EBK JAVA PROGRAMMING
EBK JAVA PROGRAMMING
8th Edition
ISBN: 9781305480537
Author: FARRELL
Publisher: CENGAGE LEARNING - CONSIGNMENT
Question
Book Icon
Chapter 4, Problem 11PE

a.

Program Plan Intro

CertOfDeposit

Program Plan:

CertOfDeposit.java:

  • Define the class “CertOfDeposit”.
    • Declare and initialize the required variable.
    • Definition of constructor.
      • Assign the variables.
      • Define the mutator method for certificate number.
        • Assign “n” to “certNum”.
      • Define the mutator method for owner name.
        • Set the name.
      • Define the mutator method for balance.
        • Set the balance.
      • Define the mutator method for issue date..
        • Set the balance.
      • Define the accessor method for certificate number.
        • Return the certificate number.
      • Define the accessor method for name.
        • Return the name
      • Define the accessor method for balance.
        • Return the balance.
      • Define the accessor method for issue date.
        • Return the issue date.
      • Define the accessor method for maturity date.
        • Return the maturity date.

b.

Program Plan Intro

TestCertOfDeposit.java

Program Plan:

TestCertOfDeposit.java:

  • Define the class “TestCertOfDeposit”.
    • Definition of method main.
    • Declare the required variable.
      • Get the certificate name from the user.
      • Get the owner name from the user.
      • Get the balance from the user.
      • Get the issue date from the user.
      • Call the method “display()”.
  • Definition of method “display()”.
    • Print the details of the certificate.

Blurred answer
Students have asked these similar questions
Given the following Extended-BNF grammar of the basic mathematical expressions:  Show the derivation steps for the expression: ( 2 + 3 ) * 6 – 20 / ( 3 + 1 ) Draw the parsing tree of this expression. SEE IMAGE
Whentheuserenters!!,themostrecentcommandinthehistoryisexecuted.In the example above, if the user entered the command: Osh> !! The ‘ls -l’ command should be executed and echoed on user’s screen. The command should also be placed in the history buffer as the next command. Whentheuserentersasingle!followedbyanintegerN,theNthcommandin the history is executed. In the example above, if the user entered the command: Osh> ! 3 The ‘ps’ command should be executed and echoed on the user’s screen. The command should also be placed in the history buffer as the next command. Error handling: The program should also manage basic error handling. For example, if there are no commands in the history, entering !! should result in a message “No commands in history.” Also, if there is no command corresponding to the number entered with the single !, the program should output "No such command in history."
Activity No. Activity Time (weeks) Immediate Predecessors 1 Requirements collection 3 2 Requirements structuring 4 1 3 Process analysis 3 2 4 Data analysis 3 2 5 Logical design 50 3,4 6 Physical design 5 5 7 Implementation 6 6 c. Using the information from part b, prepare a network diagram. Identify the critical path.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Microsoft Visual C#
Computer Science
ISBN:9781337102100
Author:Joyce, Farrell.
Publisher:Cengage Learning,
Text book image
EBK JAVA PROGRAMMING
Computer Science
ISBN:9781337671385
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT
Text book image
Programming Logic & Design Comprehensive
Computer Science
ISBN:9781337669405
Author:FARRELL
Publisher:Cengage
Text book image
Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:9781337102124
Author:Diane Zak
Publisher:Cengage Learning
Text book image
EBK JAVA PROGRAMMING
Computer Science
ISBN:9781305480537
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT
Text book image
C++ Programming: From Problem Analysis to Program...
Computer Science
ISBN:9781337102087
Author:D. S. Malik
Publisher:Cengage Learning