
Explanation of Solution
Program:
File name: “NewspaperSubscription.java”
//Define an abstract class named NewspaperSubscription
public abstract class NewspaperSubscription
{
//Declare required instance variables
protected String name;
protected String address;
protected double rate;
//Define required getter function for the
//instance variable name
public String getName()
{
//Return the value
return name;
}
//Define required setter function for the instance
//variable name
public void setName(String n)
{
//Set the value of the instance variable name by
//assigning the value in the function parameter to
//the variable name
name = n;
}
//Define required getter function for the instance
//variable address
public String getAddress()
{
//Return the value
return address;
}
//Define the required getter function getRate() for
//the instance variable rate
public double getRate()
{
//Return the value
return rate;
}
//Declare the prototype of an abstract function setAddress()
public abstract void setAddress(String s);
}
File name: “PhysicalNewspaperSubscription.java”
//Define a class named PhysicalNewspaperSubscription
//inheriting the class NewspaperSubscription
public class PhysicalNewspaperSubscription extends NewspaperSubscription
{
//Define the overriden method setAddress()
public void setAddress(String a)
{
//Declare and initialize required Boolean variables
//to store the result of the condition if the given
//address includes a digit or not
boolean hasDigit = false;
address = a;
//Traverse the character array using a for each loop
for(int x = 0; x < a.length(); ++x)
//If the current character is a digit, then
//assign true to the variable hasDigit
if(Character.isDigit(a.charAt(x)))
hasDigit = true;
//If the value of the variable hasDigit is true,
//then assign 15 to the instance variable rate
if(hasDigit)
rate = 15.00;
//Otherwise, display an appropriate message and
//assign 0 to the instance variable rate
else
{
rate = 0;
//Print the result
System.out.print("\nAddress must contain a digit ");
}
}
}
File name: “OnlineNewspaperSubscription.java”
//Define a class named OnlineNewspaperSubscription
//extending the class NewspaperSubscription
public class OnlineNewspaperSubscription extends NewspaperSubscription
{
//Define the overriden method setAddress()
public void setAddress(String a)
{
//Declare and initialize required Boolean variables
//to store the result of the condition if the given
//address includes a sign or not
boolean hasAtSign = false;
address = a;
//Traverse the character array using a for each loop
for(int x = 0; x < a...

Want to see the full answer?
Check out a sample textbook solution
Chapter 11 Solutions
EBK JAVA PROGRAMMING
- Draw an ERD that represents a book in a library system. Be sure to add relationship types, key attributes, attributes and multiplicity on the ERD.arrow_forward2:21 m Ο 21% AlmaNet WE ARE HIRING Experienced Freshers Salesforce Platform Developer APPLY NOW SEND YOUR CV: Email: hr.almanet@gmail.com Contact: +91 6264643660 Visit: www.almanet.in Locations: India, USA, UK, Vietnam (Remote & Hybrid Options Available)arrow_forwardProvide a detailed explanation of the architecture on the diagramarrow_forward
- hello please explain the architecture in the diagram below. thanks youarrow_forwardComplete the JavaScript function addPixels () to calculate the sum of pixelAmount and the given element's cssProperty value, and return the new "px" value. Ex: If helloElem's width is 150px, then calling addPixels (hello Elem, "width", 50) should return 150px + 50px = "200px". SHOW EXPECTED HTML JavaScript 1 function addPixels (element, cssProperty, pixelAmount) { 2 3 /* Your solution goes here *1 4 } 5 6 const helloElem = document.querySelector("# helloMessage"); 7 const newVal = addPixels (helloElem, "width", 50); 8 helloElem.style.setProperty("width", newVal); [arrow_forwardSolve in MATLABarrow_forward
- Hello please look at the attached picture. I need an detailed explanation of the architecturearrow_forwardInformation Security Risk and Vulnerability Assessment 1- Which TCP/IP protocol is used to convert the IP address to the Mac address? Explain 2-What popular switch feature allows you to create communication boundaries between systems connected to the switch3- what types of vulnerability directly related to the programmer of the software?4- Who ensures the entity implements appropriate security controls to protect an asset? Please do not use AI and add refrencearrow_forwardFind the voltage V0 across the 4K resistor using the mesh method or nodal analysis. Note: I have already simulated it and the value it should give is -1.714Varrow_forward
- EBK JAVA PROGRAMMINGComputer ScienceISBN:9781337671385Author:FARRELLPublisher:CENGAGE LEARNING - CONSIGNMENTMicrosoft Visual C#Computer ScienceISBN:9781337102100Author:Joyce, Farrell.Publisher:Cengage Learning,C++ Programming: From Problem Analysis to Program...Computer ScienceISBN:9781337102087Author:D. S. MalikPublisher:Cengage Learning
- Programming Logic & Design ComprehensiveComputer ScienceISBN:9781337669405Author:FARRELLPublisher:CengageEBK JAVA PROGRAMMINGComputer ScienceISBN:9781305480537Author:FARRELLPublisher:CENGAGE LEARNING - CONSIGNMENTC++ for Engineers and ScientistsComputer ScienceISBN:9781133187844Author:Bronson, Gary J.Publisher:Course Technology Ptr




