Task – 9 Implement the design of the Pikachu and Charmander classes that are derived from the Pokemon class so that the following output is produced: Driver Code Output class Pokemon: Pokemon: Pikachu Туре: Electric Weakness: Ground init_(self, p): self.pokemon = p self.pokemon_type self.pokemon_weakness def kind(self): return self.pokemon_type def weakness(self): return self. pokemon_weakness def what_am_i(self): print("I am a Pokemon.") def I am a Pokemon. I am Pikachu. %D "Needs to be set" %3D = "Needs to be set" === ===== ===== Pokemon: Charmander Туре: Fire Weakness: Water, Ground and Rock I am a Pokemon. I am Charmander. Pikachu() pk1 print ("Pokemon:", pk1.pokemon) print("Type:", pk1.kind()) print("Weakness:", pk1.weakness ()) pk1.what_am_i() print ("=: Charmander() print ("Pokemon:", c1.pokemon) print ("Type:", c1.kind()) print("Weakness:", c1.weakness()) c1.what_am_i(() %D =") с1
Q: The stop value isn't included in the range() method in Python. Create a generator function that is…
A: Tip When you use range() with a single statement, you'll obtain a series of numbers that starts at 0…
Q: 1. Create a program that computes the derivative of a given (either an algorithm for computing the…
A: Answer in step 2
Q: Follow the indicated operation in order to know the number system used for the answer. NO need to…
A: The answer is given in following figure.
Q: What is a database management system (DBMS)? Make a list of the positives and downsides of the…
A: DBMS is also known as database management system.
Q: What is the difference between a dedicated server and a non-dedicated server?
A: TipDedicated and non-dedicated servers are servers that may operate as network providers for…
Q: Explain why database architecture is crucial in the educational context and provide an example.
A: Introduction Database architecture focuses around plan, support, and organization of the product…
Q: What does the term "alternate key" mean?
A: TIP : The Relational database design is incomplete without keys. They're used to define and…
Q: What techniques may be used to make a computer program operate as rapidly and efficiently as…
A: Computer program: A computer programme is a set of instructions written in a programming language…
Q: What do you call the subset of the sample space? a. Event b. Random Variables c. Sample Space
A: The sample space of an experiment is the collection or set of all possible outcomes and it is…
Q: What is the difference between a candidate key and an alternative key?
A: Justification: A collection of characteristics that uniquely identify tuples in a database is known…
Q: Show Static structures and external structures can be initialized. The member initializers must be…
A: Show Static structures and external structures can be initialized. The member initializers must be…
Q: What do you call a function that assigns a unique real number to each element in the sample space?…
A: The sample space associated with a random experiment is the set of all possible outcomes.
Q: of windows from different window systems.conside
A: Below the Window class must span the functionality of windows from different window systems.consider…
Q: What's the difference between writing a comment in an m-file and a mdl file?
A: An MDL file: A simulation model developed using Simulink, a simulation and model-based design…
Q: CHALLENGE 5.7.2: Copy and modify array elements. АCTIVITY Write a loop that sets newScores to…
A: Please refer below code and output : Language used is JAVA: import java.util.*;class Main {…
Q: please make a pseudocode out of this source code: #include using namespace std; /* Solve a system…
A: Algorithms when written in general english language is known as Pseudo code.
Q: 8 10 11 4 7 2 3 Using the given graph, answer the following questions: a. Write the adjacency list…
A: For the given graph we are going to find out its adjacency list, then we will derive its DFS and BFS…
Q: What are the four benefits of SQL?
A: Answer the above question are as follow:
Q: When a symbolic constant would suffice, why use a formal argument to provide data into a function?…
A: Definition A variable stated in a function's declaration is referred to as a formal parameter, By…
Q: What factors should you consider while choosing a database management system?
A: Data management is the process of organizing and maintaining organization data. It entails…
Q: What is the default order by command value?
A: NOTE :- Below i explain the answer in my own words by which you understand it well. ASC is the…
Q: What is the best way to discuss the features of a monitor?
A: Computerscreen fills in as a result gadget that gadget help to give yield as graphically and text…
Q: taHain what virtualifotan il and the charockastice of the variou 1yru via tuali Salian (largu a…
A: Please upvote, I am providing you the correct answer below.
Q: Q2: If m-the odd numbers between (10, 25), n- the even numbers between (10, 25) find men (1) m-n (2)…
A: Question from discrete mathematics, computer science topic. Here, we will write the all odd numbers…
Q: Q1/Explain to me in detail what is the advantages and disadvantages of a machine learning in…
A: Machine learning (ML) Machine learning is the study of computer algorithm that improve the…
Q: What are the principles of programming language and how do you describe implementing subprograms in…
A: programming language: Orthogonality or simplicity, available control structures, data types and data…
Q: What is the purpose of the operating system on a computer? Identify several activities that this…
A: Introduction: Malware is a kind of harmful software that cyber criminals use to corrupt computer…
Q: In general, computer experts advise increasing the computer's Random Access Memory (RAM) when the…
A: The question is can adding RAM slow down the computer?
Q: Define the heuristic known as the nearest neighbor (NN).
A: Introduction Define the heuristic known as the nearest neighbor (NN).
Q: Discuss applicable technology succinctly and succinctly. Determine which piece of relevant…
A: To begin, one must understand what constitutes proper technology: To begin, it is necessary to…
Q: Create a flowchart and a pseudocode for resending an e-mail message that failed to be delivered.
A: Flowchart is a step by step process in which all the program is represented diagram with sequence of…
Q: What are the most common loT device deployment integration challenges? How would you describe the…
A: Interoperability: Interoperability refers to the fundamental ability of various computerised goods…
Q: In your own words, explain In what way INTERPOL works? Write in 200 words.
A: INTRODUCTION: Interpol is the abbreviated name for the International Criminal Police Organization,…
Q: 'Student1' has four columns and ten rows, while'student2' has five columns and seven rows. What is…
A: Tip: A table is a collection of linked data that has been organized in a table form and recorded in…
Q: The processor connects to numerous devices. Any device can generate an interrupt. How processor may…
A: Start: An interrupt is a rare occurrence in which a computer system suspends a process/program and…
Q: Recognize the difference between a firewall at the network and an application level
A: The following are the differences between a network-level firewall and an application-level…
Q: What is the difference between a main key and a candidate key?
A: Foundation: Candidate keys are selected to uniquely identify tuples in a database, and the primary…
Q: The use of indices speeds up query processing, although it is usually a terrible idea to establish…
A: In a database management system, indexing is a fast way to retrieve or search for information in the…
Q: Can you tell the difference between an oblique and an orthogonal projection? in terms of computer…
A: Start: The direction of projection in oblique projection is not the same as the direction of…
Q: Construct a 3-bits binary to gray code converter using PROM (without decoder). Show all the…
A: -Binary code is a very simple representation of data using two values such as 0’s and 1’s, and it is…
Q: An attacker's efforts to assure the success of a sniffer attack must include the following steps.…
A: The main question is, how may an attacker take use of the sniffer system if they have network…
Q: What exactly is the distinction between carry and overflow?
A: Overflow is used to indicate the sign bit change while adding or subtracting whereas carry is used…
Q: What are some of the competitive advantages that Vivobarefoot has achieved as a result of the…
A: Introduction: Vivobarefoot is a shoe company that has risen to prominence in a very short period of…
Q: The post-order and in-order traversals of a binary tree are given. Draw the corresponding tree.…
A:
Q: Create a flowchart for the SWITCH sta
A: The switch case statement permits us to execute one code block amid many alternatives.Switch…
Q: What's the difference between char and varchar?
A: TIP : SQL (Structured Query Language) is a database query language. According to ANSI, it is the…
Q: What are the six main reasons why computer mishaps are so common today?
A: Introduction: Six explanations Complexity has increased.Authentication errorsTechnological…
Q: A set of data items is normally distributed with a mean of 210 and a standard deviation of…
A: Your answer is given below in detail. Introduction :- It's z-score is the distance a data point is…
Q: Is a wired network superior to a wireless network?
A: Introduction: The most significant factor in data transit between nodes is speed, which aids in…
Q: t and the charackas6ich x lain what virtualifotioni of he variouj tyru virtuali Salibn (largu a…
A:
please solve in python languange and use proper comments for better understanding . Thank you.
Step by step
Solved in 4 steps with 1 images
- Java Programming: ConWay World Conway’s game of life is a simple simulation of life forms in a two dimensional grid. The ConwayCell implements the standard behavior of a call in Conway’s Game of Life. You only need to implement and test two new classes. You will create two different cells, derived from AbstractCell. 1. Alternating Cell The first class that you should create is a class named AlternatingCell. This is a cell that should alternate between being alive and dead with each generation. Add one or more of your AlternatingCells to your ConwayWorld. You can see how to add a cell in line 15 - 20 of Main.java. Give your AlternatingCell a unique display character when it is alive so that you can see it in your conway world. 2. Your own cell For the second cell you should feel free to implement any behavior that you want. If you are having trouble thinking of ideas then post up a question. You can add your custom cell in just a few places in the world, or you might choose to replace…Task 1:The first task is to make the maze. A class is created called Maze, in which a 2D array for the maze is declared. Your job is to implement the constructor according to the given javaDoc. When you completed this task, write a set of Junit test case to test your code.As you probably noticed, the maze is defined as a private variable. The second job for you is to write an accessor(getter) method that returns the maze. Other information about what is expected for this method is given in the starter code. public class PE1 { MazedogMaze; /** * This method sets up the maze using the given input argument * @param maze is a maze that is used to construct the dogMaze */ publicvoidsetup(String[][]maze){ /* insert your code here to create the dogMaze * using the input argument. */ }In Assignment 4, you created a Card class that represents a standard playing card. Use this to design and implement a class called DeckOfCards that stores 52 objects of the Card class using an array. Include methods to shuffle the deck, deal a card, return the number of cards left in the deck, and a toString to show the contents of the deck. The shuffle methods should assume a full deck. Document your design with a UML Class diagram. Create a separate driver class that first outputs the populated deck to prove it is complete, shuffles the deck, and then deals each card from a shuffled deck, displaying each card as it is dealt along with the number of cards left in the deck. Hint: The constructor for DeckOfCards should have nested for loops for the face values (1 to 13) within the suit values (1 to 4) calling the two parameter constructor. The shuffle method does not have to simulate how a deck is physically shuffled; you can achieve the same effect by repeatedly swapping pairs of…
- In Assignment 4, you created a Card class that represents a standard playing card. Use this to design and implement a class called DeckOfCards that stores 52 objects of the Card class using an array. Include methods to shuffle the deck, deal a card, return the number of cards left in the deck, and a toString to show the contents of the deck. The shuffle methods should assume a full deck. Document your design with a UML Class diagram. Create a separate driver class that first outputs the populated deck to prove it is complete, shuffles the deck, and then deals each card from a shuffled deck, displaying each card as it is dealt along with the number of cards left in the deck. Hint: The constructor for DeckOfCards should have nested for loops for the face values (1 to 13) within the suit values (1 to 4) calling the two parameter constructor. The shuffle method does not have to simulate how a deck is physically shuffled; you can achieve the same effect by repeatedly swapping pairs of…java You are part of a team writing classes for the different game objects in a video game. In this assessment you are given a superclass (Human.java), two subclasses (Warrior.java and Wizard.java) and a test application (TestGameObjects.java). Both the Warrior and the Wizard classes need to be able to calculate stealth. This needs to be done in the method getStealth. This method has an integer parameter (dexterity) and returns an integer. Refer to the test application to see how the method is used. The Warrior and Wizard classes calculate stealth differently: The Warrior's stealth is equal to dexterity times strength (dexterity * strength) while the Wizard's stealth is equal to three times dexterity times intelligence (3 * dexterity * intelligence). You need to write an interface with the method getStealth, and then modify the superclass and subclasses to implement this interface. You also need to test the validity of the object ID. The object ID must consist of the character 'W'…Note : ALL Code Must be in OOP (JAVA) And perform all in ecplis (console base) Scenario:You are hired by a game development company. Your task is to create an RPG hack & slashconsole game. The game will have a movement system that will be based on the x, y, zcoordinate system. You will need to start with creating 3 classes.1. A class that represents a player2. A class that represents an enemy3. An abstract class that contains the movement logic.Step 1:Start by creating the superclass which defines the movement system for both enemy andplayer. The movement system is based on the Coordinate system. Imagine an x, y, z plane,the y coordinate is used to move forward and backward in the virtual plane, x to go left andright, z to go up and down.For example, A player with coordinates x, y, z with values -5, 10, 0 represents a player -5units to the left, 10 units forward, and 0 z units mean on the ground. (0, 0, 0) are the baseunits which means the player or enemy is at the start of the…
- Task 2: General AbstractsFor this task you will be asked to create the Java classes described in the UMLdiagram in Task 1.Instructions1. The class Person has the following implementations in addition to thosespecified above:• the dateOfBirth attribute is of type java.util.Date• public getter methods for the attributes• a public constructor Person with the following method signature:public Person(String idNumber, String name, Date dateOfBirth)• declare an abstract compareTo method in Person with the followingsignature:public int compareTo(Person p);2. The class called VaccineRecord has the following extra details:• the enum called VaccineType has the following possible values:JJ,AZ,MD,PF• the public constructor for the VaccineRecord has the following signa-ture:public VaccineRecord(VaccineType type, String batchCode);• the date attribute is of type java.util.Date3. The class called Patient that extends the Person class has the followingadditional attributes and behaviours:• the public…Test time left: 01:48:45 Q3. Write a Java program to implement the concept of run time polymorphism through method overriding with the following scenario. There are three music companies Tips, Zee and T series. These companies use a super class Music, where there is a constructor for initializing music and play() method to play music. Create subclasses Tips, Zee and Tseries that overrides a play() method in the super class and add some new functionality to it. You can use print statement in the body of the constructor and method of the class.Code the StudentAccount class according to the class diagramMethods explanation:pay(double): doubleThis method is called when a student pays an amount towards outstanding fees. The balance isreduced by the amount received. The updated balance is returned by the method.addFees(double): doubleThis method is called to increase the balance by the amount received as a parameter. The updatedbalance is returned by the method.refund(): voidThis method is called when any monies owned to the student is paid out. This method can onlyrefund a student if the balance is negative. It displays the amount to be refunded and set thebalance to zero. (Use Math.abs(double) in your output message). If there is no refund, display anappropriate message.Test your StudentAccount class by creating objects and calling the methods addFees(), pay() andrefund(). Use toString() to display the object’s data after each method called
- Goal 1: Update the Fractions Class Here we will overload two functions that will used by the Recipe class later: multipliedBy, dividedBy Previously, these functions took a Fraction object as a parameter. Now ADD an implementation that takes an integer as a parameter. The functionality remains the same: Instead of multiplying/dividing the current object with another Fraction, it multiplies/divides with an integer (affecting numerator/denominator of the returned object). For example; a fraction 2/3 when multiplied by 4 becomes 8/3. Similarly, a fraction 2/3 when divided by 4 becomes 1/6. Goal 2: Update the Recipe Class The Recipe constructors so far did not specify how many servings the recipe is for. We will now add a private member variable of type int to denote the serving size and initialize it to 1. This means all recipes are initially constructed for a single serving. Update the overloaded extraction operator (<<) to include the serving size (see sample output below for an…Goal 1: Update the Fractions Class Here we will overload two functions that will used by the Recipe class later: multipliedBy, dividedBy Previously, these functions took a Fraction object as a parameter. Now ADD an implementation that takes an integer as a parameter. The functionality remains the same: Instead of multiplying/dividing the current object with another Fraction, it multiplies/divides with an integer (affecting numerator/denominator of the returned object). For example; a fraction 2/3 when multiplied by 4 becomes 8/3. Similarly, a fraction 2/3 when divided by 4 becomes 1/6. Goal 2: Update the Recipe Class Now add a private member variable of type int to denote the serving size and initialize it to 1. This means all recipes are initially constructed for a single serving. Update the overloaded extraction operator (<<) to include the serving size (sample output below for an example of formatting) . New Member functions to the Recipe Class: 1. Add four member functions…Scenario:You are hired by a game development company. Your task is to create an RPG hack & slashconsole game. The game will have a movement system that will be based on the x, y, zcoordinate system. You will need to start with creating 3 classes.1. A class that represents a player2. A class that represents an enemy3. An abstract class that contains the movement logic.Step 1:Start by creating the superclass which defines the movement system for both enemy andplayer. The movement system is based on the Coordinate system. Imagine an x, y, z plane,the y coordinate is used to move forward and backward in the virtual plane, x to go left andright, z to go up and down.For example, A player with coordinates x, y, z with values -5, 10, 0 represents a player -5units to the left, 10 units forward, and 0 z units mean on the ground. (0, 0, 0) are the baseunits which means the player or enemy is at the start of the level.Step 2:Create a class to represent the player which is derived from the…