Answer:
I'm going to do it but you should try these things for yourself or else you won't learn.
Explanation:
-First create a project (I'm using Netbeans 14 and the project is a Maven, but the code should work on any IDE)
-Name the project 'ShoppingCartPrinter' and leave the package name as it is. This is the main class so the main method is gonna be there already.
-Then you will create a second class named 'ItemToPurchase'. So I'll leave the code in the attachment (at the bottom of my answer it's written 'Download txt') or else brainly will think it's some sort of redirection to another websites because of the 'dots' and won't let me post it.
Which microsoft tool can be used to review a systems security configuration recommended?
Answer:The Security Compliance Toolkit (SCT)
Explanation:
It allows security administrators to download, analyze, test, edit, and store Microsoft-recommended security configuration baselines for Windows and other Microsoft products.
Is the intersection of a column and a row
A Cell hope you enjoy your answer
Rewrite the code below so that a transformation moves the div 100px to the right and 50px upward.
Relocate me!
Using the knowledge in computational language in HTML it is possible to write a code that below so that a transformation moves the div 100px to the right and 50px upward.
Writting in HTML code:<!DOCTYPE html>
<html>
<head>
<style>
div {
width: 300px;
height: 100px;
background-color: yellow;
border: 1px solid black;
transform: translate(50px,100px);
}
</style>
</head>
<body>
<h1>The translate() Method</h1>
<p>The translate() method moves an element from its current position:</p>
<div>
This div element is moved 50 pixels to the right, and 100 pixels down from its current position.
</div>
</body>
</html>
See more about HTML at brainly.com/question/19705654
#SPJ1
Following Aristotle,man by nature is a political animal,justify the above claim in the light of the Russian invasion of Ukraine
Following Aristotle, man by nature is a political animal using the claim in the light of the Russian invasion of Ukraine is that:
Aristotle stated that State is natural due to the fact that nature has not made man to be in a self-sufficient state. But Man has a lot of -different type of needs which they want them to be fulfilled. Russian need and Ukraine need differs and as such, man is fighting to satisfy their needs.What is the quote about?In his Politics, Aristotle was known to be a man who believed man to be a "political animal" due to the fact that he is a social creature that is said to have the power of speech and also one that has moral reasoning:
He sate that man is a lover of war and as such, Aristotle stated that State is natural due to the fact that nature has not made man to be in a self-sufficient state. But Man has a lot of -different type of needs which they want them to be fulfilled. Russian need and Ukraine need differs and as such, man is fighting to satisfy their needs.
Learn more about Aristotle from
https://brainly.com/question/24994054
#SPJ1
You are responsible for creating a shared file system to support a new branch office. The manager has requested shared locations for branch staff to access the files. An area is required for all staff to access common forms and notices. Staff members are required to have read-only access to this location, but the manager requires full access to all content. A different area is required for all staff to share files without restrictions. The last area required is for the manager’s private files, and only the manager has access to this location. A second manager will be hired in the next month to share the current manager’s duties for job training. Both managers will require the same access throughout the file system. Only the IT administrator should have the ability to change file and folder permission settings for any area. Network permissions are not a concern, because they will be configured appropriately based on the NTFS permissions that you select.
The groups that I would create to simplify permission assignment are:
Full Control group, Change group, Read group.Domain Admins groupUsersWhat are the folders?Administrator Manager Folder,Staff Folder,Common Folder Manager, etc.The file-level permission settings that I would use to achieve the desired results are:
readwriteexecuteWhat is file permission settings?If a person wants to set permissions in any organization's system, the person need to specify what places that the users are allowed to do in or within a folder, e.g. save and delete files or make a new folder.
The standard permissions settings (are known to be:
Full Control ModifyRead & ExecuteList Folder Contents Read, or Write.Hence, The groups that I would create to simplify permission assignment are:
Full Control group, Change group, Read group.Domain Admins groupUsersLearn more about IT administrator from
https://brainly.com/question/21852416
#SPJ1
See complete question below
What groups would you create to simplify permission assignment? What folder structure and corresponding file-level permission settings would you use to achieve the desired results?
Explain how will you process identify and use texts according to the
function you wish for it to serve in the particular industry
The texts have different objectives that can be identified with the following tips:
Identify the major ideas.Identify the author's purpose.What is a text?
A text is a term to refer to the set of phrases and words contained coherently to be interpreted and to share the ideas of an author (emitter or speaker).
Texts can have a variety of topics counting on the author's intention. For example:
Scientific texts: They are the texts that have the purpose of sharing scientific knowledge with exact data and results of experiments or others.Literary texts: They are the best known texts that stand out for including a variety of topics, they are marked by telling an in-depth story.News texts: They are the texts that reveal all the details of a news story and have the goal of objectively reporting.According to the above, to identify a text it is necessary to read it and remember the main ideas and the purpose of its author when writing it. Additionally, the texts are tools for different professions to teach crafts, knowledge and techniques counting on the requirement.
To learn more about texts, refer
https://brainly.com/question/25862883
#SPJ9
A user wants to visualize a highly complex 3D model using a Virtual Reality headset.
What is the best way for the user to do this?
Since the user wants to visualize a highly complex 3D model using a Virtual Reality headset, the best way for the user to do this is to connect a tethered headset to a very powerful PC.
What does a virtual reality headset do?VR headsets is known to be one that is found or is one that do replace the human's or user's natural environment with that of a virtual reality content, e.g. a movie, a game or what we call a kind of a prerecorded 360-degree VR environment.
Note that this is one that often allows the user to be able to turn and also look around, just like the person is in the physical world.
Hence, Since the user wants to visualize a highly complex 3D model using a Virtual Reality headset, the best way for the user to do this is to connect a tethered headset to a very powerful PC.
Learn more about Virtual Reality from
https://brainly.com/question/26705841
#SPJ1
Input a list of employee names and salaries and store them in parallel arrays. End the input with a sentinel value. The salaries should be floating point numbers Salaries should be input in even hundreds. For example, a salary of 36,510 should be input as 36.5 and a salary of 69,030 should be entered as 69.0. Find the average of all the salaries of the employees. Then find the names and salaries of any employee who's salary is within 5,000 of the average. So if the average is 30,000 and an employee earns 33,000, his/her name would be found. Display the following using proper labels. Save your file using the naming format LASTNAME_FIRSTNAME_M08 FE. Turn in your file by clicking on the Start Here button in the upper right corner of your screen. 1.Display the names and salaries of all the employees. 2. Display the average of all the salaries 3. Display all employees that are within 5,000 range of the average.
Using the knowledge in computational language in JAVA it is possible to write the code being Input a list of employee names and salaries and store them in parallel arrays
Writting the code in JAVA:
BEGIN
DECLARE
employeeNames[100] As String
employeeSalaries[100] as float
name as String
salary, totalSalary as float
averageSalary as float
count as integer
x as integer
rangeMin, rangeMax as float
INITIALIZE
count = 0;
totalSalary =0
DISPLAY “Enter employee name. (Enter * to quit.)”
READ name
//Read Employee data
WHILE name != “*” AND count < 100
employeeNames [count] = name
DISPLAY“Enter salary for “ + name + “.”
READ salary
employeeSalaries[count] = salary
totalSalary = totalSalary + salary
count = count + 1
DISPLAY “Enter employee name. (Enter * to quit.)”
READ name
END WHILE
//Calculate average salary with mix , max range
averageSalary = totalSalary / count
rangeMin = averageSalary - 5
rangeMax = averageSalary + 5
DISPLAY “The following employees have a salary within $5,000 of the mean salary of “ + averageSalary + “.”
For (x = 0; x < count; x++)
IF (employeeSalaries[x] >= rangeMin OR employeeSalaries[x] <= rangeMax )
DISPLAY employeeNames[x] + “\t” + employeeSalaries[x]
END IF
END FOR
END
See more about JAVA at brainly.com/question/12978370
#SPJ1
How has 5G become more energy efficient?
1. by creating cross channel wavelengths
2. by utilizing beamforming and multiple-input multiple-output (MIMO)
3. by converting to all solar power
4. by utilizing more energy efficient access points
Option 4. The way that 5G is more efficient is that is is able to utilize more energy efficient access points.
What is the 5G?
This is the term that is used to refer to the fifth generation mobile network. This is the latest generation of networks and it is known to be a faster way and a more efficient way of connecting to the internet when we compare it to the others that came before it.
This is known to have lower latency when we compare it to the 4G network. It is 100 times said to be faster than the 4G and more efficient for businesses and the people that use them. Hence the The way that 5G is more efficient is that is is able to utilize more energy efficient access points.
Read more on 5G network here: https://brainly.com/question/24664177
#SPJ1
Saira is having a crisis. For some reason she cannot find a number of products that she knows for a fact she has entered with their details in the worksheet. She has not deleted anything either. Where could have data gone?
Answer:
Unfortunately, if the power goes out or you accidentally choose “No” when Excel prompts you to save the file, entered but unsaved data disappears from the spreadsheet. Turning on the AutoSave or AutoRecover feature can help recover some data. This feature periodically saves entered data without being prompted.
One of the users in your company is asking if he can install an app on his company-provided mobile device. The installation of apps by users is blocked on the company’s mobile devices, but you have tested and confirmed this app would be useful for everyone.
Which of the following will allow users to request a minimal version of the app that downloads only what is required to run?
a. Resource pooling
b. Application streaming
c. Off-site email application
d. Rapid elasticity
Answer: Application straming
Explanation: Thats what Quiznet says.
How many outcomes are possible in this control structure?
In regards to computing, The numbers of outcomes possible in this control structure is two.
Check more about control below.
What is a Control Structures?Control Structures is known to be made up of blocks that helps to examine variables and one can be able to choose directions where they can go to and this is often based on its given parameters.
Note that the basic Control Structures in programming languages are composed of Conditionals (or Selection) that helps to execute one or a lot of statements if the given condition is met.
Hence, The numbers of outcomes possible in this control structure is two.
Learn more about control structure from
https://brainly.com/question/26504433
#SPJ1
Answer:
i think your asking about the forever one in computer scinece
im pretty sure its 2
Explanation:
What can quantum computers do more efficiently than regular computers?
A traditional computer uses bits to do computations, where 0 represents off and 1 represents on. It processes data in the form of what is known as computer binary language—sequences of zeros and ones. More transistors increase the processing power.
The principles of quantum mechanics are used by a quantum computer. like a traditional computer that just employs ones and zeros. Particles can reach these states because of their intrinsic angular momentum, or spin. The particle's spin can be used to represent the two states 0 and 1. For instance, a counterclockwise spin indicates 0, whereas a clockwise spin represents 1. The ability of the particle to exist in several states at once is one benefit of employing a quantum computer. Superposition is the name for this phenomena. This phenomenon allows a quantum computer to reach both the 0 and 1 states simultaneously. As a result, information in a traditional computer is conveyed as a single number, either 0 or 1. Quits, which are characterized as a 0 and a 1 occurring simultaneously, are used in quantum computers to increase processing power. For instance:
A 2 bit vintage computer must expand through each step in order to analyze the numbers 00 01 10 11 and arrive at a conclusion. A two-qubit quantum computer is capable of simultaneously analyzing every possibility. the passing of time.
Thank you,
Eddie
Project 12-2: Bird Counter
Help me make a Python program for birdwatchers that stores a list of birds along with a count of the
number of times each bird has been spotted.
Console
Bird Counter program
Enter 'x' to exit
Enter name of bird: red-tailed hawk
Enter name of bird: killdeer
Enter name of bird: snowy plover
Enter name of bird: western gull
Enter name of bird: killdeer
Enter name of bird: western gull
Enter name of bird: x
Name Count
=============== ===============
Killdeer 2
Red-Tailed Hawk 1
Snowy Plover 1
Western Gull 2
Specifications
Use a dictionary to store the list of sighted birds and the count of the number of times
each bird was sighted.
Use the pickle module to read the dictionary from a file when the program starts and
to write the dictionary to a file when the program ends. That way, the data that's
entered by the user isn't lost.
The program based on the information given is illustrated below.
How to illustrate the program?It should be noted that a computer program is a set of instructions in a programming language for the computer to execute.
Based on the information, the program is illustrated thus:
Code:
import pickle
#function to read birds data
def readBirdsData():
try:
birdsFile = open("birdsData","rb")
birdWatcher = pickle.load(birdsFile)
birdsFile.close()
birdWatcher ={}
except EOFError:
birdWatcher ={}
return birdWatcher
#function to write the data into file using pickle
def writeBirdsData(birdWatcher):
if birdWatcher == {} :
return
sorted(birdWatcher)
birdsFile = open("birdsData","ab")
pickle.dump(birdWatcher,birdsFile)
birdsFile.close()
#function to display birds data in sorted order
def displayBirdsData(birdWatcher):
print("Name\t\tCount")
print("========\t===========")
for key in sorted(birdWatcher.keys()):
print("{}\t\t{}".format(key,birdWatcher[key]))
#main function
def main():
birdWatcher = readBirdsData()
print("Bird Counter Program")
print ("\nEnter 'x' to exit\n")
name = input("Enter name of bird: ")
while True:
#break the loop if x is entered
if name == 'x':
#if the name exists in dictionary then increase the value
if the name in birdWatcher.keys():
birdWatcher[name] = birdWatcher[name] + 1
else:
#dd it otherwise
birdWatcher[name] = 1
name = input("Enter name of bird: ")
displayBirdsData(birdWatcher)
writeBirdsData(birdWatcher)
#driver code
if __nam__ == '__main__':
main()
Learn more about programs on:
https://brainly.com/question/26642771
#SPJ1
Python Programming
Create a Dictionary for a bank customer that contains: First Name, Last Name, Account Number, Savings amount and Checking amount. Minimum 3 customer. (each must be different)
Create a Dictionary for a Bank ATM that is made up of the customers from above.
When your program runs it should prompt the user for an account number (must be one in your dictionary).
The user can then select the following options. (stay in a loop until the user ends the session)
Review account information. (Print all the information for that account)
Deposit money to Savings or Checking. (Add amount to account)
Withdraw from Savings or Checking. (Subtract amount from the account. Can’t go below $0).
End session with ATM. (Print a farewell message)
The python program that creates a Bankaccount class for a Bank ATM that is made up of the customers and has a deposit and withdrawal function is given below:
Python Code# Python program to create Bankaccount class
# with both a deposit() and a withdraw() function
class Bank_Account:
def __init__(self):
self.balance=0
print("Hello!!! Welcome to the Deposit & Withdrawal Machine")
def deposit(self):
amount=float(input("Enter amount to be Deposited: "))
self.balance += amount
print("\n Amount Deposited:",amount)
def withdraw(self):
amount = float(input("Enter amount to be Withdrawn: "))
if self.balance>=amount:
self.balance-=amount
print("\n You Withdrew:", amount)
else:
print("\n Insufficient balance ")
def display(self):
print("\n Net Available Balance=",self.balance)
# Driver code
# creating an object of class
s = Bank_Account()
# Calling functions with that class object
deposit()
s.withdraw()
s.display()
Read more about python programming here:
https://brainly.com/question/26497128
#SPJ1
A programmer is debugging an action-adventure game they have just created.
As they test the game, they make sure to try moves and decisions that
players of the game will be unlikely to make. Is this a good strategy for
debugging a game?
OA. Yes, because making unexpected moves is likely to test the
game's limits
Yes, because playing this way makes the player less likely to win No, because players are less likely to notice errors in unexpected
places No, because errors are more likely to be overlooked in expected
places
By trying the moves and decisions that players of the game will be unlikely to make is a good strategy for debugging a game so the answer is option A : Yes, because making unexpected moves is likely to test the game's limits.
How does a programmer debug a program?Debugging as defined in computer programming is known to be a kind of a multistep procedure which involves the act of knowing a problem, and also isolating the origin of the problem, and lastly one can correct the issue or know a way to work around the issue.
Note that the last step of debugging is to test the correction that was made or one can workaround and make sure that it works or functions well.
Hence, By trying the moves and decisions that players of the game will be unlikely to make is a good strategy for debugging a game so the answer is option A : Yes, because making unexpected moves is likely to test the game's limits.
Learn more about debug from
https://brainly.com/question/15079851
#SPJ1
At north wind headquarters, where were penguins first reported missing on the giant TV screen? And what did the penguins react?
Answer:
Berlin zoo
The penguins reacted that they must respond with action ASAP
Answer:
Berlin zoo, the penguins reacted that "It's time to go".
This means that the penguins care about each other and must rescue each other.
Which of the following accesses a local variable var in structure fred?
A. fred->var;
B. fred.var;
C. fred-var;
D. fred>var;
Answer:
search your question in gogle
write an algorithm to determine a student's final grade and indicate whether it is passing or failing. the final grade is calculated as the average of 4 marks.
Using the knowledge in computational language in algorithms it is possible to write the code being determine a student's final grade and indicate whether it is passing or failing.
Writting the algorithm :
Start
Take 4 integer inputs for the different 4 subject like math, english, physics, chemistry.
Then calculate the grade based upon the average of four marks .
grade = ( math + english + physics + chemistry ) / 4
if the value of the grade is more than 40, it will print pass otherwise it shows fail.
END
See more about algorithm at brainly.com/question/22984934
#SPJ1
How can structure of a table change in sql. What general types of changes are possible.
One can structure of a table change in sql and the general types of changes that are possible is that:
One can use the MODIFY STRUCTURE to alter the structure of the current table that one is in and this is done by adding or deleting fields.One can also change or alter a field name, width, or that of the data type and this is done by Issuing the MODIFY STRUCTURE command that tends to opens the Table designer, an interactive place in which a person can create or change the structure of a table.How can we modify the structure of a table in SQL?The SQL ALTER TABLE command is known to be the tool that is often used to alter the structure of an existing table.
Note that it is one that can helps to add or delete columns, make or destroy indexes, alter the type of existing columns, and others.
Hence, One can structure of a table change in sql and the general types of changes that are possible is that:
One can use the MODIFY STRUCTURE to alter the structure of the current table that one is in and this is done by adding or deleting fields.One can also change or alter a field name, width, or that of the data type and this is done by Issuing the MODIFY STRUCTURE command that tends to opens the Table designer, an interactive place in which a person can create or change the structure of a table.Learn more about table structure from
brainly.com/question/26125587
#SPJ1
Write a program to print ( SQUARE ) of first 10 natural numbers using while wend loop.
The program that will print (SQUARE) of first 10 natural numbers using while loop is given below.
What is the code that returns the above result?The program that returns the above result is:
public class KboatNaturalNumbers
{
public static void main(String args[]) {
int n = 1;
int sum = 0;
while (n <= 10) {
System.out.println(n);
sum = sum + n;
n = n + 1;
}
System.out.println("Sum = " + sum);
}
}
What is a loop?A loop is a set of instructions that are repeatedly carried out until a specific condition is met in computer programming.
In most cases, a given procedure, such as collecting data and changing it, is followed by a condition check, such as determining whether a counter has hit a predetermined number.
Learn more about loops:
https://brainly.com/question/26568485
#SPJ1
A large banking client recently completed migrating their entire organization to
cloud. They need Accenture to help them assess how secure they are.
What benefit would the client get from involving/utilizing Accenture's security
team?
O implement physical security services to protect access to the Cloud data centers
O industry regulations and legal constraints keep Accenture from helping banks move to the Cloud
avoid only bank specific attacks such as money laundering
assess existing Cloud security policies and processes, protect data, and identify security improvements
O I don't know this yet.
Explanation:
industry regulations and legal contraints keep accenture from helping banks move to the cloud avoid only bank specific attacks such as money laundering.......and identify
security improvements.
The benefit that the client gets from involving/utilizing Accenture's security team is industry regulations and legal constraints keep Accenture from helping banks move to the Cloud. The correct option is B
What is Accenture's security?Accenture is a client data security program. They provide governance to the company, how a company work, architecture, etc. They protect the data of the clients.
Accenture is a company that provides software to protect data and information. The fundamental principles of a data security company are confidentiality, integrity, and availability. So the benefits of joining with Accenture security team will be the safety of the data of the company.
Thus, the correct option is B, industry regulations and legal constraints keep Accenture from helping banks move to the Cloud.
To learn more about Accenture's security, refer to the link:
https://brainly.com/question/27808005
#SPJ2
Mention and discuss specific professional ethics related to augmented reality, artificial intelligence, and the internet of things?
Specific professional ethics related to augmented reality, artificial intelligence, and the internet of things are:
OpacityBiasEmploymentPrivacySingularityAutonomous systemsWhat are the professional ethics of AI systems?Artificial intelligence often has some dilemma that confronts people who are in this field of duty. Some of the daily challenges that they must face are the ones mentioned above. Opacity is a challenge that even the end-users must face. Often, there is the challenge of not knowing how the program came about.
There is a worry about end-users participating in the process of developing some of these systems. People want to be more involved but since machine learning is not easy, many might not know how the results are generated.
Bias is another problem that augmented reality and the other mentioned fields face. Since the output is predictive in nature, there is often the worry that the machine might generate data that impede human freedom.
Learn more about the professional ethics of AI systems here:
https://brainly.com/question/28158916
#SPJ1
The research department of Mark ‘2’ Limited in a recent stakeholder meeting argued that socially responsible businesses win the trust and respect of their employees, customers, and society and, in the end, increase profitability. With the knowledge you have acquired in this course, discuss an organization’s social responsibilities to its key stakeholders, the environment, and the community. EV(8Marks)
The organization’s social responsibilities to its key stakeholders, the environment, and the community are:
The issue of Organizational governance.The issue of Human rights.The issue of Labor practices.The issue of Environment.The issue of Fair operating practices.The issue of Consumer issues.What is an organization's social responsibilities to the environment and the community?Social responsibility is known to be a term that is often used in businesses, and it is often used in line with the maximizing of shareholder value.
Note that this is one that entails that firms should act in a manner that is said to often benefits society. Socially responsible companies should use policies that tend to boast or promote the well-being of society and that of the environment.
Therefore, The organization’s social responsibilities to its key stakeholders, the environment, and the community are:
The issue of Organizational governance.The issue of Human rights.The issue of Labor practices.The issue of Environment.The issue of Fair operating practices.The issue of Consumer issues.Learn more about social responsibilities from
https://brainly.com/question/12951431
#SPJ1
why is it a risk of using you mobile cell phone or external WLAN as a wi-fi connection point?
The risk of using you mobile cell phone or external WLAN as a wi-fi connection point is that it is one that do lacks the right security measures to be able to keep the network safe from intrusion.
What is one of the Risks of linking to a public Wi-Fi network?The Risks of a Public Wi-fi is that a free Wi-Fi security is one that helps a any hacker to be able to put or position themselves between the user and the connection point.
Note that in this case, the user instead of they talking directly with the hotspot, they are known to be sending their information to the hacker, who is said to often relays it on.
Hence, The risk of using you mobile cell phone or external WLAN as a wi-fi connection point is that it is one that do lacks the right security measures to be able to keep the network safe from intrusion.
Learn more about WLAN from
https://brainly.com/question/26956118
#SPJ1
In python please:
Assume the variable authors references a list. Write a for loop that displays each author in
the list.
Answer:
"
for author in authors:
print(author)
"
Explanation:
So, to go through a list, you simply use a for loop as such:
"
for element in list:
# code
"
For each iteration, the current element value will be assigned to the variable "element" in the code, and the code in the for loop will run as well.
So to print out each author in the list, you simply do:
"
for author in authors:
print(author)
"
Also it doesn't matter what I put in between the "for" and "in", it can be any variable name, although I would have to change the "print(author)" so that it prints that variable. The only restrictions you have on this, is that variable names cannot be keywords like "in", "for", "pass", "def", etc...
• Provide a rationale for each part of your design, explaining the problem, approach, and why you made the choices you made.
In the network constructed, we need to use 3 switches to be able to connect a single client PC to the single server. Therefore:
Connect server to switch 1 (225 m)Connect switch 1 to switch 2 (225 m)Connect switch 2 to switch 3 (225 m)Connect switch 3 to client PC (225 m)What is the network about?The maximum distance for ethernet connection is known to be about 100 meters and it is one that is often used in the transmission speeds.
Note that when one has added to the network switches, the distance need to be increased to about 200 meters and thus about 900 meters of distance need to exist between the client PC and the server.
The Ethernet network need to be designed as:
Connect server to switch 1 (225 m)
Connect switch 1 to switch 2 (225 m)
Connect switch 2 to switch 3 (225 m)
Connect switch 3 to client PC (225 m)
Note that Total distance covered = 225 + 225 + 225 + 225
= 900 meters
Therefore, In the network constructed, we need to use 3 switches to be able to connect a single client PC to the single server.
Learn more about Ethernet from
https://brainly.com/question/16947988
#SPJ1
See full question below
• Ethernet network that connects a single client PC to a single server and label the locations of switches and transmission links.
Provide a rationale for each part of your design, explaining the problem, approach, and why you made the choices you made.
Given main(), complete the Car class (in files Car.h and Car.cpp) with member functions to set and get the purchase price of a car (SetPurchasePrice(), GetPurchasePrice()), and to output the car's information (PrintInfo()). Ex: If the input is: 2011 18000 2018 where 2011 is the car's model year, 18000 is the purchase price, and 2018 is the current year, the output is: Car's information: Model year: 2011 Purchase price: 18000 Current value: 5770
The C++ program to show and complete the Car class (in files Car.h and Car.cpp) with member functions to set and get the purchase price of a car is:
Car.h#ifndef CARH
#define CARH
class Car{
private:
int modelYear;
int purchasePrice;
int currentValue;
public:
void SetModelYear(int userYear);
int GetModelYear() const;
void SetPurchasePrice(int purchasePrice);
int GetPurchasePrice() const;
void CalcCurrentValue(int currentYear);
void PrintInfo();
};
#endif // CARH
Car.cpp#include<iostream>
#include<math.h>
#include "Car.h"
using namespace std;
void Car::SetModelYear(int userYear){
modelYear=userYear;
}
int Car::GetModelYear() const{
return modelYear;
}
void Car::SetPurchasePrice(int userPrice){
purchasePrice = userPrice;
}
int Car::GetPurchasePrice() const{
return purchasePrice;
}
void Car::CalcCurrentValue(int currentYear){
double depreciationRate = 0.15;
int carAge = currentYear- modelYear;
currentValue = (int)round(purchasePrice*pow((1-depreciationRate),carAge));
}
void Car::PrintInfo(){
cout<<"Car's information:\n";
cout<<"\t\tModel Year : "<<GetModelYear();
cout<<"\n\t\tPurchase price: "<<GetPurchasePrice();
cout<<"\n\t\tCurrentValue: "<<currentValue;
}
Read more about C++ programs here:
https://brainly.com/question/20339175
#SPJ1
What is the difference between referential and entity integrity
Answer:
Explanation:
Referential integrity is the state in which all values of all foreign keys are valid. Referential integrity is based on entity integrity . Entity integrity requires that each entity have a unique key.
Hope this helped and have a good day
Design a class Dog, making sure it is appropriately encapsulated. The class will have the properties 'name' and 'breed' (both Strings), a constructor, and getters/setters for both fields (called getName, et cetera). Use the constructor and setters to validate input for both properties so that they always have the first letter capital and no others. If the input is invalid, change it into valid format before proceeding. TESTS NEED FIXING
Using the knowledge in computational language in JAVA it is possible to write a code that Design a class Dog, making sure it is appropriately encapsulated
Writting in JAVA:public class Dog {
private String Name,Breed;
public Dog(String N,String B)
{
SetName(N);
SetBreed(B);
}
private String FirstCapitalLetter(String N)
{
String first = N.substring(0, 1);
String second = N.substring(1);
first = first.toUpperCase();
String finalStr = first + second;
return finalStr;
}
public Dog()
{
}
public void SetName(String N)
{
this.Name = FirstCapitalLetter(N);
}
public void SetBreed(String B)
{
this.Breed = FirstCapitalLetter(B);
}
public String getName()
{
return this.Name;
}
public String getBreed()
{
return this.Breed;
}
public static void main(String[] args) {
Dog MyObj = new Dog("tommy","zebraDog");
System.out.println(MyObj.getName()+" "+MyObj.getBreed());
}
}
See more about JAVA at brainly.com/question/12975450
#SPJ1