EBK JAVA PROGRAMMING
EBK JAVA PROGRAMMING
9th Edition
ISBN: 9781337671385
Author: FARRELL
Publisher: CENGAGE LEARNING - CONSIGNMENT
bartleby

Videos

Expert Solution & Answer
Book Icon
Chapter 7, Problem 11PE

Explanation of Solution

Program:

File name: “Team.java

//Define a class named Team

public class Team

{

    //Declare the private variables

    private String name;

    private String sport;

    private String mascot;

    //Initialize a final static variable

    public final static String MOTTO = "Sportsmanship!";

    //Define a Team method

    public Team(String name, String sport, String mascot)

    {

        //Refers to the instance variables

        this.name = name;

        this.sport = sport;

        this.mascot = mascot;

    }

    //Define a get method to display the name

    public String getName()

    {

        //Return the value

        return name;

    }

    //Define a get method to display the sport

    public String getSport()

    {

        //Return the value

        return sport;

    }

    //Define a get method to display the mascot

    public String getMascot()

    {

        //Return the value

        return mascot;

    }

}

File name: “Game.java

//Define a class named Game

public class Game

{

    //Declare the private variables

    private Team team1;

    private Team team2;

    private String time;

    //Define a Game method

    public Game(Team t1, Team t2, String time)

    {

        team1 = t1;

        team2 = t2;

/*If the two teams in a game have the same value for the sport*/

        if(t1.getSport().equals(team2.getSport()))

            //Refers to the instance variables

            this.time = time;

        /*Else if the two teams in a game do not

        have the same value for the sport*/

        else

            //Refers to the instance variables

            this...

Blurred answer
Students have asked these similar questions
I would like to know the main features about the following three concepts: 1. Default forwarded 2. WINS Server 3. IP Security (IPSec).
map the following ER diagram into a relational database schema diagram. you should take into account all the constraints in the ER diagram. Underline the primary key of each relation, and show each foreign key as a directed arrow from the referencing attributes (s) to the referenced relation.   NOTE: Need relational database schema diagram
What is business intelligence? Share the Business intelligence (BI) tools you have used and explain what types of decisions you made.
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
EBK JAVA PROGRAMMING
Computer Science
ISBN:9781337671385
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT
Text book image
Programming Logic & Design Comprehensive
Computer Science
ISBN:9781337669405
Author:FARRELL
Publisher:Cengage
Text book image
EBK JAVA PROGRAMMING
Computer Science
ISBN:9781305480537
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT
Text book image
Microsoft Visual C#
Computer Science
ISBN:9781337102100
Author:Joyce, Farrell.
Publisher:Cengage Learning,
Text book image
Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:9781337102124
Author:Diane Zak
Publisher:Cengage Learning
Text book image
C++ Programming: From Problem Analysis to Program...
Computer Science
ISBN:9781337102087
Author:D. S. Malik
Publisher:Cengage Learning
Memory Management Tutorial in Java | Java Stack vs Heap | Java Training | Edureka; Author: edureka!;https://www.youtube.com/watch?v=fM8yj93X80s;License: Standard YouTube License, CC-BY