Suppose you want to design software for a restaurant. a. Give use cases for placing an order and settling the bill. b. Identify a list of possible classes. Pick two of these classes, and write CRC cards for them.
Q: Explain how this would work.
A: The Diffie-Hellman key-exchange protocol is vulnerable to a man-in-the-middle attack by a malicious…
Q: IN JS ONLY NEEDED SOLUTION Create a function that takes an amount of monetary change (e.g. 47 cents)…
A: Input - Integer Output - String as per the condition logic - return { 'q': Math.floor(c /…
Q: Using a MAC (message authentication code), what happens if an attacker attempts to tamper with the…
A: Mac authentication and integrity : While MAC capabilities are like cryptographic hash…
Q: What is digital signal processing?
A: Digital signal: A digital signal, sometimes referred to as a square wave or clock signal, is a…
Q: The string "slots" that are filled in by the format method are marked by:a) % b) $ c) [] d) {}
A: Lets see the solution.
Q: b. Start with the seed xo = 67, and generate 5 pseudo-random numbers using the formula Xn 17 Xn-1…
A:
Q: After this pause, we'll go deep into the topic of application layer protocols and network programs.
A: Applications that run on a network: As network functions progressively become virtualized and…
Q: A local biologist needs a program to predict virus population growth. The inputs would be • the…
A: I give the code in Python along with output and code screenshot
Q: Using SQL data definition language, write the SQL statements to change each of the following…
A: Here are all the Queries for all the tasks:
Q: nd out JavaScript error.
A: In this question HTML and JavaScript code is given, we need to find out the error for sorting the…
Q: Do Windows machines have any potential entry points for investigators
A: Clarification: Volatile data and nonvolatile data are the two sorts of information that laptop…
Q: In-depth information on SRT would be much appreciated.
A: One of the most prevalent file formats is an SRT file. often utilised file types in the subtitling…
Q: Q2) Write a program to read a square matrix then print the secondary diameter and the elements that…
A: answer is in next step.
Q: There is an N of components, represented by the strings S1,S2, .... SN into the kitchen. The chef…
A: Input-Output Format: The first line of the input contains a single integer T denoting the number of…
Q: There is an N of components, represented by the strings S1,S2, .... SN into the kitchen. The chef…
A: Input-Output Format: The first line of the input contains a single integer T denoting the number of…
Q: What are the different remedies available for trademark infringement? How can you protect online…
A: The above question is solved in step 2 :-
Q: Disjointed data sources may lead to a variety of problems.
A: It is a well-known fact that systems generate a constant stream of concerns and problems.Computer…
Q: Find Electromagnetic Harvesters implementations over the internet and describe how they work and…
A: The question has been answered in step2
Q: AC has a construction called a union, in which a field of a record (called a struct in C) can hold…
A: Union is a user defined data type which is the collection of different variables of different data…
Q: Several factors need to be considered in tandem to produce a compiler that is both fast and precise.…
A: Optimization of the compiler: An optimising compiler is a piece of software that seeks to reduce or…
Q: Provide an illustration of the distinctions between the client-server and peer-to-peer models.
A: Network of Computers A computer network is the physical and logical configuration of many…
Q: = 2 while i < 24: j = 4 while j <= 10: print(f'{i}{j}') i = i + 13 What would the program's…
A: Since there is no programming language mentioned The answer is solved using Python Programming…
Q: Why should you use IPSec, why should you deploy it, and what are its benefits and drawbacks in…
A: Introduction: A group of technologies known as IPSec enables secure packet exchange at the IP layer.…
Q: Is there anything you can do to ensure your computer is protected from power surges, and what other…
A: Power surges are sudden spikes in power use. energy supplied to normal equipment; when this amount…
Q: Q: One of the modern devices that have (silently) crept into distributed tems are GPS receivers.…
A: Answer is
Q: How does Java's Collection framework function, and what is it?
A: Introduction: The Collection interface is the basic building component in the collections framework…
Q: What is your experience with "poison packet attacks"? Can you provide any instances to back up your…
A: ARP Poisoning is a cyber attack that modifies IP/MAC address pairings on a LAN by sending poisoned…
Q: :C has a construction called a union, in which a field of a record (called a struct in C) can hold…
A: RPC stands Remote Procedure Calls.
Q: Give a brief description of each robot above, referring to concepts and topics discussed in the…
A: Space Robot 1: Sputnik 1 The first robot to leave space was Sputnik 1, sent by the Soviet Union on…
Q: Suggest a service deployment model IT business should join, 1. Give 5 reasons for your choice. 2.…
A: A service deployment model IT business should join:
Q: Using SQL data definition language, write the SQL statements to change each of the following…
A: Data Definition Language is a subset of SQL.
Q: 3.13 (Employee Class) Create a class called Employee that includes three instance variables-a first…
A: Java Java is an object-oriented language that may be used to create software for several platforms.…
Q: What are the many factors that must be considered while designing a compiler that generates reliable…
A: Introduction: An grasp of the target machine's runtime environment and instruction set is essential…
Q: A. What is the difference (by graph) between the OSI Model and Internet Model ?
A: The OSI model was created before an execution, while the Internet model was created after TCP/IP was…
Q: 3. Consider the following graph G. 2 3 Show that G is planar by drawing it in the plane without any…
A:
Q: Outline best practices for managing Microsoft Windows and applications vulnerabilities
A: Microsoft Windows is Operating System of Computer designed by Microsoft. Examples of various…
Q: Implement the one-time pad encryption scheme in Microsoft Excel. Your worksheet should look as…
A: The answer is written in step 2
Q: Consider an environment in which there is a one-to-one mapping between user-level threads and…
A:
Q: how to read an IP datagram header (in hex). 450005dc 1e244000 8006...
A: We are trying to read IP packet headers manually from the hex file.
Q: How can forensics teams access information stored on Windows computers?
A: Clarification: Volatile data and nonvolatile data are the two sorts of information that laptop…
Q: When a systolic array has just one dimension in size, the calculation is different from SIMD.
A: The answer for the above mentioned question is given in the below steps for your reference.
Q: Find (49.3)10 - (00110110.0010), BCD = (?), ВС
A: The answer is
Q: Communications protocols for exchanging information. The problems that might arise while using TCP…
A: Solution: Transport layer protocols typically handle point-to-point communication, which involves…
Q: 2. Reading Files Create a class with a method that, given a string representing a file name,…
A: *As per the guideline I can only provide the solution for 1 question so adding the solution for the…
Q: Which of the following is not a file-reading method in Python?a) read b) readline c) readall d)…
A: Lets see the solution.
Q: What kind of assault may be launched against a cookie-based online authentication system?
A: Essentially, cookie-based authentication is a kind of session-based authentication in which session…
Q: Provide precise information regarding the following topics: global issues (globalisation in terms of…
A: Globalization: The term "globalization" describes the growing dependency and connectivity between…
Q: A multiprocessor with eight processors has 20 attached tape drives. There is a large number of jobs…
A: operating system An operating system goes about as a go-between between the user of a PC and PC…
Q: e sense to restrict the lifetime that could be established.
A: Session Key: Session Key: In request to ensure the security of a communications session between a…
Q: What are the benefits and drawbacks of utilizing IPSec in comparison to other methods of network…
A: IPsec, which stands for "Internet Protocol Security," is a collection of protocols that was…
Suppose you want to design software for a restaurant.
a. Give use cases for placing an order and settling the bill.
b. Identify a list of possible classes. Pick two of these classes, and write CRC cards for them.
Step by step
Solved in 2 steps
- Consider writing a program to manage a collection of movies. There are three kinds of movies in the collection: dramas, comedies, and documentaries. The collector would like to keep track of each movie's title, the name of its director, and the year the movie was made. Some operations are to be implemented for all movies, and there will also be special operations for each of the three different kinds of movies. How would you design the class(es) to represent this system of movies? Your design should implement the concept of OverridingIn this activity, we are going to plan out and write a class definition that stores information for a book. Let's say we want to store the following information about this book: The book's name The book's author(s) (a book can have more than one author) The book's publisher The book's ISBN number The book's price The book's year of publication First, answer the following questions before the design: 1. What is a suitable name for this class? (Pick a name that best describes it).Your task is to write a program that computes paychecks. Employees are paid an hourly rate for each hour worked; however, if they worked more than 40 hours per week, they are paid at 150 percent of the regular rate for those overtime hours. Name an actor class that would be appropriate for implementing this program . Then name a class that isn't an actor class that would be an appropriate alternative. How does the choice between these alternatives affect the program structure? Implement the appropriate class and solve the problem. You need to test your code using a separate main class program named "exel.java” Java
- Write classes that could be used in a system that manages vehicles in a public transportation system. You will write classes to represent a TransitVehicle, Bus, and SubwayCar. The information about the classes is below. Step 1: Plan Your Class Design Before you start to code, decide how to design your classes. Which class should be the parent? the child? What variables or methods belong in each class? Step 2: Write the Core Class Components Write the three classes. Each class must have all of the following. Important: a class can have a method directly (meaning written into the code) or indirectly (meaning inherited from a parent). Either of these counts to meet the requirement. instance data variables transit vehicles are described by an id that contains letters and numbers and a description of the route buses are described by an id, route, and the number of miles per gallon (without decimals) subway cars are described by an id, route, and whether or not the car goes underground…For your first program, you are to write a simple Dodgeball simulation. In this simulation, we will have nplayers, and one ball. One player, the "thrower," will have the ball. The thrower will throw the ball at anotherplayer, the "target." The target could catch the ball, could be hit by the ball, or the ball could completely missthe target. If the target catches the ball, then the thrower is out of the game (and the target becomes the nextthrower.) If the ball hits the target, then the target is out of the game. If the ball misses the target, neitherplayer is out. In the latter two cases, any one can pick up the ball and become the next thrower. The game isover when only one player is left.In this simple version, the players (initially n players) will stand in a circle. The thrower will always countthe players to his/her right, and then throw the ball at the dth player, who becomes the target. The target willalways catch the ball, so that the thrower will be out of the game (and will…Use C++ and WinBGIm graphic library. So, basically in this question, we have to create a program for the following criteria below. To give you an idea regarding choosing a class, take a pac-man game project as an example. Here, you have the choice to choose either the class Pacman, Ghost or even the Wall or Obstacle. But, don't give the coding to find an area of a shape. Source code files should consist of all the .cpp and .hpp files.
- Help, I am making a elevator simulation using polymorphism. I am not sure to do now. Any help would be appreciated. My code is at the bottom, that's all I could think off. There are 4 types of passengers in the system:Standard: This is the most common type of passenger and has a request percentage of 70%. Standard passengers have no special requirements.VIP: This type of passenger has a request percentage of 10%. VIP passengers are given priority and are more likely to be picked up by express elevators.Freight: This type of passenger has a request percentage of 15%. Freight passengers have large items that need to be transported and are more likely to be picked up by freight elevators.Glass: This type of passenger has a request percentage of 5%. Glass passengers have fragile items that need to be transported and are more likely to be picked up by glass elevators. public abstract class Passenger { public static int passangerCounter = 0; private String passengerID; protected…Help, I making a elevator simulator, I need help in writing code in the Elevator class and it's polymorphism class. I am not sure what to do next. Any help is appreciated. There are 4 types of passengers in the system:Standard: This is the most common type of passenger and has a request percentage of 70%. Standard passengers have no special requirements.VIP: This type of passenger has a request percentage of 10%. VIP passengers are given priority and are more likely to be picked up by express elevators.Freight: This type of passenger has a request percentage of 15%. Freight passengers have large items that need to be transported and are more likely to be picked up by freight elevators.Glass: This type of passenger has a request percentage of 5%. Glass passengers have fragile items that need to be transported and are more likely to be picked up by glass elevators. There are 4 types of elevators in the system:StandardElevator: This is the most common type of elevator and has a request…Program - Python Make a class.The most important thing is to write a simple class, create TWO different instances, and then be able to do something. For example, create a pizza instance for Suzie, ask her for the toppings from the choices, and store her pizza order. Then create a second pizza instance for Larry, ask for his toppings and store his pizza order. Then print both of their orders back out. You do not need to make your class very complicated. (Shouldn't be the pizza example but something similar)
- Instructor note: This lab is part of the assignment for this chapter. This lab uses two Java files, LabProgram.java and SimpleCar.java. The SimpleCar class has been developed and provided to you already. You don't need to change anything in that class. Your job is to use the SimpleCar class to complete the specified tasks in the main() method of LabProgram.java Given two integers that represent the miles to drive forward and the miles to drive in reverse as user inputs, create a SimpleCar object that performs the following operations: Drives input number of miles forward Drives input number of miles in reverse Honks the horn Reports car status The SimpleCar class is found in the file SimpleCar.java. Ex: If the input is: 100 4 the output is: beep beep Car has driven: 96 milesNow we want to create an Object oriented System for a shopping mall. It has Items with name, manufacturer and price. Provide constructors. Getters, setters, toString methods. We add several items to Store. For that create a store class having name and array of items, Provide Constructors, getters/setters and toString(), in addition you have to provide a method add which add new item to the array.First, you need to design, code in Java, test and document a base class, Student. The Student class will have the following information: A. Title of the student (eg Mr, Miss, Ms, Mrs etc)B. A first name (given name)C. A last name (family name/surname)D. Student number (ID) – an integer number (of type long)E. A date of birth (in day/month/year format – three ints) - (Do NOT use the Date class from JAVA)The student class will have at least the following constructors and methods:(i) two constructors - one without any parameters (the default constructor), and one with parameters to give initial values to all the instance variables.(ii) a reasonable number of set and get methods.(iii) methods to compute the final overall mark and the final grade (which will be overridden in the respective child classes). These two methods will be void methods that set the appropriate instance variables. Remember one method can call another method. If you prefer, you can define a single method that sets…