distributed operating systems from one…
Q: This is because computers have reached such a high level of advancement. Could you please explain…
A: Introduction Why are computers so powerful? You'll be amazed at their efficiency. Computers can…
Q: A company may safeguard itself against hackers by locking accounts.
A: TYPES OF HACKS AND VIRUSES: The following are examples of hacks and viruses: Virus: A computer virus…
Q: For example, what is a "modelling language?"
A: Given: An artificial language that can convey information, knowledge, or systems in a structure…
Q: Computer Science EXAMPLE y'-х^2*у n=10 x=0:h:1 yo=1 I need two step implicit Adams moulton methods…
A: The first line sets up the interval of integration and the initial condition. The next line…
Q: What exactly does it mean to have one's privacy protected? Are you aware of how to protect the…
A: Definition: What does the term "information privacy" mean? Make a list of five things you can do to…
Q: Which of the following current trends in cybercrime should you be keeping an eye out for? Do you…
A: Some of the New Cyber Security Threat is below:
Q: The Apple Interface Builder in XCode is a complex tool that gives users access to a wide range of…
A: Given: It is essential for XCode (earlier Project Builder), the Apple Developer engineer's toolset…
Q: When it comes to working with computers and other forms of technology, what are some of the benefits…
A: Computer Literacy: Computer savvy people may improve their professional performance, utilise…
Q: The Apple Interface Builder in XCode is a complex tool that gives users access to a wide range of…
A: Given: Basics Interface Builder is a tool for developing products for Apple's macOS operating…
Q: Consider the effect that the proliferation of personal computers and the Internet have had on the…
A: Computer System: A computer system is a collection of interconnected devices that process, store,…
Q: What are the four different levels of TCP/IP abstraction?
A: Definition: The link layer (lowest layer), the Internet layer, the transport layer, and the…
Q: Does your company's information technology have a problem? If this is the case, what are your…
A: Management Information Systems: Management a information systems (MIS) are made up of people,…
Q: What should you do to produce the two systems to manager’s satisfaction
A: Our system recognizes 2 banknotes --> British Banknotes --> South African Banknotes If another…
Q: e benefit and
A: This definition of bandwidth is rather than the field of transmission processing, remote…
Q: loT solutions have the potential to benefit both vertical and horizontal sectors. When these…
A: Vertical Market and Horizontal Markets Vendor Market Vertical Market comprises of enterprises…
Q: IoT solutions have the potential to benefit both vertical and horizontal sectors. When these…
A: Given: Markets vertical and horizontalVertical Market Vertical Market comprises of enterprises…
Q: Make a list of all of the purchases that were made by the customers, using the output from the…
A: Invoice line: A single line item on an invoice is referred to as an invoice line item. A bill for…
Q: When using an ad hoc network like the one described above, is it feasible to prevent network…
A: Security breach: Any occurrence that leads in unauthorised access to computer data, applications,…
Q: With diagrams, explain Binary adders and Subtractors
A:
Q: What are the repercussions of a company's cyber breach?
A: Overview: It happens when data is taken or withdrawn from a system without the owner's permission or…
Q: Looking for this in Python, please. Shopping list assignment (Parallel Array) Create three global…
A: Code in step 2
Q: 4. Find the reflection of the triangle (2, 1), (6,1), (4,6) based on а. Хахis b. Y axis c. Origin d.…
A:
Step by step
Solved in 2 steps
- public class Plant { protected String plantName; protected String plantCost; public void setPlantName(String userPlantName) { plantName = userPlantName; } public String getPlantName() { return plantName; } public void setPlantCost(String userPlantCost) { plantCost = userPlantCost; } public String getPlantCost() { return plantCost; } public void printInfo() { System.out.println(" Plant name: " + plantName); System.out.println(" Cost: " + plantCost); }} public class Flower extends Plant { private boolean isAnnual; private String colorOfFlowers; public void setPlantType(boolean userIsAnnual) { isAnnual = userIsAnnual; } public boolean getPlantType(){ return isAnnual; } public void setColorOfFlowers(String userColorOfFlowers) { colorOfFlowers = userColorOfFlowers; } public String getColorOfFlowers(){ return colorOfFlowers; } @Override public void printInfo(){…class Player { protected: string name; double weight; double height; public: Player(string n, double w, double h) { name = n; weight = w; height = h; } string getName() const { return name; } virtual void printStats() const = 0; }; class BasketballPlayer : public Player { private: int fieldgoals; int attempts; public: BasketballPlayer(string n, double w, double h, int fg, int a) : Player(n, w, h) { fieldgoals = fg; attempts = a; } void printStats() const { cout << name << endl; cout << "Weight: " << weight; cout << " Height: " << height << endl; cout << "FG: " << fieldgoals; cout << " attempts: " << attempts; cout << " Pct: " << (double) fieldgoals / attempts << endl; } }; a. What does = 0 after function printStats() do? b. Would the following line in main() compile: Player p; -- why or why not? c. Could…Library Information System Design and Testing Library Item Class Design and TestingDesign a class that holds the Library Item Information, with item name, author, publisher. Write appropriate accessor and mutator methods. Also, write a tester program(Console and GUI Program) that creates three instances/objects of the Library Items class. Extending Library Item Class Library and Book Classes: Extend the Library Item class in (1) with a Book class with data attributes for a book’s title, author, publisher and an additional attributes as number of pages, and a Boolean data attribute indicating whether there is both hard copy as well as eBook version of the book. Demonstrate Book Class in a Tester Program (Console and GUI Program) with an object of Book class.
- public class Author2 {3 private String name;4 private int numberOfAwards;5 private boolean guildMember;6 private String[] bestsellers;78 public String Author()9 {10 name = "Grace Random";11 numberOfAwards = 0;12 guildMember = false;13 bestsellers = {"Minority Report", "Ubik", "The Man in the HighCastle"};14 }1516 public void setName(String n)17 {18 name = n;19 }20 public String getName()21 {22 return name;23 }2425 public void winsAPulitzer()26 {27 System.out.println(name + " gave a wonderful speech!");28 }29 } 1. This class includes a constructor that begins on line 8; however, it contains an error. Describe the error. 2. Rewrite the constructor header on line 8 with the error identied in part c of this question corrected. 3. Demonstrate how you might overload the constructor for this class. Write only the header. 4. Write a line of Java code to create an instance (object) of this class. Name it someAuthor. 5. Write a line of code to demonstrate how you would use the someAuthor object…8. OOPS Theory #6 public class Car { public void horn() { System.out.println("Horn horn"); } } public class Ferrari extends Car { public void horn() { System.out.println("Ferarriiiiii"); } } public static void main(String[] args) { Ferrari ferrari = new Car(); ferrari.horn(); } Pick ONE option Horn horn Ferarriiii Cannot compile Runtime exception Clear Selection 9. OOPS Theory #7 In Java, we can achieve the abstraction by creating the blueprint of an object and only have abstract methods. What do we call this? Pick ONE option Interface Encapsulation Instance Protected Clear SelectionJava class Main { publicstaticvoid main(String[] args) { // Coin myPenny = new Coin(CoinType.PENNY); // Coin myNickel = new Coin(CoinType.NICKEL); // Coin myDime = new Coin(CoinType.DIME); // Coin myQuarter = new Coin(CoinType.QUARTER); // Coin myHalfDollar = new Coin(CoinType.HALF_DOLLAR); // Coin myDollar = new Coin(CoinType.DOLLAR); // System.out.println(printValue(myPenny)); // System.out.println(printValue(myNickel)); // System.out.println(printValue(myDime)); // System.out.println(printValue(myQuarter)); // System.out.println(printValue(myHalfDollar)); // System.out.println(printValue(myDollar)); } publicstatic String printValue(Coin c){ String result = ""; // result = String.format("The value of a %s is $%.2f", c.getName(), c.getValue()); return result; } }
- Public classTestMain { public static void main(String [ ] args) { Car myCar1, myCar2; Electric Car myElec1, myElec2; myCar1 = new Car( ); myCar2 = new Car("Ford", 1200, "Green"); myElec1 = new ElectricCar( ); myElec2 = new ElectricCar(15); } }interface StudentsADT{void admissions();void discharge();void transfers(); }public class Course{String cname;int cno;int credits;public Course(){System.out.println("\nDEFAULT constructor called");}public Course(String c){System.out.println("\noverloaded constructor called");cname=c;}public Course(Course ch){System.out.println("\nCopy constructor called");cname=ch;}void setCourseName(String ch){cname=ch;System.out.println("\n"+cname);}void setSelectionNumber(int cno1){cno=cno1;System.out.println("\n"+cno);}void setNumberOfCredits(int cdit){credits=cdit;System.out.println("\n"+credits);}void setLink(){System.out.println("\nset link");}String getCourseName(){System.out.println("\n"+cname);}int getSelectionNumber(){System.out.println("\n"+cno);}int getNumberOfCredits(){System.out.println("\n"+credits); }void getLink(){System.out.println("\ninside get link");}} public class Students{String sname;int cno;int credits;int maxno;public Students(){System.out.println("\nDEFAULT constructor…class IndexItem { public: virtual int count() = 0; virtual void display()= 0; };class Book : public IndexItem { private: string title; string author; public: Book(string title, string author): title(title), author(author){} virtual int count(){ return 1; } virtual void display(){ /* YOU DO NOT NEED TO IMPLEMENT THIS FUNCTION */ } };class Category: public IndexItem { private: /* fill in the private member variables for the Category class below */ ? int count; public: Category(string name, string code): name(name), code(code){} /* Implement the count function below. Consider the use of the function as depicted in main() */ ? /* Implement the add function which fills the category with contents below. Consider the use of the function as depicted in main() */ ? virtualvoiddisplay(){ /* YOU DO NOT NEED TO IMPLEMENT THIS FUNCTION */ } };
- Class Quiz public Quiz (int quesList, int quesMissed) {quesList = this.quesList;quesMissed = this.quesMissed;} private void calculate(){// get the point worth of each question and calculate final scorepointsPerQues = (100/quesList);scoreQuiz = quesList - quesMissed;} Class PassFailQuiz public PassFailQuiz (int quesList, int quesMissed, int scoreQuiz) { super(quesList, quesMissed);} How do I move scoreQuiz from private void calculate() to equal the third constructor value in PassFailQuiz?class Main { publicstaticvoid main(String[] args) { // Coin myPenny = new Coin(CoinType.PENNY); // Coin myNickel = new Coin(CoinType.NICKEL); // Coin myDime = new Coin(CoinType.DIME); // Coin myQuarter = new Coin(CoinType.QUARTER); // Coin myHalfDollar = new Coin(CoinType.HALF_DOLLAR); // Coin myDollar = new Coin(CoinType.DOLLAR); // System.out.println(printValue(myPenny)); // System.out.println(printValue(myNickel)); // System.out.println(printValue(myDime)); // System.out.println(printValue(myQuarter)); // System.out.println(printValue(myHalfDollar)); // System.out.println(printValue(myDollar)); } publicstatic String printValue(Coin c){ String result = ""; // result = String.format("The value of a %s is $%.2f", c.getName(), c.getValue()); return result; } }Instrument.java public class Instrument { protectedStringinstrumentName; protectedStringinstrumentManufacturer; protectedintyearBuilt, cost; publicvoidsetName(StringuserName) { instrumentName = userName; } publicStringgetName() { return instrumentName; } publicvoidsetManufacturer(StringuserManufacturer) { instrumentManufacturer = userManufacturer; } publicStringgetManufacturer(){ return instrumentManufacturer; } publicvoidsetYearBuilt(intuserYearBuilt) { yearBuilt = userYearBuilt; } publicintgetYearBuilt() { return yearBuilt; } publicvoidsetCost(intuserCost) { cost = userCost; } publicintgetCost() { return cost; } publicvoidprintInfo() { System.out.println("Instrument Information: "); System.out.println(" Name: " + instrumentName); System.out.println(" Manufacturer: " + instrumentManufacturer); System.out.println(" Year built: " + yearBuilt); System.out.println(" Cost: " + cost); } } StringInstrument.java // TODO: Define a class: StringInstrument that is derived from…