(a) The Financial Security Class has 3 direct Sub-Classes. (b) The "Stock" Object is a specialization of an "Asset". (c) The Financial Security Class is obligated to implement the "getPrice()" and "getLastTrade Time() methods. (d) A "Debt" is a specialization of a "Bond".
Q: Can you explain the distinction between local and remote user authentication? Which one was the most…
A: Introduction Remote user authentication It is a process through which a distant server confirms a…
Q: Help us understand the differences between Trojan Horses, Viruses, and Worms. Which pathogens…
A: The distinction between a computer virus, worm, and trojan horse is as follows: an internet virus A…
Q: Can you explain what would happen if an unapproved instruction is sent to VA page 30? In the…
A: If a directive is written to VA page 30: The Translation Lookaside Buffer (TLB) table is searched…
Q: When referring to server space, how many rack spaces do we need? I was wondering whether standard…
A: When you first start thinking about how to construct a server, the variety of server rack sizes…
Q: Applications software are commonly classified into two broad categories, Explain with examples
A: Given two questions are not interlinked. As per our company guidelines, only one question will be…
Q: Write a Python program to create a joinplot and add regression and kernel density fits using "reg"…
A: jointplot The joint plot is the clearest approach to comprehend both the individual distribution of…
Q: Examine the following entity relationship diagram, and select all statements that correctly describe…
A: Primary Key is used to uniquely identify a column Foreign Key derives its data from primary key of…
Q: Write a C program to produce the Age Range by Generations by giving BornYear as the input. The…
A: Algorithms: START display header function displays header details. get ID function inputs id…
Q: Question 6 sm .Let A = {a, b} and B = {c, d} and C = {0}. Compute the following sets: a. A X (B X…
A: cartesian product:- It is collection of ordered pair formed by taking all elements of first set…
Q: ADD reg, immed; 2 clock cycles LOOP LabelName ; 8 clock cycles Assume that the following code…
A: The answer is
Q: t may page table shadowin
A: It is possible to apply specific strategies in order to cut down on the overhead brought on by page…
Q: Assembler language is great for creating niche applications, but why should it be avoided for…
A: The assembly language is preferred: Mnemonic codes in assembly language are analogous to English…
Q: Shawn is approached by a medical staff team with a request to research and introduce a type of…
A: INTRODUCTION: IoT, or the Internet of Things, refers to the entire network of interconnected devices…
Q: 7) Give context-free grammars that generate the following languages. i) { w € {0, 1}* | the length…
A: We need to write CFGs for the given scenario.
Q: Why is the refresh rate of LCD screens so much slower than that of CRT screens
A: Introduction: Most LCD displays have a standard refresh rate that is considerably over the "flicker"…
Q: he difference between a hub and a switch is that: switches forward fewer frames overall
A: A network can be denoted as a number of devices sharing assets situated on or given by network hubs.…
Q: In comparison to Intel's core i3 architecture, what are the key features of ARM's design?
A: Introduction: ARM (Advanced RISC Machine) is a type of reduced instruction set computer (RISC)…
Q: Program - Python Implement a function called zeros_and_ones() that takes a list s as argument and…
A: Algorithm for the code: 1. Start 2. Initialize a dictionary 'd' with two keys, 0 and 1, and…
Q: Iterating through a sequence of items in a list is the job of the for construct. Therefore, it runs…
A: By using the range function on the list in question and handing it its length, we may iterate over…
Q: Other than process management, what are the other two most important functions of an OS?
A: Operating System: An operating system is a software that controls all other applications and…
Q: Explain what wireless metropolitan area networks are, why they're useful, and what kind of security…
A: Wireless Metropolitan Area Network (WMAN): The sole distinction between a Metropolitan Area Network…
Q: We discussed how each JVM thread can only have a single method in use at any one time. Why do you…
A: We have to explain that how each JVM thread can only have a single method in use at any one time.
Q: Explain in detail how a web client's request for access to protected resources on a web server…
A: Any enterprise with either of sensitive resources that can be obtained by multiple users or through…
Q: Determine which of the three IPv6 migration strategies is right for you.
A: IPv6: An organisation layer standard called Internet Protocol Version 6 facilitates information…
Q: To what phrase do we collectively refer when we add up the rotational delay and the seek time?
A: In this question we need to explain the phrase which is referred by adding up the seek time and…
Q: Pandas dataframe.
A: Following steps for required task : 1. Create a dictionary from given three lists my_dict={…
Q: One of the motivating drivers for establishment of a CSIRT is due to new laws and regulations on how…
A: CSIRT stands for Computer Security Incident Response Team
Q: SIM file construction consists of a Master File (MF), Dedicated Files (DFs), and these: O Elementary…
A: According to the information given:- We have to choose the correct option to satisfy the statement.
Q: Data is stored on magnetic disks by altering the polarity of a magnetic medium. How can optical…
A: Phase Change is the method used to store bytes on optical discs. An optical disc known as a phase…
Q: Kevin plans to use a Boolean operator to look for data on two different topics. In order to get the…
A: in order to look for the necessary information On two subjects for which the AND boolean operator is…
Q: To what end is encryption still considered the primary means of preventing information loss?
A: The process of encryption refers to the loop that The encoding of information is done with the…
Q: Let A = {a, b} and B = {c, d} and C = {0}. Compute the following sets: a. A X (B X C) b. A X C
A: Given: A = {a, b} and B = {c, d} and C = {0}. From the above data, we have to compute the…
Q: We have a query to retrieve the students with age 22 and studying in a CS 608 class. We can get all…
A: Here query 1 is performing the joins on two entire tables. And query two is first filtering the data…
Q: Create an algorithm for parallel regularity testing. Input: a set S of permutation group G…
A: given data: Input: a set S of permutation group G generators on;The output indicates whether G is…
Q: fast-paced company has received a proposal for a new system with far more storage space than was…
A: Answer:
Q: 24) Match the numbers underneath to one of the letters: (A)Design Example, (B)SCRUM, C)…
A: Note:- You have posted multiple multi-part problems. As per guidelines we are required to answer all…
Q: Halloween Matching 1. Add the array to make these pictures. 2. Add a reset button. Change its font…
A: Algortihmg --> Take Input from the user. Now use the below example for (int y = 0; y <…
Q: 17) Suppose you have three lists that contain the height in meter, the corresponding weight in…
A: Note: As per guidelines I am compelled to solve only one question and that is the first question.…
Q: One of the Big Ten Deliverables is often overlooked, misunderstood and even more often just plain…
A: The solution to the given question is: Answer C : Simple Operating Procedures (SOP) Simple Operating…
Q: Write a program that checks the initial value in memory location x4000 to see if it is a valid ASCII…
A: Declare a pointer to an unsigned char and set it to point to memory location x4000. Declare an…
Q: Which server scanning technique might possibly identify Telnet?
A: A sort of scanning called port scanning may reveal if Telnet is active on a server. The technique of…
Q: Question 14 papa .JaveScript-- In this problem, you'll iterate over an input String and return…
A: Here is the program regarding the vowel count.
Q: A PC is a single-user microcomputer that can only be used for general tasks by one person at a time.…
A: Introduction: A PC is the name given to this sort of computer. It is a general-purpose computer that…
Q: When the processor issues a request that cannot be satisfied by the cache and the block is being…
A: Both the cache and the write buffer operate in a completely separate manner from one another. The…
Q: In light of the availability of on-chip L3 caches, please explain the pros and downsides of using…
A: Single threads execute one instruction sequence. The procedures are one-by-one. Multi-threaded…
Q: Data in pipes is often formatted using filtering tools like sed and awk. How truthful or incorrect…
A: commands for seed and ask: To filter commands used with pipes to manipulate text, use the seed and…
Q: 4 bit 2's Complement Multiplier INPUT A: 4 bit 2's Complement number INPUT B: 4 bit 2's Complement…
A: A multiplexer is a combinational circuit that has 2n input lines and a single output line. Simply,…
Q: What is the output of the following code: .data A: .word 95 27 34 B: .word 391042 C: .word 642 315…
A: Here is the explanation regarding the given code.
Q: Sort students) Rewrite Programming Exercise 7.17 using streams. Define a class named Student with…
A:
Q: You are given the following code snippet: public class Test { public static void main(String[] args)…
A: We need to find the correct option regarding the given java code.
Kindly discribe
Step by step
Solved in 3 steps
- 2. Consider the BlackJackCard and PlayingCard classes. a)Do these two classes have an is-a or has-a relationship? b)Which class is the more general class? c)Which class is the more specialized class? d)Would the four methods from the general class be appropriate in the specialized class? Explain your answer. e)Give one example of a method that might appear in the specialized class but not the more general class.14. Which of the following statements are true? (select all that apply): (a) The Financial Security Class has 3 direct Sub-Classes. (b) The "Stock" Object is a specialization of an "Asset". (c) The Financial Security Class is obligated to implement the "getPrice()" and "getLastTradeTime() methods. (d) A "Debt" is a specialization of a "Bond". Debt Bond Stock Financial Security Asset ETF «interface >> Tradable + getPrice(): double + geti ast Trade Time() : Date(1) Extend the ItemToPurchase class to contain a new attribute. item_description (string) - Set to "none" in default constructor Implement the following method for the ItemToPurchase class. print_item_description() - Prints item_description attribute for an ItemToPurchase object. Has an ItemToPurchase parameter. Ex. of print_item_description() output: Bottled Water: Deer Park, 12 oz. (2) Build the ShoppingCart class with the following data attributes and related methods. Note: Some can be method stubs (empty methods) initially, to be completed in later steps. Parameterized constructor which takes the customer name and date as parameters Attributes customer_name (string) - Initialized in default constructor to "none" current_date (string) - Initialized in default constructor to "January 1, 2016" cart_items (list) Methods add_item() Adds an item to cart_items list. Has parameter ItemToPurchase. Does not return anything. remove_item() Removes item from cart_items list.…
- Challenge exercise The following object creation will result in the constructor of the Date class being called. Can you write the constructor’s header? new Date("March", 23, 1861) Try to give meaningful names to the parametersLanguage is Java Write a Clothing class with the following attributes: color (e.g., "blue", "green", "orange") displayName (e.g., "Doctor Who hoodie", "slacks") price (e.g., 19.99, 7) Include only one constructor. It should have parameters for each of the attributes and set their values. Additionally, include getters and setters for each of the attributes. Add a driver, name it Purchases, and create 2 Clothing objects. Finally, print out some information about both objects (i.e., print the information from some or all of the getters). For example, if you created a Clothing object whose color was blue, whose display name was work trousers, for a price of 27.99, you could use the getters to print something like this:These work trousers are blue and cost $27.99.Don't hardcode the print statement for full credit, you must use the getters(Java) Question 5 Explain the answer step-by-step and include verbal explanation. Thank you! Write an interface as follows: The interface is named ServiceReminder It has one method named timeForService that has no parameters and returns a boolean variable. Now, update the below class so that is inherits from ServiceReminder Note that the next service date should be 90 days from the last service public abstract class Car { private double gasGauge; private double currMileage; private String color; private String make; private String model; private int daysLastService; public Car(String color, String make, String model, int daysLastService) { this.color = color; this.make = make; this.model = model; gasGauge = 0.0; currMileage = 0.0; this.daysLastService = daysLastService; } @Override public String toString() { return "Make: " + make + "\nModel: " + model + "\nColor: " + color…
- Implement the Seller class as a derived class of Person class. Create the seller.h and seller.cppfiles for this class. The Seller class contains additional data members that hold a seller’s:o average star rating received from the buyers, ando total number of items sold.These data should be accessible by its derived classes. (should these data be private, public, orprotected?) The following methods are included in the seller class:• A default constructor and a copy constructor• A constructor that receives all of the data for a seller.(for the constructors, make sure to call the base class constructor as appropriate)• Appropriate get and set functions for the new data in this class• print() – overrides the base class print() to print the base class data and print all additionalseller data with appropriate messages. Make sure to call the base class print to print thebase class data.• read() – overrides the base class read() to read the base class data and reads all additionalseller data…Design and implement a Restaurant class with at least three meaningful attributes and two methods. Implement a test program which creates at least two instances of the restaurant class and calls all the methods. Some possible attributes are name, numberOfTables, cuisine, numberOfReservations, capacity, etc. Some possible methods are make Reservation, checkAvailability, etc. Note the following: -All properties must be declared as private and you need accessor and mutator methods for each property. - You need to define at least one constructor. Documentation o Include header comments that include description of the program. o Include body comments o Consistent indentations o Consistent white line spaces Properties are declared as private o Accessor and mutator methods are created o At least one default constructor o At least two instances are createdPart (1) Define a class as follow: a. create a class called Student that has four instance variables - a (String) name, a (long) StudentID, a (String) College, and a (double) GPA. b. A constructor that takes student name, StudentID, College and GPA. The constructor sets the class variables to these values . c. Make the instance variable GPA private and provide a mutator method (set) and an accessor method (get) to access this variable. In set method if the GPA negative or grater than 4.00 print an invalid message and do not change the instance variable GPA. d. A method Student_Status () that check the GPA if it is less than 2, display the warning message, otherwise display Normal student. e. A method Print() that displays the name, StudentID, College and GPA of the student as shown below: Sample output: Enter the Student name: Ali Ahmed Enter the Student ID: 20180011 Enter the College: Information Technology Enter the GPA: 3.2 Normal student Name: Ali Ahmed Student ID: 20180011…
- Part (1) Define a class as follow: a. create a class called Student that has four instance variables - a (String) name, a (long) StudentID, a (String) College, and a (double) GPA. b. A constructor that takes student name, StudentID, College and GPA. The constructor sets the class variables to these values . c. Make the instance variable GPA private and provide a mutator method (set) and an accessor method (get) to access this variable. In set method if the GPA negative or grater than 4.00 print an invalid message and do not change the instance variable GPA. d. A method Student_Status () that check the GPA if it is less than 2, display the warning message, otherwise display Normal student. e. A method Print() that displays the name, StudentiD, College and GPA of the student as shown below: Sample output: Enter the Student name: ALİ Ahmed Enter the Student ID: 20180011 Enter the College: Information Technology Enter the GPA: 3.2 Normal student Name: Ali Ahmed Student ID: 2018ee11…2019 AP® COMPUTER SCIENCE A FREE-RESPONSE QUESTIONS 2. This question involves the implementation of a fitness tracking system that is represented by the StepTracker class. A StepTracker object is created with a parameter that defines the minimum number of steps that must be taken for a day to be considered active. The StepTracker class provides a constructor and the following methods. addDailySteps, which accumulates information about steps, in readings taken once per day activeDays, which returns the number of active days averageSteps, which returns the average number of steps per day, calculated by dividing the total number of steps taken by the number of days tracked The following table contains a sample code execution sequence and the corresponding results. Statements and Expressions Value Returned Comment (blank if no value) StepTracker tr StepTracker(10000); Days with at least 10,000 steps are considered active. Assume that the parameter is positive. new tr.activeDays () ; No…For each statement, indicate if it is True or False by circling T or F. If you need to cross out an answer, be sure that your final answer is clear and unambigous-otherwise it will receive no credit. 1- An object of a derived class has access to the public methods of its base class T F 2- An object of a base class has access to the private helper methods of its derived class T F 3- Destructors are not inherited by derived classes T F T F T F u- An object of a derived class inherits the copy constructor of its base class 5- Operators are passed down inheritance hierarchies 6- Destructors in derived classes are called after their base class calls its destructor 7. Constructors of base classes are accessible by derived classes T T F F