Java - Object Oriented Programming Please solve urgently

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Java - Object Oriented Programming
Please solve urgently

customer
Customer
«enumeration»
CustomerType
CRM_ID fid}
type: CustomerType
description: String (0..1]
Individual
Entitlement
Company
EID: String (id)
0.*
type: EntitlementType
startDate: Date
endDate: Date 0.1]
neverExpires: Boolean = true
comments: String [0..1]
Individual
Company
firstName: String
lastName: String
middleName: String [0..1]
email: String
phone: String (0.1]
locale: String [0..1] = "English"
name: String
phone: String (0.1)
fax: String [0.1]
«enumeration»
EntitlementType
Hardware Key
Product Key
Protection Key Update
Contact
Details
street: String (0.1]
city: String (0.1]
postalCode: String (0..1]
state: String [0.1
country: String [0.1]
firstName: String
lastName: String
middleName: String [0..1]
email: String
locale: String (0.1] = "English"
Batch Code
billing
billing
id: String fid, id.size() = 5}
shipping
shipping
«enumeration»
LockingType
features (ordered, unique)
products * (ordered, unique)
Product
HL
SL-AdminMode
Feature
associatedFeature
SL-UserMode
0.
id: Integer (id)
name: String {name.size() <= 50}
description: String (0..1]
id: Integer (id)
name: String {name.size() <= 50}
1.
HL or SL-AdminMode
HL or SL (AdminMode or UserMode)
provisionalProduct lockingType: LockingType
rehost: Rehost
0. description: String (0..1]
«enumeration»
Rehost
* (ordered,
unique)
products
baseProduct
Enable
Disable
© uml-diagrams.org
Leave as it is
Specify at entitlement time
Transcribed Image Text:customer Customer «enumeration» CustomerType CRM_ID fid} type: CustomerType description: String (0..1] Individual Entitlement Company EID: String (id) 0.* type: EntitlementType startDate: Date endDate: Date 0.1] neverExpires: Boolean = true comments: String [0..1] Individual Company firstName: String lastName: String middleName: String [0..1] email: String phone: String (0.1] locale: String [0..1] = "English" name: String phone: String (0.1) fax: String [0.1] «enumeration» EntitlementType Hardware Key Product Key Protection Key Update Contact Details street: String (0.1] city: String (0.1] postalCode: String (0..1] state: String [0.1 country: String [0.1] firstName: String lastName: String middleName: String [0..1] email: String locale: String (0.1] = "English" Batch Code billing billing id: String fid, id.size() = 5} shipping shipping «enumeration» LockingType features (ordered, unique) products * (ordered, unique) Product HL SL-AdminMode Feature associatedFeature SL-UserMode 0. id: Integer (id) name: String {name.size() <= 50} description: String (0..1] id: Integer (id) name: String {name.size() <= 50} 1. HL or SL-AdminMode HL or SL (AdminMode or UserMode) provisionalProduct lockingType: LockingType rehost: Rehost 0. description: String (0..1] «enumeration» Rehost * (ordered, unique) products baseProduct Enable Disable © uml-diagrams.org Leave as it is Specify at entitlement time
When software vendor purchases a Sentinel HASP License Development Kit (LDK), the vendor
is also provided with a unique batch code and corresponding vendor key that contains unique
vendor code specific to the company. The code is used by Sentinel LDK to communicate with
protection keys, and to differentiate vendor keys from those of other software vendors.
A batch code consists of five characters that represent company's unique vendor code. When
Sentinel protection keys are ordered from SafeNet, batch code is written to the keys before sending
to the vendor. The batch code is also written on the outside of each key.
A feature is some identifiable functionality of a software application. Features may use to identify
entire executables, software modules, NET or Java methods, or a specific functionality such as
print or save. Each feature is assigned unique identifier and is associated with a specific batch
code. Feature id and feature name both should be unique in the associated batch. The maximum
length for a feature name is 50 characters.
Each protected software product has some features and is associated with a batch code. A product
name that identifies the product is unique in the selected batch. The maximum length for a product
name is 50 characters. Product has some specific locking type (type of protection) to be applied
to the product.
The basic unit on which all products are created is the base product. A base product can contain
all the product attributes such as features, licensing data and memory, and can be used as a product
offered for sale. Provisional products could be also defined to be distributed as trialware. The
properties for provisional products are not completely identical to those of the base product. After
a product has been defined, it can be included in entitlements (orders).
Transcribed Image Text:When software vendor purchases a Sentinel HASP License Development Kit (LDK), the vendor is also provided with a unique batch code and corresponding vendor key that contains unique vendor code specific to the company. The code is used by Sentinel LDK to communicate with protection keys, and to differentiate vendor keys from those of other software vendors. A batch code consists of five characters that represent company's unique vendor code. When Sentinel protection keys are ordered from SafeNet, batch code is written to the keys before sending to the vendor. The batch code is also written on the outside of each key. A feature is some identifiable functionality of a software application. Features may use to identify entire executables, software modules, NET or Java methods, or a specific functionality such as print or save. Each feature is assigned unique identifier and is associated with a specific batch code. Feature id and feature name both should be unique in the associated batch. The maximum length for a feature name is 50 characters. Each protected software product has some features and is associated with a batch code. A product name that identifies the product is unique in the selected batch. The maximum length for a product name is 50 characters. Product has some specific locking type (type of protection) to be applied to the product. The basic unit on which all products are created is the base product. A base product can contain all the product attributes such as features, licensing data and memory, and can be used as a product offered for sale. Provisional products could be also defined to be distributed as trialware. The properties for provisional products are not completely identical to those of the base product. After a product has been defined, it can be included in entitlements (orders).
Expert Solution
steps

Step by step

Solved in 3 steps

Blurred answer
Knowledge Booster
Structured English
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education