
Big Java, Binder Ready Version: Early Objects
6th Edition
ISBN: 9781119056447
Author: Cay S. Horstmann
Publisher: WILEY
expand_more
expand_more
format_list_bulleted
Question
Chapter 3, Problem 13PE
Program Plan Intro
Product Class
Product.java:
- Define the class “Product”.
- Declare required variables.
- Define the parameterized constructor.
- Initialize the values.
- Define the function “getName ()”, “getPrice ()”, “getPriceReduction” to return the product’s name, price and price reduction respectively.
- Define the function definition for “reducePrice ()” to get the reduced price.
ProductPrinter.java:
- Define the class “ProductPrinter”.
- Define the method “main ()”.
- Create an object for “Product” class and pass the name, and price.
- Call the function “reducePrice ()” to reduce the price of the product by $5.
- Print the name, price and reduced price by calling the functions “getName ()”, “getPrice ()”, and “reducePrice ()” respectively.
- Create another object for “Product” class and pass the name, and price.
- Call the function “reducePrice ()” to reduce the price of the product by $10.
- Print the name, price and reduced price by calling the functions “getName ()”, “getPrice ()”, and “reducePrice ()” respectively.
- Define the method “main ()”.
Expert Solution & Answer

Want to see the full answer?
Check out a sample textbook solution
Students have asked these similar questions
Simulate on a vertical time axis (with events labeled with the senders names A-D) the contention period of FOUR equally distanced Ethernet stations that all attempt to transmit at T=0 a minimally sized frame, in the style of the binary Exponential Backoff Algorithm. Assume that time is measured in slot times, and that exactly one slot time is needed to detect a collision (so that if two stations transmit at T=1 and collide, and one of them chooses a backoff time k=0, then that station will transmit again at T=2).
Use as coin flip (source of randomness) an ID written in binary.
use the bits in order from the least significant to the most significant. If for a given coin throw you need k bits, use the least significant ID bit extracted in the corresponding group of bits, as the least significant bit of the coin thrown.
Start be writing the ID, which is 904012207
As example of the expected answer format,
with the random sequence R: 100101010101001011001010 01 01011 10010 1010 1010 010…
Big State University
The Big State University course catalog reads as follows: "To enroll in MIS 260, which is an advanced
course, a student must complete two prerequisites: MIS 120 and MIS 222. A student who completes
either one of these prerequisites and obtains the instructor's permission, however, will be allowed to
take MIS 260."
Tasks
1. Create a decision table that describes the Big State University course catalog regarding eligibility for
MIS 260. Show all possible rules.
2. Simplify the table you just created. Describe the results.
3. Draw a simplified decision tree to represent the Big State University catalog. Describe the results.
4. Why might you use a decision tree rather than a decision table?
What is the ALU result if the 4-bit ALU Control signal is 0100? What happens if the ALU Control signal is 0101?
Chapter 3 Solutions
Big Java, Binder Ready Version: Early Objects
Ch. 3.1 - Supply the body of a method public void unclick()...Ch. 3.1 - Suppose you use a class Clock with private...Ch. 3.1 - Consider the Counter class. A counter’s value...Ch. 3.1 - Prob. 4SCCh. 3.1 - Suppose you are working in a company that produces...Ch. 3.2 - Prob. 6SCCh. 3.2 - Prob. 7SCCh. 3.2 - Suppose you want a more powerful bank account...Ch. 3.2 - Suppose we enhance the BankAccount class so that...Ch. 3.2 - Why is the following documentation comment...
Ch. 3.3 - Suppose we modify the BankAccount class so that...Ch. 3.3 - Why does the following code not succeed in robbing...Ch. 3.3 - The Rectangle class has four instance variables:...Ch. 3.3 - Give a possible implementation of the translate...Ch. 3.4 - Prob. 15SCCh. 3.4 - Prob. 16SCCh. 3.5 - Consider a Car class that simulates fuel...Ch. 3.5 - Trace the following method calls:
Car myCar =...Ch. 3.5 - Prob. 19SCCh. 3.5 - Prob. 20SCCh. 3.6 - Prob. 21SCCh. 3.6 - Why was it necessary to introduce the local...Ch. 3.6 - Prob. 23SCCh. 3.7 - Prob. 24SCCh. 3.7 - Prob. 25SCCh. 3.7 - Prob. 26SCCh. 3.8 - Prob. 27SCCh. 3.8 - Prob. 28SCCh. 3.8 - Prob. 29SCCh. 3 - Prob. 1RECh. 3 - Prob. 2RECh. 3 - Instance variables are a part of the hidden...Ch. 3 - Prob. 4RECh. 3 - Prob. 5RECh. 3 - Prob. 6RECh. 3 - Prob. 7RECh. 3 - Show that the BankAccount (double initialBalance)...Ch. 3 - Why does the BankAccount class not have a reset...Ch. 3 - What happens in our implementation of the...Ch. 3 - What is the this reference? Why would you use it?
Ch. 3 - Prob. 12RECh. 3 - Prob. 13RECh. 3 - Prob. 14RECh. 3 - Consider the following implementation of a class...Ch. 3 - Consider the following implementation of a class...Ch. 3 - Provide a unit test class for the Counter class in...Ch. 3 - Read Exercise E3.12, but do not implement the Car...Ch. 3 - Prob. 19RECh. 3 - Prob. 20RECh. 3 - Using the object tracing technique described in...Ch. 3 - Design a modification of the BankAccount class in...Ch. 3 - Suppose you want to extend the car viewer program...Ch. 3 - Explain why the calls to the getWidth and...Ch. 3 - Prob. 25RECh. 3 - We want to add a button to the tally counter in...Ch. 3 - Simulate a tally counter that can be used to admit...Ch. 3 - Prob. 3PECh. 3 - Prob. 4PECh. 3 - Change the public interface of the circuit class...Ch. 3 - Write a BankAccountTester class whose main method...Ch. 3 - Add a method
public void addInterest(double...Ch. 3 - Prob. 8PECh. 3 - Add a method printReceipt to the CashRegister...Ch. 3 - After closing time, the store manager would like...Ch. 3 - Implement a class Employee. An employee has a name...Ch. 3 - Prob. 12PECh. 3 - Implement a class Product. A product has a name...Ch. 3 - Prob. 14PECh. 3 - Prob. 15PECh. 3 - Prob. 16PECh. 3 - Prob. 17PECh. 3 - Prob. 18PECh. 3 - Prob. 19PECh. 3 - Prob. 20PECh. 3 - Prob. 21PECh. 3 - Prob. 22PECh. 3 - Write a program to plot the string “HELLO”, using...Ch. 3 - Write a program that displays the Olympic rings....Ch. 3 - Prob. 25PECh. 3 - Prob. 1PPCh. 3 - Support computing sales tax in the CashRegister...Ch. 3 - Implement a class Balloon. A balloon starts out...Ch. 3 - Prob. 4PPCh. 3 - Prob. 5PPCh. 3 - Prob. 6PPCh. 3 - Implement a class Student. For the purpose of this...Ch. 3 - Prob. 8PPCh. 3 - Write a program that draws three stars like the...Ch. 3 - Prob. 10PPCh. 3 - Implement a VotingMachine class that can be used...Ch. 3 - In this project, you will enhance the BankAccount...Ch. 3 - In this project, you will explore an...
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- #include int main (void) { int i, *p, count } p = &count; = 10%; for (i = 5; i >= 0; i--) { count++; (*p) ++; } printf("count return 0; = %d, Have a wonderful day.\n", count); 1. [20 pts] What is the output of the program? Please explain why. 2. [15 pts] What is the gdb command to set a breakpoint in line 6 (p = &count;)? 3. [15 pts] Explain in your own words how the [break. need to use such command? ... if expr] command works. When might youarrow_forwardPlease run and debug the following program and answer the questions.arrow_forward(OnlineGDB) #include <stdio.h>int main(void) {int a;char *s;int v0 = 4, v1 = 5, v2 = 6, v3 = 1, v4 = 2;printf("Exercise 1:\n====================\n");switch(v0) {case 0: printf("Hello October\n"); break;case 1: printf("Go Kean!\n"); break;case 2: printf("Academic Building Center \n"); break;case 3: printf("UNION \n"); break;case 4: printf("Go ");case 5: printf("Kean! \n");default: printf("Have a great semester! \n"); break;}for(a=5; a<v1; a++) {printf("Kean");}printf("\n");if (v2 == 6) {s = "Go";}else {s = "Hello";}if(v3 != v4) {printf("%s Kean!\n",s);} else {printf("%s Computer Science!\n",s);}return 0;} Assume the following codes are added between line 36 (}) and line 38 (return 0;) v0>0 ? ++v1, ++v2 : --v3; Please give the values of v0, v1, v2, v3, and v4 after this line and explain the reason. You can test the program to verify your answer if you like.arrow_forward
- #include <stdio.h>int main(void) {int a;char *s;int v0 = 4, v1 = 5, v2 = 6, v3 = 1, v4 = 2;printf("Exercise 1:\n====================\n");switch(v0) {case 0: printf("Hello October\n"); break;case 1: printf("Go Kean!\n"); break;case 2: printf("Academic Building Center \n"); break;case 3: printf("UNION \n"); break;case 4: printf("Go ");case 5: printf("Kean! \n");default: printf("Have a great semester! \n"); break;}for(a=5; a<v1; a++) {printf("Kean");}printf("\n");if (v2 == 6) {s = "Go";}else {s = "Hello";}if(v3 != v4) {printf("%s Kean!\n",s);} else {printf("%s Computer Science!\n",s);}return 0;} Output: Exercise 1:====================Go Kean! Have a great semester! Go Kean! Please only modify the initial value of v0, v1, v2, v3 and v4 to get the following output. Youneed to show your program output (in the screenshot) and submit the code that youmodified.Exercise 1:====================Hello OctoberKeanHello Computer Science!arrow_forward(OnlineGDB) 1. Please read and run the following code and answer the questions.#include <stdio.h>int main(void) {int a;char *s;int v0 = 4, v1 = 5, v2 = 6, v3 = 1, v4 = 2;printf("Exercise 1:\n====================\n");switch(v0) {case 0: printf("Hello October\n"); break;case 1: printf("Go Kean!\n"); break;case 2: printf("Academic Building Center \n"); break;case 3: printf("UNION \n"); break;case 4: printf("Go ");case 5: printf("Kean! \n");default: printf("Have a great semester! \n"); break;}for(a=5; a<v1; a++) {printf("Kean");}printf("\n");if (v2 == 6) {s = "Go";}else {s = "Hello";}if(v3 != v4) {printf("%s Kean!\n",s);} else {printf("%s Computer Science!\n",s);}return 0;} What is the output of the program? Please explain why.arrow_forward1.[30 pts] Answer the following questions: a. [10 pts] Write a Boolean equation in sum-of-products canonical form for the truth table shown below: A B C Y 0 0 0 1 0 0 1 0 0 1 0 0 0 1 1 0 1 0 0 1 1 0 1 0 1 1 0 1 1 1 1 0 a. [10 pts] Minimize the Boolean equation you obtained in (a). b. [10 pts] Implement, using Logisim, the simplified logic circuit. Include an image of the circuitarrow_forward
- In the past, encryption and decryption were mostly done by substitution and permutation of letters in a text message. study those classic cryptographic schemes Then, develop an automatic cipher using Javascript The cipher should be able to perform the following tasks: generate keys encrypt a given plaintext message with a key selected from the list of keys generated decrypt a given ciphertext message with a known cipher keyarrow_forwardList reasons why teachers should and shouldn’t be replaced by computers? State your response in a descriptive context. Provide five references from the with internet with your answers.arrow_forwardThe attached picture shows the RTCAPI memory mapped register which has the address 0x180. 1) Program the MCU's registers so that a) SIRC is the clock source b) the clock is divided by 16K c) the clock is enabled d) load is enabledarrow_forward
- What is the ALU result if the 4-bit ALU Control signal is 0100? What happens if the ALU Control signal is 0101?arrow_forwardIn the past, encryption and decryption were mostly done by substitution and permutation of letters in a text message. study those classic cryptographic schemes Then, develop an automatic cipher using a programming language of your choice. The cipher should be able to perform the following tasks: generate keys encrypt a given plaintext message with a key selected from the list of keys generated decrypt a given ciphertext message with a known cipher keyarrow_forwardCase Study Instructions: Offshore Wind Energy in the North Sea For this case study, students will analyze the institutional challenges and social rules surrounding offshore wind energy development in the Dutch North Sea, as explored in the case study from the textbook (pages 44-46). Additional resources in this week’s learning module will provide further perspectives on the impact of wind energy on different stakeholders. Students should refer to the syllabus for specific guidelines regarding length, format, and content requirements. Reflection Questions to Consider: What are the key institutional challenges in implementing offshore wind energy in the North Sea? How do formal and informal social rules shape the use of this shared space? What conflicts arise between different stakeholders (e.g., fishermen, naval transport, military, and wind energy developers)? How can policymakers balance economic, environmental, and social considerations when allocating space for wind energy?…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education

Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education

Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON

Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON

C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON

Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning

Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
6 Stages of UI Design; Author: DesignerUp;https://www.youtube.com/watch?v=_6Tl2_eM0DE;License: Standard Youtube License