Create a class called Tanker that has the following attributes: Tanker () Tanker (totalCapacity) addOxygen(Double) - Boolean removeOxygen(Double) - Boolean addWater(Double) - Boolean removeWater(Double) - Boolean addLiquid(Double) - Boolean removeLiquid(Double) - Boolean addGas(Double) - Boolean removeGas(Double) - Boolean toString() - String Note: Tanker totalCapacity - Double oxygenContainer - Double waterContainer - Double liquidContainer - Double gasContainer - Double
Q: Show Proposition: On average, using a 3-way string quicksort, we can create a suffix array from a…
A: The claim asserts that, on average, a random string of length N may be used to generate a suffix…
Q: What are the points of divergence between computers and human beings?
A: The comparison between computers and human beings has long been a subject of fascination and…
Q: Why do we commonly conflate segmentation and paging? I don't understand what you mean by…
A: Segmentation and paging are memory administration scheme in an operating bargain that enable the…
Q: Explain what the words "reliable" and "available" mean in the context of a computer network. what…
A: Reliability in a computer network refers to the capacity of the network to consistently perform its…
Q: Regarding auxiliary space and time complexity, what is the level of demand for randomised quick…
A: According to the information given:-We have to define auxiliary space and time complexity, what is…
Q: How does it function when the data is stored in an associative cache format?
A: Associative cache format, also known as fully associative cache, is a cache organization scheme…
Q: What are the main differences between forward and backward integration, and how can they be shown…
A: forward and backward integration are distinct strategies that companies employ to expand their…
Q: software is often thought to have bugs, the aerospace industry has been making mission-critical…
A: Even though software is often thought to have bugs, the aerospace industry has been making…
Q: How does a DDoS attack use a botnet
A: A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt the normal…
Q: Defend the following claim: (Maxflow-mincut theorem) A st-flow, f, should be. The three following…
A: Maxflow-min-cut theorem:The Maxflow-min-cut theorem is a fundamental result in network flow theory,…
Q: It is possible to summarise the operating system's components and their functions in a single…
A: An operating system (OS) is a critical software layer in a CPU system that serves as an boundary…
Q: Which, low or high reuse factor, is more secure for common reuse practises? Display your work.
A: Software reuse refers to by existing software artifact, such as code, software mechanism, Test…
Q: find the solution of the following ip problem using branch and bound method in order to find…
A: In this branch and bound method using breadth-first search, we aim to solve an Integer Programming…
Q: Where do different computer systems diverge?
A: Different computer systems can diverge in various ways, including hardware architecture, operating…
Q: What language is generated by the following grammars? Is this anambiguous grammars, please justify…
A: --> If a grammar allows for several parse trees or interpretations for a single sentence, it may…
Q: If you have compiled metrics for the software development process, please share them. Everything has…
A: In software development, metrics are central for effectively running, controlling, and humanizing…
Q: Encode oevopov with Huffman coding. a. List all symbols and their probabilities b. Find the Huffman…
A: Huffman coding is a lossless data compression algorithm and in this algorithm, the optimal prefix…
Q: To answer this question, we need to know why HTTP, SMTP, and POP3 use TCP instead of UDP as the…
A: HTTP (Hypertext Transfer Protocol), SMTP (Simple Mail Transfer Protocol), and POP3 (Post Office…
Q: Which platforms allow for agile development?
A: Agile expansion is a methodology in software expansion where necessities and solution are address…
Q: How many different kinds of virus are there? What makes worms different from viruses? Trojan horses:…
A: Malware is harmful software that allows unauthorised access to networks for the purposes of robbery,…
Q: Please explain in short yet percise responses What is the benefit of clustering data?…
A: This subject encompasses three key concepts in data management and analysis. Data clustering allows…
Q: rast the different back-end code architec
A: A compiler is a software tool that translates source code written in a programming language into…
Q: Given a positive integer N and a precision factor P, it produces an output with a maximum error P…
A: Algorithm:Start by setting the initial guess, x, as Repeat the following steps until the maximum…
Q: Which part of the device's hardware enables a direct connection to a network?
A: --> The part of a device's hardware that enables a direct connection to a network is typically…
Q: How does the Model-View-Controller scheme fit into the layout of web apps as a whole? Explain why…
A: The Model- View- Controller( MVC) is a software architectural pattern widely used in the development…
Q: How do today's network apps keep track of all of those interconnections?
A: Various specific mechanisms employed by network apps can vary depending on the programming language,…
Q: How can your device's mac address and IP address protect it on a network? How can they hurt the…
A: The MAC address and IP address are critical components of network communication, providing…
Q: Describe the potential benefits of using software to organise computer science projects. Provide a…
A: Organizing computer science projects can be a complex task, requiring careful planning,…
Q: Describe the potential benefits of using software to organise computer science projects. Provide a…
A: Increased productivity: Software can help to streamline the project management process, making it…
Q: Consider a huge airline's snapshot isolation-based database. What requirements must be satisfied…
A: A structured collection of linked, ordered data that is stored and handled in a computer system is…
Q: Create a class called StringArrayHelper that has the following attributes: StringArrayHelper…
A: - We need to code for the stringHelper code with the required functions.In Java, a string array is a…
Q: Every time you use a method, you have to give it the information it needs.
A: That's correct. In programming, a method is a block of code that performs a specific task. When you…
Q: Let's assume %ecx = 0x000FFD0E and %eax=0x000FED25 (Hexadecimal representation). What is the value…
A: Let's assume %ecx= 0x000FFD0E and %eax= 0x000FED25 (Hexadecimal representation). What is the value…
Q: What exactly is meant by the phrase "memory void"? What triggers this, and how does the operating…
A: About computing, the word"memory void" is not commonly used and is not a standardized term. However,…
Q: Which architectures of back-end compilers need testing?
A: 1) Testing is a fundamental activity in software development that involves evaluating the behavior,…
Q: 10.________ is a review technique used for reviewers who are given structured guidelines on how to…
A: What is evaluate a document: "Evaluating a document" refers to the process of critically analyzing…
Q: My laptop still has no screen even after I updated the BIOS. So, what gives here?
A: For various reasons, your laptop may need a screen output even after updating the BIOS. BIOS, or…
Q: It is easy to explain how dynamic memory allocation works.
A: Dynamic memory share is a core concept in processor science that involve reserving reminiscence…
Q: Assume a computer transmits a packet via the Internet's transport layer to another computer. At the…
A: A computer network is a collection of interconnected devices, such as computers, servers, routers,…
Q: Virtual machines are interpreted differently by operating systems based on their respective…
A: A virtual machine (VM) is a software emulation of an existing central processing unit arrangement…
Q: Can I at least ensure that the length of a bitstream won't rise due to my compression algorithm?
A: Yes, a compression algorithm's main objective is to shorten or reduce the size of a bitstream in…
Q: Could you provide any recommendations for techniques that could be employed to capture the flow of…
A: capturing the flow of data involves employing various techniques and tools depending on the specific…
Q: How do active and passive security scanners differ from one another?
A: Active and passive security scanners are two different approaches to identifying vulnerabilities and…
Q: There are three distinct parts to each programme: the stack, the data, and the code. Locate the…
A: A computer system's code is allotted into three chief parts: the stack, the data, and the code (or…
Q: We have a full associative mapping cache memory with globally 65536 = 2^16 lines. Each line is…
A: *) Used full associative mapping cache memory with globally 65536 = 2^16 lines.*) Each line is…
Q: Compression is defined as: What's your point? Specify (a). List two compression methods you know.…
A: What is data compression and encryption: Data compression is the process of reducing the size of a…
Q: Identify two ways in which operating systems benefit from the adoption of a microkernel structure.
A: One of the key benefits of a microkernel-based operating system is the amplified club stability it…
Q: Cases of Client Work with Software Developers?
A: In any client-developer relationship, effective message is critical. This goes further than regular…
Q: In other words, how does a distributed operating system vary from a networked operating system
A: A distributed operating system and a networked operating system are two different approaches to…
Q: Real-time operating systems are described via examples. Describe the differences between it and a…
A: Timing: RTOSs are designed to meet deadlines, while standard OSes are not. This means that RTOSs can…
27
Step by step
Solved in 3 steps
- In this assignment, you are implementing a class from a model shown here. PlayingCard suit char value int + PlayingCard (s:char, v:int): + getSuit(): char + getValue(): int + setSuit (s:char):void + setValue(v:int):void + toString(): String +isMatch (p:PlayingCard): boolean PlayingCard ADT 1) The constructor takes 2 char values and initializes the value and suit of the PlayingCard. 2) Accessor functions for the suit and value (getters) 3) Mutator functions for the suit and value (setters) 4) A toString method that displays the PlayingCard in the format (value, suit). For example, a 10 of hearts would display as (10,H). Face cards should display K, Q, J, or A, for the values 13, 12, 11, 14, respectively. 5) An isMatch method that takes a PlayingCard p as an argument and returns true if p's suit or value match that of the calling object After writing the class, test each function in a main method before proceeding to the next steps. Once your class is fully tested, write a driver method…The Point2D should store an x and y coordinate pair, and will be used to build a new class via class composition. A Point2D has a x and a y, while a LineSegment has a start point and an end point (both of which are represented as Point2Ds). class Invariants The start and end points of a line segment should never be null Initialize these to the origin instead. Data A LineSegment has a start point This is a Point2D object All data will be private A LineSegment also has an end point. Also a Point2D object Methods Create getters and setters for your start and end points public Point2D getStartPoint() { public void setStartPoint(Point2D start) { Create a toString() function to build a string composed of the startPoint’s toString() and endPoint’s toString() Should look like “Line start(0,0) and end(1,1)” Create an equals method that determines if two LineSegments are equal public boolean equals(Object other) { if(other == null || !(other instanceof LineSegment)) return…Design a new Account class as follows:■■ Add a new data field name of the String type to store the name of thecustomer.■■ Add a new constructor that constructs an account with the specified name, id,and balance.■■ Add a new data field named transactions whose type is ArrayList thatstores the transaction for the accounts. Each transaction is an instance of theTransaction class, which is defined as shown in Figure ■■ Modify the withdraw and deposit methods to add a transaction to thetransactions array list. Write a test program that creates an Account with annual interest rate 1.5%,balance 1000, id 1122, and name George. Deposit $30, $40, and $50 to theaccount and withdraw $5, $4, and $2 from the account. Print an account summarythat shows the account holder name, interest rate, balance, and all transactions.
- Person and Customer Classes Write a class named (Person) with data attributes for a person’s name, address, and telephone number. Provide accessors/getters and mutators/setters for each attribute. Write a displayPerson() to print out the attributes of the Person. Next, write a class named (Customer) that is a subclass of the (Person) class. The (Customer) class should have a data attribute for a customer number, and a Boolean data attribute indicating whether the customer wishes to be on a mailing list. Provide accessors/getters and mutators/setters for each attribute. Write a display customer() to print out the attributes of the Customer. Demonstrate an instance of the (Customer) class in a simple program.Create a class called Staff that has the following attributes: Staff String - FirstName String - LastName String - Department String - Title Integer - UIN Staff() Staff(FirstName, LastName, Department, Title, UIN) getFirstName() - String setFirstName(String) - void getLastName() - String setLastName(String) - void getDepartment() - String setDepartment(String) - void getTitle() - String setTitle(String) - void getUIN() - Integer setUIN(Integer) - void toString() - String compareTo(Staff) - Integer equals(Staff) - Boolean PreviousNextCreate an Employee class. Attributes(must be private): Employee has a name and basic_salary Methods:Employee(string, float); //ConstructorAllowances are computed as: float getHouseRent(); //House rent is 45% of the basic pay. float getMedicalAllowance(); //Medical Allowance is 5% of the basic pay. float getConveyanceAllowance(); //Conveyance allowance is 10% of the basic payfloat getGrossPay(); //Salary including rent and allowances{You can implement additional function/s if needed} Then Create an Organization class. Organization has 10 Employees (Hint: You will need an array of pointers to Employee class) Organization can calculate the total amount to be paid to all employees Organization can print the details(name & salary) of all employees Note: Use main,header and functions.cpp to write code.
- Design a class named StopWatch. The class contains:■■ Private data fields startTime and endTime with getter methods.■■ A no-arg constructor that initializes startTime with the current time.■■ A method named start() that resets the startTime to the current time.■■ A method named stop() that sets the endTime to the current time.■■ A method named getElapsedTime() that returns the elapsed time for thestopwatch in milliseconds.Draw the UML diagram for the class then implement the class. Write a test programthat measures the execution time of sorting 100,000 numbers using selection sort.Create an Employee Class with the ff: attributes: = String name = double salary = String birthday = __init__(self, name, salary, birthday) = String getDetails() -- returns a String value that represents all the information of the Employee object Create a Manager class that inherits Employee, a Manager will also have the ff: = String department = __init__(self, name, salary, birthday, department) = String getDetails() -- returns a String value that represents all the information of the Manager object Create a Director class that inherits Manager, a Director will also have the ff: = double carAllowance = __init__(self, name, salary, birthday, department, carAllowance) = def playGolf() -- will print a string value '{name of director} plays golf' = String getDetails() -- returns a String value that represents all the information of the Director object Create 2 objects of each class and call their respective getDetails() method. Do not write WET codes, be sure there's no…Create a RightTriangle class given the following design: RightTriangle variables: base, height methods: 2 constructors, 1 that set default values and another that accepts to parameters. setBase - changes the base. Requires one parameter for base. setHeight - changes the height. Requires one parameter for height. getBase - returns the triangle base. getHeight - returns the triangle height. area - returns the area of the triangle (1/2bh) given the current base and height
- A whole-part connection or composition occurs when a class contains objects of another class. The result is a has-a relationship. Consider the long statement: Outputsales.getHighestPaidEmployee(). getHireDate(). getYear().The class "Car" has the following attributes: plate (String), mark (String), model (String), year (int), km (int).Write a constructor method for the "Car" class that takes values as parameters for all these attributes.Sample Interaction: Constructor & Mutator Methods Output iPhone = ApplePhone('Black', '11 Pro', 64, 'Verizon') iPhone.set_airdrop_status('On'); print(iPhone) This is a Black 11 Pro Apple Phone Capacity is 64 GB. Carrier is Verizon | AirDrop Status is On aPhone = AndroidPhone('White', 'Note 10', 128, 'AT&T') aPhone.set_split_screen_mode('On'); print(aPhone) This is a White Note 10 Android Phone Capacity is 128 GB. Carrier is AT&T Split-Screen Mode is On Polymorphic Functions Output iPhone.get_storage() Storage is 64 GB iPhone.uprade_storage(128) Updating storage is not allowed on Apple phones aPhone.get_storage() Storage is 128 GB aPhone.upgrade_storage(256) Old storage is 128 GB New storage is 256 GB aPhone.upgrade_storage(128) You can't rollback memory! aPhone.get_storage() Storage is 256 GB iPhone.connect_cloud() Connecting to iCloud... iPhone.download_app('Starbucks') Opening Apple Store to download Starbucks app.. aPhone.connect_cloud() Connecting to gdrive..…