Question 10 10 out of 10 points Q When a subclass overrides a superclass method, only the subclass's version of the method can be called with a subclass object. Question 9 10 out of 10 points Select the option that is not inheritable by a subclass
Q: If you created a main document based on an existing document entitled "Confirmation Letter," what…
A: When you create a new document in Microsoft Word, the software automatically assigns a default…
Q: Change the following code so that there is always at least one way to get from the left corner to…
A: Here's an explanation of how the updated code works step by step, along with its key components: 1.…
Q: Using python code Find maximum value of a list: values = [2, 45, 3, 25, 6, 8, 5, 100, 104] Then,…
A: Here is a simple Python script to find the maximum value in the list and then remove it:values = [2,…
Q: Hello! I need your help. Got a lab which is not getting solved. I have a task to make a windows form…
A: The objective of the provided question is to create a Windows Form Application using C# for ordering…
Q: Last Chance Securities The IT director opened the department staff meeting today by saying, "I've…
A: **Defining the Scope for the Payroll Project**: The scope of the payroll system project includes:…
Q: Project Overview The objective of this project is to design a 32-bit bi-directional shift register…
A: 3. Explanation of Key PointsShift Logic:The shift_amt signal selects the number of bits to shift.dir…
Q: Write program to display your name and perform following operations on it: Display n characters…
A: Explanation of the Code:Defining the Name:name = "ChatGPT": Here we define the string variable name.…
Q: You are managing a Small Office Home Office (SOHO) network connected to the Internet via a fibre…
A: One of the first things to check when experiencing slow Internet speeds is the physical condition of…
Q: 4. [15 pts] A logic function F of four variables a; b; c; d is described by the following K-map.…
A: The given Karnaugh Map (K-map) into a Sum of Products (SOP) expression. Step 1: Understanding the…
Q: Make the following game user friendly with GUI, with some simple graphics The following code works…
A:
Q: Please answers two questions of JAVA OOP.
A: The first question is asking for the appropriate UML (Unified Modeling Language) representation of a…
Q: An employee is departing from the company you work for. Explain why it could be best practice not to…
A: In a corporate environment, each employee is typically assigned a unique user account. This account…
Q: Write a C++ program that will count from 1 to 10 by 1. The default output should be 1, 2, 3, 4, 5, 6…
A: The problem is asking to create a C++ program that counts from 1 to 10 by default. However, the…
Q: What are three examples each of closed-ended, open-ended, and range-of-response questions? thank you
A: I clearly define each type of question and provide straightforward examples that fit their…
Q: Please fix this code it is supposed to display CS 220 with pixels at the center of the screen for…
A: .Improving the CodeHere's a revised version of the code with a loop to write all characters and a…
Q: Question 23
A: Signifiers in HCI In Human-Computer Interaction (HCI), a signifier is a visual or auditory cue that…
Q: 4G+ Vo) % 1.1. LTE1 : Q B NIS شوز طبي ۱:۱۷ کا A X حاز هذا على إعجاب Mohamed Bashar. MEDICAL SHOE شوز…
A: Key references: Piri, E., Jafarnezhadgero, A. A., & Ebrahimpour, H. (2023). The Effects of Foot…
Q: Find all the data dependencies for the following MIPS program. Draw pipelined diagram if necessary…
A: Step 3: Pipelined DiagramTo represent the dependencies, let's consider a classic 5-stage MIPS…
Q: Write the following code segment in MARIE’s assembly language:if X <= Y thenY = Y - 1;else if X…
A: The problem is asking to translate a given code segment into MARIE’s assembly language. The code…
Q: Activity No. Activity Time (weeks) Immediate Predecessors 1 Requirements collection 3 2 Requirements…
A: Summary of Network Diagram and Critical Path AnalysisNetwork Diagram:The project consists of seven…
Q: Draw a system/level-0 diagram for this scenario: You are developing a new customer relationship…
A: Entities:CustomersRent moviesProvide commentsMake paymentRequest rental extensionReceive…
Q: Please solve the following graphing problem. This course is analysis of algorithms and…
A: Topological sorting is a linear ordering of vertices in a directed graph such that for every…
Q: 3.) File Encryption and DecryptionWrite a program that uses a dictionary to assign “codes” to each…
A: The question requires us to write two programs. The first program should read a text file, encrypt…
Q: I need help with this in Python (with flowchart): Im creating a reverse guessing game. Then to…
A: Step 1: Note: I will provide you two different codes please choose as per your requirements. Reverse…
Q: What is a functional decomposition diagram? what is a good example of a high level task being broken…
A: A Functional Decomposition Diagram (FDD) is a hierarchical breakdown of a system, process, or…
Q: a database with multiple tables from attributes as shown above that are in 3NF, showing PK, non-key…
A: To determine the database schema in 3rd Normal Form (3NF), let's follow the normalization steps…
Q: Write a C program that counts the number of ones (set bits) in the binary representation of a given…
A: The objective of the question is to write a C program that counts the number of ones (set bits) in…
Q: I would like to know the main features about the following three concepts: 1. Default forwarded 2.…
A: Here is a detailed explanation of the three concepts:1. Default Forwarded (Default…
Q: Suppose that the MinGap method below is added to the Treap class on Blackboard. public int MinGap( )…
A: 1. Design Document: Additional Data for O(1) MinGapFor the Treap to maintain an O(1) time complexity…
Q: We are considering the RSA encryption scheme. The involved numbers are small, so the communication…
A: Let's give it a try. To provide precise answer, I believe further reference is necessary, but I will…
Q: Recognizing the Use of Steganography in Forensic Evidence (4e)Digital Forensics, Investigation, and…
A: Approach to solving the question: Digital Forensics Detailed explanation: Tutors can't provide the…
Q: Question 20
A: Explainability is correct because:Explainability is a property, not a source of bias: This concept…
Q: Why are scale and grouping of characters important in frame composition? Using any digital medium,…
A: ConclusionScale and grouping in frame composition are powerful tools in game design. They shape the…
Q: What does a relational database use to uniquely identify each row in a table?a) indexesb) foreign…
A: The incorrect answer are:a) indexes: Indexes can improve the speed of data retrieval but do not…
Q: Using python, remove highes and lowest score and then sum the remaining 6 scores: scores = [1.4,…
A: scores = [1.4, 5.5, 4.7, 2.0, 6.3, 7.5, 2.6, 5.3, 8.1] # Sort the scores scores.sort() # Remove…
Q: Discuss with appropriate examples, the types of relationship in a database. Give two references from…
A: Approach to solving the question:In relational databases, relationships define how tables interact…
Q: Find the Error: date_string = input('Enter a date in the format mm/dd/yyyy: ') date_list =…
A: The provided code is intended to take a date input from the user in the format 'mm/dd/yyyy', split…
Q: a) An example of the linear hash index is given below. Every time a new overflow page is added, the…
A: Okay, let's walk through the process of adding the keys 39, 25, and 29 to the linear hash index…
Q: 7. See the code below and solve the following. public class Test { public static void main(String[]…
A: Recursion TheoryDefinition of Recursion:A recursive function is one that calls itself in its own…
Q: (Using R language)
A: (ii) Plot the Fibonacci Sequence Trajectory # Initialize the first two terms of the Fibonacci…
Q: When the given integer variable numberOfPackages is: greater than 12, output "Needs more than one…
A: The problem is asking to categorize the number of packages into different box sizes based on the…
Q: Answer this in hand written note
A: Step 1: Construct the Flow NetworkTo transform the given bipartite graph into a flow network…
Q: Objective you will: 1. Implement a Binary Search Tree (BST) from scratch, including the Big Five…
A: Implementing BST and TreeSort in C++1. OverviewThis project implements a Binary Search Tree (BST)…
Q: Please answer the JAVA OOP questions below: How do arrays of objects differ from arrays of primitive…
A: In Java, arrays can be of primitive types or of objects. The main difference between these two is…
Q: please help me translate the following Jack code into its tokenized XML code.
A: To answer the question explicitly, let's break down the provided Jack code and translate it into its…
Q: Question 6
A: Approach to solving the question:To answer this question, I needed to understand the concept of…
Q: make a screen capture showing the StegExpose results
A: What is StegExpose?StegExpose is a steganography detection tool used to analyze image files and…
Q: Should software manufacturers should be tolerant of the practice of software piracy in third-world…
A: No, they don't promote piracy, of course. They just don't fight piracy too enthusiastically, if at…
Q: Refer to page 70 for problems related to process synchronization. Instructions: • • Solve a…
A:
Q: In cell C16, enter a formula to calculate the price of the vehicle minus your available cash (from…
A: The objective of the question is to calculate the difference between the price of a vehicle and the…
Answer two JAVA OOP questions please.


Unlock instant AI solutions
Tap the button
to generate a solution
Click the button to generate
a solution
- A(n) ____________ is one instance or variable of a class.The technique of packaging an objects attributes into a cohesive unit that can be used as an undivided entity is ____________. a. inheritance b. encapsulation c. polymorphism d. interfacingWhat is the difference between a friend function of a class and a member function of a class? (3)
- Chapter 10 defined the class circleType to implement the basic properties of a circle. (Add the function print to this class to output the radius, area, and circumference of a circle.) Now every cylinder has a base and height, where the base is a circle. Design a class cylinderType that can capture the properties of a cylinder and perform the usual operations on the cylinder. Derive this class from the class circleType designed in Chapter 10. Some of the operations that can be performed on a cylinder are as follows: calculate and print the volume, calculate and print the surface area, set the height, set the radius of the base, and set the center of the base. Also, write a program to test various operations on a cylinder.Using classes, design an online address book to keep track of the names, addresses, phone numbers, and dates of birth of family members, close friends, and certain business associates. Your program should be able to handle a maximum of 500 entries. Define a class addressType that can store a street address, city, state, and ZIP code. Use the appropriate functions to print and store the address. Also, use constructors to automatically initialize the member variables. Define a class extPersonType using the class personType (as defined in Example 10-10, Chapter 10), the class dateType (as designed in this chapters Programming Exercise 2), and the class addressType. Add a member variable to this class to classify the person as a family member, friend, or business associate. Also, add a member variable to store the phone number. Add (or override) the functions to print and store the appropriate information. Use constructors to automatically initialize the member variables. Define the class addressBookType using the previously defined classes. An object of the type addressBookType should be able to process a maximum of 500 entries. The program should perform the following operations: Load the data into the address book from a disk. Sort the address book by last name. Search for a person by last name. Print the address, phone number, and date of birth (if it exists) of a given person. Print the names of the people whose birthdays are in a given month. Print the names of all the people between two last names. Depending on the users request, print the names of all family members, friends, or business associates.Assume the definition of class foodType as given in Exercise 6. Answer the following questions? (1, 2, 3, 5, 6) Write the definition of the member function set so that private members are set according to the parameters. The values of the int and double instance variables must be nonnegative. Write the definition of the member function print that prints the values of the data members. Write the definitions of the member functions getName, getcalories, getFat, getSugar, getCarbohydrate, getPotassium to return the values of the instance variable. Write the definition of the default constructor of the class foodType so that the private member variables are initialized to 0, 0. 0, 0, 0. 0, 0. 0, respectively. Write the definition of the constructor with parameters of the class foodType so that the private member variables are initialized according to the parameters. The values of the int and double instance variables must be nonnegative. Write a C + + statement that prints the value of the object fruit 2. Write a C++ statement that declares an object my Fruit of type foodType, and initializes the member variables of myFruit to Apple, 52, 0. 2, 10,13.8, and 148.0, respectively.
- In Chapter 10, the class clockType was designed to implement the time of day in a program. Certain applications, in addition to hours, minutes, and seconds, might require you to store the time zone. Derive the class extclockType from the class clockType by adding a member variable to store the time zone. Add the necessary member functions and constructors to make the class functional. Also, write the definitions of the member functions and the constructors. Finally, write a test program to test your class.Some of the characteristics of a book are the title, author(s), publisher, ISBN, price, and year of publication. Design a class bookType that defines the book as an ADT. Each object of the class bookType can hold the following information about a book: title, up to four authors, publisher, ISBN, price, and number of copies in stock. To keep track of the number of authors, add another member variable. Include the member functions to perform the various operations on objects of type bookType. For example, the usual operations that can be performed on the title are to show the title, set the title, and check whether a title is the same as the actual title of the book. Similarly, the typical operations that can be performed on the number of copies in stock are to show the number of copies in stock, set the number of copies in stock, update the number of copies in stock, and return the number of copies in stock. Add similar operations for the publisher, ISBN, book price, and authors. Add the appropriate constructors and a destructor (if one is needed). Write the definitions of the member functions of the class bookType. Write a program that uses the class bookType and tests various operations on the objects of the class bookType. Declare an array of 100 components of type bookType. Some of the operations that you should perform are to search for a book by its title, search by ISBN, and update the number of copies of a book.Mark the following statements as true or false. a. In single inheritance, a base class can create only one derived class. (1) b. The public members of a base class can only be inherited as public members in the derived class. (2) c. To redefine (or override) a member function of the base class in the derived class, the corresponding member function must have the same name, number, and type of parameters. (3) d. If the derived class does not override a public member function of the base class, you may specify a call to that public member function by using the name of the function and the appropriate parameter list. (3) e. The constructor of a derived class can specify a call to the constructor of the base class in the heading of the function definition. (4) f. The constructor of a derived class can specify a call to the constructor of the base class using the name of the class. (4) g. Suppose that x and y are classes, one of the member variables of x is an object of type y, and both classes have constructors. The constructor of x specifies a call to the constructor of y by using the object name of type y. (4) h. When the destructor of the derived class executes, it automatically invokes the destructor of the base class. (5) i. The class ios is the base class for all stream classes. (7) j. In protected inheritance, the private members of the base class are protected members of the derived class. (8) k. In composition, one or more members of a class are objects of another class type. (9)









