Consider the UML class diagram below, which shows the relationships between several classes related to automobiles. Using your knoweldge of four wheeled automobiles, which of the following statements are true? Choose all that apply. 0..1 Driver 0..7 Passenger Car Body Engine Some Cars have a spare Wheel Passengers cannot exist without a Driver A Car has one Engine. Engines are not shared between Cars but an Engine may be removed from one car and placed in a different car A Car must have at least one Driver A Driver is also considered to be a Passenger A Car is composed of one Body. When a car is junked the body is also junked 4..5 Wheel
Q: Why do we need authentication, and what are our goals in doing it? Evaluate the different…
A: The answer to the question is given below:
Q: Your manager has solicited your advice on how to improve the financial department's odds of…
A: In order to respond to a manager just set a milestone to achieve them or doubts clarified for a good…
Q: Copied distinguished correct. Shoud in class ruit class: First create a Fruit class that…
A: Disclaimer: “Since you have posted multiple questions, we will provide the solution only to the…
Q: How often and for how long should network maintenance be scheduled?
A: Introduction: The network is a system of interconnected computer systems, devices, and other…
Q: Describe the steps used by a system analyst in examining a piece of software.
A: To be determined: a list of methods that are used by the system analyst while working with software…
Q: If you need to describe a process, even if it has nothing to do with system analysis, try doing so…
A: Introduction: Systems analysis is the process by which a person (or people) studies a system to…
Q: Let X= {4,5,6}.If we define a relation R on X by (x,y) ER if x<y, x,yEX, then R=
A: Solution is given in next step:
Q: 4. A={3,4}, B={4,5}. An B= AUB= A-B= A OB= AXB=
A: 1. A ∩ B means intersection of set A and set B 2. AU B means union of set A and set B 3. A-B means…
Q: Explanation about RAID 5: Why does RAID 5 need to be used instead of the other available RAID levels
A: Dear Student, The answer to your question is given below -
Q: Provide an explanation for the straight curvature of an LCD computer monitor's display.
A: Explain why the form of a computer's LCD display screen is flat. These monitors are compact and need…
Q: For a gadget to really hook up to a network, what part of the hardware is required?
A: When users log in to their computers and visit the networks page, they see a virtual logical…
Q: For the sake of argument, let's say your company's email server sent you a message asking you to…
A: Solution: The phishing attack is a sort of malware that allows password hacking and occurs when the…
Q: Breath First Search (BFS) starts at a root node (A) and examines its neighbours from there. After…
A: We need to find traversal of the above graph. See below steps.
Q: What are the most critical IT problems at your company, and how do you propose to fix them?
A: Challenges and effective methods to resolve: 1)Lack of sufficient funds or expertiseInformation…
Q: Assignment 1 question Fruit class: First create a Fruit class that contains code common to all of…
A: Introduction Java class: An essential building block in object-oriented programming is a class. It…
Q: Why do malicious programs with worldwide consequences exist?
A: Introduction: Malevolent software is malware. Here are some malware's effects. computer…
Q: This section provides a an explanation of the process used to create a system.
A: Development of systems methodology As system development grew, there was a need to systematize the…
Q: The data tablet's resolutions are on par with those of a CRT display, yet it takes a fraction of the…
A: The data tablet device may be used with a computer in much less time than the light pen can, and its…
Q: How can you keep a shared workplace printer secure?
A: Shared resources are the devices that many distant computers linked to a local area network or…
Q: How do you feel about the security of digital media? Do you believe that this kind of equipment will…
A: According to the information given:- We have to define on the basis of Research papers and articles…
Q: Define the difference between a baseline version revision and a release, and describe the processes…
A: SCM keeps track of software changes. Software development cycle organisation, administration, and…
Q: How does a password manager store its encrypted passwords, and what type of format does it use? A…
A: 1. The study of secure communication techniques that allow only the sender and intended recipient of…
Q: What design problems exist with pointers? What kind of variable may most pointers in computer…
A: Introduction: A pointer is a kind of memory address. Pointers are used to hold the addresses of…
Q: Explain what a firewall is, how it works, and why it's important in the context of network security,…
A: Programming or firmware that prevents unauthorised access to an organisation is known as a firewall.…
Q: Which bugs are the hardest to resolve?
A: Introduction: A bug is an unanticipated software or hardware defect. Unanticipated external…
Q: The original Linux developers built a non-preemptible kernel for unknown reasons. In a setup with…
A: Why did Linux's creators chose a non-preemptible kernel?What does a non-preemptible kernel do in a…
Q: In C programming language write Task 2: Hangman game Write a terminal based on the game of Hangman.…
A: Source code for the required program is as below: #include <stdio.h> //Including…
Q: Could you, if time permits, elaborate on the role that metrics play in the evolution of software?…
A: Software metrics assess programme attributes quantitatively. Software metrics help analyse software…
Q: Are there any drawbacks to using one kind of authentication over another?
A: Authentication is confirming that someone or something is who or what they say they are. A user ID…
Q: Consider the below commands i) sed "s/CSH/csh/g" temp > Is ~/newtemp ii) ls -v grep wc -1 iii) ls -a…
A: i) sed "s/CSH/csh/g" temp > Is ~/newtempThis command uses the sed (stream editor) command to find…
Q: Please summarize the core features of an OS in a single phrase.
A: An operating system is a collection of different types of software that helps in managing resources…
Q: A neighbourhood bank could employ one of three types of servers
A: As there are many types of servers used by the bank: Servers: This is the server that runs the…
Q: Let's pretend your company's mail server sends you a notification asking you to verify a password…
A: embedded in applications, kernels, hypervisors, or firmware.Spyware invades your computer and tries…
Q: After a list of the six parts that make up an information system has been compiled, the next step is…
A: The system is made up of various elements or entities that work together to convert input into…
Q: If these three conditions aren't met, then it's impossible for a network to thrive and reach its…
A: Relationships that are successful in networking have a real interest in their connections and put in…
Q: detection of intrusions Software is a general word for programmes that identify invasions.
A: An intrusion detection system is a hardware or software programme that keeps an eye out for…
Q: Think about how the internet has developed through time and the technical backbone it now rests on.
A: The objective is to explain the evolution of the Internet. In 1965, two computers at MIT Lincoln Lab…
Q: How can people keep their workplace safe when they have to share things like printers?
A: Shared resources are the devices that many distant computers linked to a local area network or…
Q: What design problems exist with pointers? What kind of variable may most pointers in computer…
A: Introduction: A pointer is a kind of memory address. Pointers are used to hold the addresses of…
Q: Which partition does BootMgr reside on? Does it reside on the boot or system partition
A: BootMgr file has itself both hidden and read-only. BootMgr file is locating in the boot directory of…
Q: Before we can have a good grasp of RAID 5, we need to know what it is. Is there ever a time when…
A: Introduction: RAID 5 is a configuration that uses disc striping and parity to build a redundant…
Q: What data is included in the master boot record?
A: Answer :
Q: What happens if the operating system's main memory isn't shared fairly among all the apps using it?
A: Additionally, operating systems include multiple paging techniques, which increase the amount of…
Q: Is sharing a MAC address across network interfaces possible? Or not? Is it feasible to assign a…
A: According to the information given:- We have to define sharing a MAC address across network…
Q: Do software projects often exhibit any defining features? When designing software, how can we make…
A: Full stack infoAny excellent programmer or designer requires specific knowledge and skills. The…
Q: What exactly do you have in mind when you say that you want to accomplish via the authentication…
A: Authentication checks a user's identification. This approach associates incoming requests with…
Q: Give one argument for the Turing test being a good test for measuring intelligence.? 2- Give one…
A: 1. The simulation of human intelligence processes by machines, particularly computer systems, is…
Q: Code the following. PYTHON PROGRAMMING LANGUAGE ASSIGNMENT Create a new text document called…
A: PYTHON PROGRAM:
Q: Were you able to explain the lower speeds of wireless networks in comparison to cable networks? Why…
A: Wired Network A physical medium that is "wired" is one that is constructed of cables. Options…
Q: How can you keep a shared workplace printer secure?
A: Shared resources are any devices that are accessible by many distant computers at the same time when…
Step by step
Solved in 4 steps
- Convert the UML class diagram above into a java code with the following conditions The methods in the Pet class are abstract. Create a class called test. The main() method in the test class should create three Cat objects and two Budgie The main() method should also create indirectly an object of the Pet class. Demonstrate polymorphism in your testFor this problem you are to join the following classes into a hierarchy (use the UML diagrams from Module 2 to get started): Player - Super Class Archer - Subclass Barbarian - Subclass Cleric - Subclass Rogue - Subclass Warlock - Subclass If the parent class has the same attributes as the sub class then you can remove those attributes from the subclass. If the class is new for this module, please come up with 2 unique attributes of your choice, and 1 piece of functionality. If the sub classes are shown on the same level, then they share a parent class.Implement the class as depicted in the UML diagram. Apartment -city: String -area: double -nbOfRooms: int -duplex: boolean +num apt: int +Apartment(----All data fields----) +getCity(): String +getNumberOfStories(): int +assessSize(): String +printDescription(): void 2/3 Data Fields: 1. city: It may consist of one word or two such as "Beirut", "Bint Jbeil", etc. 2. area: its value is expressed in square meter 3. nbOfRooms: with maximum value of 10 4. duplex: either true or false to reflect whether the apartment is made of two stories or only a single one. 5. num_apt: to keep track of how many apartment objects were created. Methods: 1. A constructor that creates an Apartment object with the specified values of all data fields. If the number of rooms passed is greater than 10, then nbOfRooms is set to 0. 2. getCity(): this method returns the city with its letters all capitalized. 3. getNumberOfStories(): This method returns the number of stories of an apartment. If it is duplex, then 2…
- create a uml class diagram on this code: from abc import ABC, abstractmethod class GreyAnatomy(ABC):@abstractmethoddef Tvshow(self):pass class Grey(GreyAnatomy):def Tvshow(self):print("I am Derek") class Rank(Grey):def Tvshow(self):print("I am an attending") class Specialty(Rank):def Tvshow(self):print("I am an neurosurgeon doctor") G = Grey()G.Tvshow() R = Rank()R.Tvshow() S = Specialty()S.Tvshow()4. Consider a Person class (which keeps track of a Person’s name) and a Student class (which keeps track of a Student’s name and student ID number). State the relationship between the two classes as either an is-a or a has-a relationship (similar to the last sentence of each paragraph in the above Model).Question 3 With reference to the UML class diagram, write the Java code for the IPad and ApplelD classes as described in the UML diagram. You need to identify the missing attribute and the parameters of the constructor. IPad ApplelD -model: String -year: String -email: String -? -username: String 1 +IPad(????????) +ApplelD(email: String, userName: String)
- Problem B Now we are going to use the design pattern for collecting objects. We are going to create two classes, a class AmazonOrder that models Amazon orders and a class Item that models items in Amazon orders. An item has a name and a price, and the name is unique. The Item class has a constructor that takes name and price, in that order. The class also has getters and setters for the instance variables. This is the design pattern for managing properties of objects. The setName() method should do nothing if the parameter is the empty string, and the setPrice() method should do nothing if the parameter is not positive. The class also has a toString() method that returns a string representation for the item in the format “Item[Name:iPad,Price:399.99]”. For simplicity, we assume an Amazon order can have at most 5 items, and class AmazonOrder has two instance variables, an array of Item with a length of 5 and an integer numOfItems to keep track of the number of items in the…Consider the following UML diagram. Suppose that each of these classes has a getMass () method that returns the mass of the current object (double); that the Star class has a getPlanets () method that returns an array of Planet objects (the planets that orbit this planet); and that the Planet class has a getMoons () method that returns an array of Moon objects (the moons if this planet). All attributes of these classes are private. All methods described above are public. Star 0.. Planet Create a class called SolarMass that has a single class method in it called solarMass (Star theStar) that returns the total mass of the input star (along with the mass of all of that star's planets and their moons). The method returns a double. Any program should be able to call this method. e..* MoonFor this problem you are to join the following classes into a hierarchy (use the UML diagrams from Module 2 to get started): Player - Super Class Archer - Subclass Barbarian - Subclass Cleric - Subclass Rogue - Subclass Warlock - Subclass
- See the class diagram (UML2.0) and the relationship between classes Person and Professor. What sentence describes this relationship correctly? Select one: a. The relationship links two classes. The relationship represents a generalization and specialization princip. One class is representing a general description and the second one is more detailed. b. The relationship links two classes. The relationship is weak and instances of classes are not affected by destroying instance on the other side of relationship. c. The relationship links two classes. The relationship is weak and when the container class instance is destroyed the contents class instatnce is not destroyed. d. The relationship links two classes. The relationship is very strong and when the container class instance is destroyed the contents class instatnce is destroyed too.TASK 1 Draw the UML class diagrams for the following classes: An abstract Java class called Person that has the following attributes: a String called idNumber a Date called dateOfBirth representing the date of birth. a String for name A class called RideRecord with the following attributes: a Driver attribute an enum called type of RideType a Date called date a double called fee A class called Passenger that extends the Person class and has the following attributes and behaviours: an ArrayList that contains RideRecord objects called rideHistory a public method called takeRide that takes a RideRecord with the following signature:public void takeRide(RideRecord rideRecord); a public boolean method called hasRideHistory that returns whether or not the Passenger has taken a ride before. A Driver class that extends the Person class and has the following attributes and behaviors: a String called licenseCode a public method called giveRide that takes as a parameter a Passenger…Assume that we have four classes: Person, Teacher, Student, and PhDStudent. Teacherand Student are both subclasses of Person. PhDStudent is a subclass of Student.A.Which of the following assignments are legal, and why or why not?Person p1 = new Student();Person p2 = new PhDStudent();PhDStudent phd1 = new Student();Teacher t1 = new Person();Student s1 = new PhDStudent();Suppose that we have the following legal declarations and assignments:Person p1 = new Person();Person p2 = new Person();PhDStudent phd1 = new PhDStudent();Teacher t1 = new Teacher();Student s1 = new Student();B.Based on those just mentioned, which of the following assignments arelegal, and why or why not?s1 = p1;s1 = p2;p1 = s1;t1 = s1;s1 = phd1;phd1 = s1;