The details of each work out must be stored in a class called WorkOut object shown in the class diagram. Use the class diagram to code the WorkOut object. WorkOut start: DateTime end: DateTime description : string level : integer - points: real numWorkOuts: integer + LOW: integer <=4 + MEDIUM : integer 8 + Constructor (p: real, n:integer) + Constructor (s:string, e:string, d:string, 1:integer) + get Points () : real + getNumWorkOuts (): integer
Q: When we buy a packaged data model, we receive whatever element we obtain as part of the deal.
A: Start: The package data model depicts the link between database tables containing package…
Q: Draw the equivalent one flip-flop per state. PQ = 00 A 2 X B Link 2 1 с 0 X X Link 3 PQ-01 Link 4…
A: Here is the two flip-flops are P and Q.
Q: visual studio
A: Most of the programming langauge thata is used for 2d game are Unity, C#, UnityScript
Q: How many different types of languages are there in computer science?
A: Introduction: Computer science's language: Way to instruct the machine/hardware Help to communicate…
Q: Identify the many types of hacks and viruses, and provide an explanation of how a business may…
A: Given: Reduce noise pollution by driving an electric automobile or requiring quieter engines, tires,…
Q: For Linux, everything is considered a file, including regular files, directories and hardware…
A: The answer is given below... Check it out...
Q: Following the completion of the first rendering, the graphics pipeline proceeds to the next stage,…
A: Given: The graphics pipeline: The second phase of the graphics pipeline is transformation. In your…
Q: Why is it thought that the issue of system security is more complex than the problem of system…
A: System Safety and System Security both are the necessity of the system but if we compare the…
Q: Computer animations are created by arranging and displaying a series of still pictures in a certain…
A: Explain: Computer animations are the sequencing and presentation of a group of pictures to produce…
Q: Which two of the following are the most compelling arguments in favor of layered protocols? Please…
A: Your answer is given below. Introduction :- A layered protocol architecture is a notion for…
Q: What specific computer science knowledge do I require?
A: You must be familiar with basic's of programing, the processes of designing and creating…
Q: In a network that is switched as well as routed, how can the department ensure that users always…
A: Given: Below, the department ensures network access in a switched and routed network. A host may…
Q: Machine Learning You are given the scatter of points (x,y) = (1, 1.5), (4, 3.5), (7, 9), (10, 8).…
A:
Q: To what end does incorporating animation into a presentation serve?
A: Introduction: Animating a PowerPoint presentation may help it become more lively and memorable. Two…
Q: Two distinct types of intrusion detection and prevention systems (IDPS) are distinguishable from one…
A: In a more complicated information technology setting, it is more difficult to analyze network…
Q: What are some of the downsides of using symmetric encryption, particularly when it comes to key…
A: Start: Symmetric encryption uses a single key to encrypt and decrypt data. When you encrypt a…
Q: To transmit the data 1011000 to his friend using hamming code technique. Calculate (i) number of…
A: 1. 4 bits [0,1,0]2. 7, 6, 5, 4, 3, 2, 13. 7 bits4. 10110105. After using the hamming code…
Q: In the context of artificial intelligence, what exactly are rationality
A: The answer is
Q: A firm's awareness of current cybersecurity defensive measures may help it prioritize risk…
A: Given: In most firms, the notion of an information security perimeter with trusted goods "inside"…
Q: a proxy firewall in the DMZ that may access an internal Web server using a "server farm" setup…
A: Given: A server farm, also known as a server cluster, is a collection of computer servers maintained…
Q: The term "visual computing" is broken down into its component parts.
A: Start: One of the most intriguing fields of computer science is visual computing. Computers have…
Q: What are the benefits of using distributed systems? (describe both its strengths and its weaknesses)
A: A distributed system is a computing environment in which various components are spread across…
Q: Which technique is more effective: a bottom-up one or a top-down one?
A: In the given question top-down approach relies on higher authority figures to determine larger…
Q: 1. Perform the following subtraction using 10's complement on 532 - 794.
A: subtraction using 10's complement 532-794
Q: What are the strengths and disadvantages of the NIMS system when it comes to crisis communication??…
A: Introduction: The National Event Management System (NIMS) is a rational, comprehensive method to…
Q: Where are data for marketing research obtained? Giveexamples of internal and external data
A: Data for marketing research can be obtained from internal and external sources. Subjective…
Q: Provide an example of one kind of sensor that may be found in mobile devices.
A: To write sensor examples for mobile devices.
Q: I/O addressing is usually divided into unified addressing and _______.
A: Given: I/O addressing is usually divided into unified addressing and _______.
Q: Design a Turing machine recognizing the language L = L{w : w contains the substring 01} over Σ =…
A: The output of the machine is : 0011 which contains the substring 01.
Q: {"customer_no": 54, "school": {"value": "you are me"}} I want the answr in csv format customer_no
A: In python to write output to csv file we have to import csv package. Python dictionary is an…
Q: Why are watchdog clocks necessary in so many of the embedded devices that we use today? Embedded…
A: Launch: This section explains the need of watchdog clocks in embedded systems. Embedded systems are…
Q: What exactly is the distinction between symmetric and asymmetric key cryptography?
A: Answer: A key in cryptography is a piece of information, usually a string of numbers or letters that…
Q: Show that the following grammar is ambiguous: S SAYIY Y→Y/TIT T-SI CHAR CHAR→al blc|d
A:
Q: To transmit the data 1011000 to his friend using hamming code technique. Calculate (i) number of…
A: Answer: Given transmitting the data 1011000 and our policy is answer the first three from the first…
Q: this and the following question, consider those TMs that satisfy all of the following properties: •…
A: The Answer is
Q: с В D E
A: Answer - As the given graph has a cycle so we cannot use the backtracking approach. We need to use…
Q: To put Razor Technology into perspective, think of it as the cloud-based disaster recovery service…
A: Disaster recovery is the process of rapidly restoring essential business services in the event of a…
Q: Consider the following source code : c = a + b d = c c = c – e a = d – e b = b * e b = d/b…
A: Given source code is c = a + b d = c c = c – e a = d – e b = b * e b = d/b
Q: Create a single regular expression that matches a string of digits and contains exactly two fives.…
A: Hence there is no programming language mentioned so, I have used python for the solution. please…
Q: Describe some of the data security measures that are utilized in tandem with software-based…
A: Software-based security: The inquiry is interested in learning more about the software-based…
Q: are so many people nowadays so eager to communicate with one another over the
A: Lets see the solution.
Q: Make a list of the characteristics you'd want to see in an entity identification property.
A: Answer:
Q: How would you recommend moving the view of your Visual Studio project to a new form?
A: INTRODUCTION: Adjusting the position, size, and behaviour of windows in Visual Studio enables users…
Q: Examine and brief thoroughly the tools and methods used to in below (Include the Pros and Cons For…
A: A failure mode is a cause of failure or one possible way a system can fail. When a system has many…
Q: Discuss the relevance of rules and processes and a business continuity strategy with your…
A: The following are some of the reasons why corporate policies and processes are so important: 1) The…
Q: Describe the patterns used in distributed architecture. Critically!!, talk about the benefits and…
A: In a distributed architecture, components are displayed on separate platforms, and several members…
Q: Write a python code that asks the user to enter several numbers that are a multiple of 5. If the…
A: Please upvote, I am providing you the correct answer below. Please please please,
Q: Fix the bug
A: In computer technology, a bug is a coding error in a computer program. It is used to describe any…
Q: DRaaS: Disaster Recovery as a Service and Razor Technology provide similar services. To what extent…
A: Given: Disaster recovery as a service (Dramas) is a cloud computing service model that allows an…
Q: Race conditions are possible in many computer systems. Consider an accounting system of an…
A: For the most part, A race condition happens inside the basic segment. In OS terms basic segment is…
Step by step
Solved in 2 steps
- The details of each work out must be stored in a class called WorkOut object shown in the class diagram. Use the class diagram to code the WorkOut object. WorkOut start: DateTime - end : DateTime - description : string - level : integer points: real - numWorkOuts: integer + LOW: integer = 4 + MEDIUM : integer =8 + Constructor (p: real, n:integer) + Constructor (s:string, e:string, d:string, 1:integer) + get Points () : real + getNumWorkOuts (): integer long getMinutes () + int getStars () + changeDescription () + toString(): stringCreate the following class diagram: The print method in: - Author prints the Authors data - Page prints page no and text - Textbook prints the subject and all pages - Novel prints the genre and all pages The toString method in: - Book returns title and authors - textbook returns subject in additions to super toString - Novel genre in additions to super toString Test your implementation create objects of different types example : - Create a book of type Novel which has many pages and several authors - Create a book of type Textbook which has many pages and several authors - Access these objects polymorphically, variable of class book contains objects of its subclasses Textbook and novel - Print a hall book - Print a single page of a book - Print the book and its authorsObject Oriented Programming in JAVA You are part of a team writing classes for the different game objects in a video game. You need to write classes for the two human objects warrior and politician. A warrior has the attributes name (of type String) and speed (of type int). Speed is a measure of how fast the warrior can run and fight. A politician has the attributes name (of type String) and diplomacy (of type int). Diplomacy is the ability to outwit an adversary without using force. From this description identify a superclass as well as two subclasses. Each of these three classes need to have a default constructor, a constructor with parameters for all the instance variables in that class (as well as any instance variables inherited from a superclass) accessor (get) and mutator (set) methods for all instance variables and a toString method. The toString method needs to return a string representation of the object. Also write a main method for each class in which that class is…
- in C# languageDesign a Book class that holds the title, author’s name, and price of the book. Books’s constructor shouldinitialize all of these data members except the price which is set to 500/-. Create a display method thatdisplays all fields.All Books are priced at 500/- unless they are PopularBooks. The PopularBooks subclass replaces theBookprice and sets each Book’s price to 50,000/- through PopularBooks construcor. Override the displaymethod to display all fields.Write a Main () method that declares an array of five Book objects. Ask the user to enter the title andauthor for each of the 5 Books. Consider the Book to be a PopularBook if the author is one of the following:Khaled Hosseini, Oscar Wilde, or Rembrandt. Display the five Books’ details.Slide Type Slide • Exercise # 1: Define a class Point that represents a point in 2 – D plane. The point has x and y coordinates. Define the following: • A constructor to initialize the x, y coordinates. • A method translate(self, dx,dy) to translate the point object dx , and dy units in x and y directions, respectively. • A method distanceTo (self, point2) to return the distance between the point referenced by self and point2. • getX(self) to return the value of x coordinate. • getY(self) to return the value of y coordinate Test the above class by: • Creating 2 point objects; one with (3,5) as x,y coordinates; the second with (-10,30) as x,y coordinates. • Move the first point 5.5 units in x direction and -12.5 units in y direction using translate method • Find the distance between the 2 points in their current location using distance To method A Sample output resulting from running the above test class is shown below new coordinates of point1= (8.5 , -7.5) Coordinates of point 2 =…Library Information System Design and Testing Library Item Class Design and TestingDesign a class that holds the Library Item Information, with item name, author, publisher. Write appropriate accessor and mutator methods. Also, write a tester program(Console and GUI Program) that creates three instances/objects of the Library Items class. Extending Library Item Class Library and Book Classes: Extend the Library Item class in (1) with a Book class with data attributes for a book’s title, author, publisher and an additional attributes as number of pages, and a Boolean data attribute indicating whether there is both hard copy as well as eBook version of the book. Demonstrate Book Class in a Tester Program (Console and GUI Program) with an object of Book class.
- Bread Class -breadType: String - caloriesPerslice: integer + Bread(String breadType, integer caloriesPerslice) + getBreadType(): String + setBreadType(String breadType): void + getCaloriesPerslice(): integer + setCaloriesPerSlice(integer calories): voidRectangle Object Monitoring Create a Rectangle class that can compute the total area of all the created rectangle objects using static fields (variables). Remember that a Rectangle has two attributes: Length and Width. Implement the class by creating a computer program that will ask the user about three rectangle dimensions. The program should be able to display the total area of the three rectangle objects. For this exercise, you are required to apply all OOP concepts that you learned in class. Sample output: Enter Length R1: 1 Enter Width R1: 1 Enter Length R2: 2 Enter Width R2: 2 Enter Length R3: 3 Enter Width R3: 3 The total area of the rectangles is 14.00 Note: All characters in boldface are user inputs.Code the StudentAccount class according to the class diagramMethods explanation:pay(double): doubleThis method is called when a student pays an amount towards outstanding fees. The balance isreduced by the amount received. The updated balance is returned by the method.addFees(double): doubleThis method is called to increase the balance by the amount received as a parameter. The updatedbalance is returned by the method.refund(): voidThis method is called when any monies owned to the student is paid out. This method can onlyrefund a student if the balance is negative. It displays the amount to be refunded and set thebalance to zero. (Use Math.abs(double) in your output message). If there is no refund, display anappropriate message.Test your StudentAccount class by creating objects and calling the methods addFees(), pay() andrefund(). Use toString() to display the object’s data after each method called
- java programming language You are part of a team writing classes for the different game objects in a video game. You need to write classes for the two human objects warrior and politician. A warrior has the attributes name (of type String) and speed (of type int). Speed is a measure of how fast the warrior can run and fight. A politician has the attributes name (of type String) and diplomacy (of type int). Diplomacy is the ability to outwit an adversary without using force. From this description identify a superclass as well as two subclasses. Each of these three classes need to have a default constructor, a constructor with parameters for all the instance variables in that class (as well as any instance variables inherited from a superclass) accessor (get) and mutator (set) methods for all instance variables and a toString method. The toString method needs to return a string representation of the object. Also write a main method for each class in which that class is tested – create…A field has access that is somewhere between public and private. static final Opackage OprotectedWhich import statement should be included in the source code of a class so that the Math class is explicitly imported? Choose from the given choices. *