Assume we have the following classes in a polymorphic relationship. Employee SalaryEmployee HourlyEmployee The Employee class is an abstract class. An employee has a first name, an initial, and a last name. A salary employee receives a fixed salary per month. An hourly employee receives wages based on the number of hours worked per month and a fixed rate/hour. Write the interface files and the implementation files for all three classes and then test them in an application file.
Q: Encode the following instruction from MSP430 assembly to MSP430 machine code. Write the bytes in the...
A: Introduction Encode the following instruction from MSP430 assembly to MSP430 machine code. Write the...
Q: A compiler that examines every character of the original text if you will.
A: INTRODUCTION: COMPILER: In computer programming, a compiler is a program that converts the "code" th...
Q: Create a pseudocode application that invites the user to enter his or her age and then reports wheth...
A: Pseudocode definition: A pseudocode is a series of instructions or procedures expressed in plain En...
Q: Given the following binary number in 32-bit (single precision) IEEE-754 format, the decimal value cl...
A: Given binary number 0011 1110 0110 1101 0000 0000 0000 0000 In this left most bit represents sign bi...
Q: What exactly does a field in a database represent? What is the significance of this?
A: INTRODUCTION: It is a data field that indicates a certain characteristic or function. Each field in ...
Q: Which email protocol enables an email client to download emails to a local computer? a. IMAP4; b....
A: Intro Option C (TCP)A Transmission Control Protocol (TCP) is used for maintaining and establishing n...
Q: CODE USING C++ Can you identify if Cody's name is spelled right? If so, then make a program that ac...
A: PROGRAM INTRODUCTION: Include the required header files. Start the definition of the main function....
Q: What are the measurable aims of usability-assisted design?
A: Introduction: Usability goals include things like speed, accuracy, overall success, and customer sat...
Q: Based on the maturity of the testing process, write a short essay on three testing goals.
A: Introduction
Q: C++ Define a problem with user input, user output, Pointers, and Pointer Arithmetic. If no output e...
A: a system that calculates user input values and displays the odd number of identical members on the...
Q: What is the difference between server Role and Server Feature? * Your answer
A: difference between server role and features are
Q: Why are there so many different partitioning algorithms in use why are by operating systems, and so ...
A: Operating systems use different algorithms to partition and allocate data and memory to processes an...
Q: Why is the transport layer installed in the end system?
A: The answer is given in the below step
Q: Given the graph below. Break any ties alphabetically, If we use Breadth First search graph search th...
A: Breadth first search, BFS, is used to traverse graph. This algorithm can start from any node. It sta...
Q: Create a structural model (class diagram) that the site must need to support its business process. "...
A: Create a structural model (class diagram) that the site must need to support its business process. "...
Q: What skillsets are required nowadays for a database developer or database programmer?
A: Explain the skills essential for a database developer
Q: mplementation Part Use appropriate data structure for the given search space and heuristic values. ...
A:
Q: Individuals like using digital social networks (such as Facebook and Twitter). Determine why people ...
A: Explanation : Social networking websites and apps allow users to create and exchange user-generated ...
Q: Write a code whích enables a user to input the coefficients of a quadratic qfx) = ar+ bx +c and plot...
A: Matlab code: prompt = " Enter coefficient 'a' of quadratic equation"; a = input (prompt); prompt2 = ...
Q: "The Diamond Intrusion Analysis Model"
A: Intro The Diamond Model of Intrusion Analysis: - This model focuses and emphasized four basic things...
Q: Consider the following graph. Use the A search algorithm to find the optimal path from the start nod...
A: Here, I have to provide a solution to the above question.
Q: w to calculate the time efficiency in adding searching using C or
A: Let us see the answer:- Introduction:- A good algorithm is correct, but a great algorithm is both co...
Q: Most computers are electronic digital devices that work with discrete numbers such as 1's and 0's. ...
A: Introduction: Here we are required tell that whether most computers are electronic digital devices t...
Q: What is open source in computer science?
A: This question comes from Internet Technologies which is a paper of computer science. Let's discuss i...
Q: Write a method public static String scramble(String word) that constructs a scrambled version of a g...
A: Introduction Write a method public static String scramble(String word) that constructs a scrambled v...
Q: A gate has a standard key pad with the digits 0 through 9. How many possible code combinations are t...
A: A standard keyboard consists of the following keys are Alphabetical keys, Numeric Keys, Punctuation ...
Q: Given A={1,2,3,4,56}, B= {2,4,5,6} and C= (1,6,7} 1. B' U C'=
A: A={1,2,3,4,56} B= {2,4,5,6} C= (1,6,7} B'= {1,3,7} C'= {2,3,4,5}
Q: Describe agile development methodologies.
A: Introduction: Agile Development : Agile is a software development technique that focuses on the wh...
Q: What are the most significant factors to consider while designing a physical database?
A: Introduction: This topic focuses on the most critical factors to consider while creating a physical ...
Q: Explain the major differences between multiprogrammed batch processing and time sharing systems in a...
A: Solution Time sharing system : Time sharing is a technique which enable many people, located at var...
Q: Write a code to change the color of label text every 5 second randomly * Your answer (RND*100)= * Yo...
A: Find the answer with reason given as below :
Q: at are the dangers of building a security infrastructure that is available to everyon
A: Let us see the answer:- Introduction Infrastructure security, including critical infrastructure secu...
Q: PYTHON (Basics) I've already written program5_2 but I am unsure how to make the below work. progr...
A: Please refer below explaination on how to import a module from some another module in python: First ...
Q: Write two versions of each of the string-copy and string-concatenation functions in Fig. 8.14. The f...
A: #include <stdio.h> void copyPointer(char *destination2, char *ptr) { while(*ptr) { ...
Q: Explain the CNSS security Model. What are the three dimensions of it?
A: Introduction: CNSS security model is a three-dimensional model which was developed by John McCumber ...
Q: for this problem I ju
A: The code for the given function is given below.
Q: Writes a MIPS assembly language program that reads an input string, reverses the order of its charac...
A: .model stack .stack 200h .data msg1 db 10, 13, "Enter a string (at most 18 characters) : ", 10, 13,'...
Q: A computer system's hardware and software are like two sides of the same coin. Discuss.
A: Introduction A computer system's hardware and software are like two sides of the same coin. Disc...
Q: main Duties (testing, documentation and communication) Skills and toolbox Mobile devices Virtual mac...
A: NOTE :- As per our guidelines we are supposed to answer only one question. Kindly repost other quest...
Q: Please explain the ChIP assay. Why is it employed? Please provide examples.
A: Introduction: By monitoring transcription regulation via histone modification (epigenetics) or trans...
Q: Can you turn off the computer's inbuilt ports? If yes, which ports are you able to deactivate, and w...
A: Intro Part 1: We can disable the onboard ports on the computer. Part 2: The onboard Serial port 1, o...
Q: Residential, institutional, and mobile access networks are all served by access networks, which prov...
A: Introduction: End systems and users at an educational institution or a company are connected to the ...
Q: What function does HTTP play in a network application? What further components are required to finis...
A: Introduction: Role of HTTP: “HTTP” stands for Hypertext Transfer Protocol”. It is been used between...
Q: What is a wireless network's basic service set configuration? how are they put to use?
A: Let us see the answer:- Introduction As the name implies, a Basic Service Set (BSS) is a network des...
Q: Given: Language L2 = {w e {a,b}* | w contains substring aab} Construct the DFA representing the give...
A: Solution: The DFA for the language L2 = {w ε {a, b}* | w contain substring aab} Where, A is the init...
Q: PHP exercise 4 When you are writing scripts, you will often need to see exactly what is inside yo...
A: The given output in a PHP script can be achieved by using the var_dump() and print_r() methods and i...
Q: hat exactly do you mean when you say "Angular bootstrapping"?
A: Step 1) Angular : Angular is an open-source web application based on TypeScript, a programming lang...
Q: ________is where you will determine live hosts, routers, and servers to establish a picture of the n...
A: you will determine live hosts, routers, and servers to establish a picture of the network topology.
Q: Given the following binary number in 32-bit (single precision) IEEE-754 format, the decimal value cl...
A: The 32 bit IEEE format is Sign(1) Exponent(8) Mantissa(23) The bias used is +127
Q: List and explain the functions of the ten application framework components that are part of the Andr...
A: answer is
i need the c++ code
Trending now
This is a popular solution!
Step by step
Solved in 2 steps with 1 images
- Write an abstract class, it can be anything well defined from the very basics.1. Create a Student class that implements the Person interface. As well as storing the students name and email, also store their course grade (e.g A, B, C) in a member variable. The grade should be accessible via a getGrade method. For the implementation of getDescription return a message along the lines of “A C grade student”, substituting the students actual grade.2. Create a Lecturer class that implements the Person interface. This class should also store the subject that the lecturer teaches. Add a getSubject method, and implement getDescription so that it returns a suitable message, e.g. “Teaches Biology”.3. Create a third class, Employee that implements the interface. This should also store the name of the department the Employee works in (available via getDepartment). Again, getDescription should return a suitable message.Your assignment for this course is to implement a beginner level Book Management System (BMS) in Java language. BMS contains 2 classes: Bookand BookList. The Book class has the following attributes: code: a String object, that hold the book’s code. title: a String object, that hold the book’s title. qua: int variable, that hold the number of books with the same code in the library. price: a double variable, that hold the book’s price. The BookList class contains only one data member: ArrayList<Book> t. When running the program display the menu as below:1. Input & add book(s) to the end.2. Display all books.3. Search a book for given code.4. Update the book’s price for given code.5. Find the (first) max price value.6. Sort the list ascendingly by code.7. Remove the book having given code.8. Load data from file.0. Exit.Notes:(1) The book’s code must be unique in the list.(2) Display all books in format (code, title, quantity, price).(5)…
- T/F1. However, implementation classes may be extended, but interface classes cannot.Implement a nested class composition relationship between any two class types from the following list: Advisor Вook Classroom Department Friend Grade School Student Teacher Tutor Write all necessary code for both classes to demonstrate a nested composition relationship including the following: a. one encapsulated data member for each class b. inline default constructor using constructor delegation for each class c. inline one-parameter constructor for each class d. inline accessors for all data members e. inline mutators for all data membersWhich of these statements IS NOT true regarding design by contract. Question options: Creating and implementing an interface is an example of implicit design by contract. Explicit design by contract makes specifications part of the compiled code for a program. Creating and building from an abstract class is an example of explicit design by contract. When we code to an interface, we create a set of methods to be used to interact with a class; these methods establish a contract for how the design should work. Option B is not the correct answer.
- Create a set of collaborating classes to implement the interaction shownAbstract classes and interfaces may be used interchangeably to specify the behavior of objects.How do you know whether you need an interface or an abstract class?What is the design pattern depicted in the diagram below? The intent of this design pattern is to define an interface for creating an object, but let subclasses decide which class to instantiate. It lets a class defer instantiation to subclasses. Client Abstraction normalMethodoe BmakeObjecto Product do some stuff aProduct = makeObjecto: f do some more stuff -aProduct Product ConcreteOne ConcreteTwo makeObjecto : Product ProductOne ProductTwo return new ProductOneo. A. Factory Method Design Pattern B. Singleton Design Pattern C. Proxy Design Pattern D. Adapter Design Pattern
- Person and Customer Classes Write a class named (Person) with data attributes for a person’s name, address, and telephone number. Provide accessors/getters and mutators/setters for each attribute. Write a displayPerson() to print out the attributes of the Person. Next, write a class named (Customer) that is a subclass of the (Person) class. The (Customer) class should have a data attribute for a customer number, and a Boolean data attribute indicating whether the customer wishes to be on a mailing list. Provide accessors/getters and mutators/setters for each attribute. Write a display customer() to print out the attributes of the Customer. Demonstrate an instance of the (Customer) class in a simple program.We are working in 2D and programming in C#. Create a Point class to represent points in 2D. Create an abstract base class named Shape. It should have a position property as a Point. It should be designed as having Move and Resize methods. Create a Line class using Points, derived from Shape class. Its position should be the center of the line. Create a Polygon class representing a closed polygon of Lines, derived from Shape class. Note that, at construction time, Lines may not be provided in order. The continuity and number of the lines should also be checked for a properly closed Polygon. All geometric entities should be moveable. All shapes should be resizable without changing their central positions. All shapes' positions should be their centroids. Shapes should have areas calculated. Write an example C# Console code to demonstrate your program's abilities.T/F1. Interface classes cannot be extended but classes that implement interfaces can be extended.