Questions
1. Create a class Car with data: Name, Price, Production and properly methods. 2. Create another...

1. Create a class Car with data: Name, Price, Production and properly methods.

2. Create another class named GenericCar with a parameter of the T type. This class manages a collection of object T (may be LinkedList) named a. Implementing some methods for GenericCar:

  • Add: add new item of T to a
  • Display: display all items of a
  • getSize: return the number item of a
  • checkEmpty: check and return whether a is empty or not
  • delete(int pos): remove the item at the position pos of a.

Write a program to use GenericCar as above menu.

Make your own main program to test all above methods.

In: Computer Science

The web has been around for quite some time. It has not always been the robust...

The web has been around for quite some time. It has not always been the robust information resource that we find ourselves using today. Many parts of the web have evolved into technologies that find ourselves needing to use more often than not. How do you feel websites have changed over the last decade? What is new about how they work and what we can do with them?

In: Computer Science

Code in Java 1. Create a class Flower with data: Name, Price, Color and properly methods....

Code in Java

1. Create a class Flower with data: Name, Price, Color and properly methods.

2. Create another class named ListFlower. This class manages a collection of Flower (may be LinkedList) named a. Implementing some methods for ListFlower:

  • Add: add new item of Flower to a
  • Display: display all items of a
  • sort(): sort as descending by Price and display all items of a
  • search(Flower f): check and return whether f is exists in a or not.
  • delete(int pos): remove the item at the position pos of a.

Write a program to use ListFlower as above menu.

Make your own main program to test all above methods.

In: Computer Science

REGARDING RISK ASSESSMENT What are the different types of disclosure or brokerage of information? What is...

REGARDING RISK ASSESSMENT

What are the different types of disclosure or brokerage of information?
What is the probability of disclosure/brokerage of information (in terms of high, medium, low)? What is the potential impact of disclosure/brokerage (in terms of high, medium, low)? Explain. Determine the risk scale of disclosure/brokerage of information.

PLEASE MAKE COPY PASTE AVAILABLE

MUST BE 250 WORDS

In: Computer Science

What is the main contribution include in the Ransomware?

What is the main contribution include in the Ransomware?

In: Computer Science

Create a program that when run, prompts the user to enter a city name, a date,...

Create a program that when run, prompts the user to enter a city name, a date, the minimum temperature and the maximum temperature.

Calculate the difference between the maximum temperature and the minimum temperature. Calculate the average temperature based on the minimum and maximum temperature. Print out the following:

  • City name
  • today's Date
  • minimum temperature
  • maximum temperature
  • average temperature
  • difference between minimum and maximum

The following is a sample run, user input is shown in bold underline.

Enter City Name: Palm Desert

Enter Date: Feb 4, 2020

Min temp: 3

Max temp: 18

Temperature statistics for Palm Desert

For: Feb 4, 2020

Min: 3.0

Max: 18.0

Difference: 15.0

Average: 10.5

please answer in java language

In: Computer Science

Some database administrators assume their role managing existing databases have already been fully designed and implemented....

Some database administrators assume their role managing existing databases have already been fully designed and implemented. Throughout the career of a database administrator it is likely, however, that there will be need to design a new database for the organization. There are an array of factors that influence the approach a database administrator will take when designing a new database, including the objectives of the database, the data in which it will be stored, the location and activities of the database users, and the degree to which the data collected and stored in the database will be integrated with other organizational data.

There are also external factors that might influence database design, including data security and privacy regulatory requirements, standard practices, and benchmarking objectives.

Construct a 2–3 page paper that covers the following:

•Evaluate the internal factors that influence the design choices for a new database that will be used to collect and store a comprehensive inventory of existing IT equipment.

•Evaluate the external standards, practices, or regulatory requirements that will influence the design choices for a new database that will collect and store a comprehensive inventory of existing IT equipment.

Describe the steps involved in designing a new database that will be used to collect and store a comprehensive inventory of existing IT equipment.


In: Computer Science

Surfer Sam’s has a sale this Saturday, you need to reprogram the tills for the sale....

Surfer Sam’s has a sale this Saturday, you need to reprogram the tills for the sale. Write the Java code.

Ask for a product price. If the total price is less than or equal to $100, apply a discount of 3% to the total sale. If the price is more than $100 and less than or equal to 500, apply a discount of 5% to the total sale. If the price is higher than $500, apply a discount of 8% to the total sale. Add the GST and print out the: original price, the discount amount, GST and final price. The following is a sample, user input is shown in bold underline:

1st Sample Run:

Enter the price: 699.90

Description              Amount

Price                    699.90

% Discount                 8.00

Discount                  55.99

Summary                  643.91

GST                       32.20

Final Price              676.10

2nd Sample Run:

Enter the price: 29.95

Description              Amount

Price                     29.95

% Discount                 3.00

Discount                   0.90

Summary                   29.05

GST                        1.45

Final Price               30.50

Solve this problem using doubles.

please answer in java

In: Computer Science

REGARDING RISK ASSESSMENT What are the control measures currently in use to protect against disclosure/brokerage of...

REGARDING RISK ASSESSMENT

What are the control measures currently in use to protect against disclosure/brokerage of information?
What are the vulnerabilities related to information disclosure/brokerage found by the risk assessment team?

PLEASE MAKE COPY PASTE AVAILABLE

MUST BE 250 WORDS

In: Computer Science

Write a program to validate Canadian Postal Codes. A postal code must follow the pattern of...

Write a program to validate Canadian Postal Codes. A postal code must follow the pattern of L9L9L9 where:

  • L is a letter
  • 9 is a digit

Your program should continue accepting postal codes until the user enters the word “exit”.

Sample run (user input is shown in bold underline):

Enter a postal code: T2T-3X7

Postal code wrong length, format L9L9L9

Enter a postal code: T2T3AA

Postal code has letters where there are supposed to be digits

Enter a postal code: T2T358

Postal code has digits where there are supposed to be letters

Enter a postal code: T2T3A8

Postal code is valid!

Enter a postal code: exit

please answer in java

In: Computer Science

REGARDING RISK ASSESSMENT What’s the recommendation by the risk assessment team? What are the final decisions...

REGARDING RISK ASSESSMENT

What’s the recommendation by the risk assessment team?
What are the final decisions made by HGA management? Justify their decisions based on cost benefit analysis.

PLEASE MAKE COPY PASTE AVAILABLE

MUST BE 250 WORDS

In: Computer Science

Design a Ship class that has the following members: • A member variable for the name...

Design a Ship class that has the following members:

• A member variable for the name of the ship (a string)
• A member variable for the year that the ship was built (a string)
• A constructor and appropriate accessors and mutators
• A virtual print function that displays the ship’s name and the year it was built.

Design a CruiseShip class that is derived from the Ship class. The CruiseShip class
should have the following members:

• A member variable for the maximum number of passengers (an int )
• A constructor and appropriate accessors and mutators
• A print function that overrides the print function in the base class. The CruiseShip class’s print function should display only the ship’s name and the maximum number of passengers.

Design a CargoShip class that is derived from the Ship class. The CargoShip class
should have the following members:

• A member variable for the cargo capacity in tonnage (an int ).
• A constructor and appropriate accessors and mutators.
• A print function that overrides the print function in the base class. The CargoShip class’s print function should display only the ship’s name and the ship’s cargo capacity.

After you have created these classes, create a driver program that defines an array pointers to your abstract base class Ship. It should present a menu to allow the user to enter a Cruise Ship or a Cargo Ship. When the user selects cruise ship, it should prompt them for the name, year built, and the number of passengers. When the user selects cargo ship, it should prompt them ffor the name, year built, and the maxium cargo load (in tons). Each selection should create an object that can be stored into your array of pointers. When the program exits, it should display the history of the session which includes each of the objects the user created which will be a combination of cruise ships and cargo ships. An example output is shown here:

Menu

1. Cruise Ship
2. Cargo Ship
3. Quit
Please make your selection: 2

Please enter the name of the ship: Big Bertha
Please enter the year the ship was built: 1975
Please enter the capacity (tons): 50000

Menu

1. Cruise Ship
2. Cargo Ship
3. Quit
Please make your selection: 1

Please enter the name of the ship: Disney Magic
Please enter the year the ship was built: 1998
Please enter the capacity (passengers): 2400

Menu

1. Cruise Ship
2. Cargo Ship
3. Quit
Please make your selection: 3

The history of your session is

Selected Cargo Ship

Name: Big Bertha
Year: 1975
Capacity (tons): 50000

Selected Cruise Ship

Name: Disney Magic
Year: 1998
Capacity (passengers): 2400

In: Computer Science

"swift Create a SwiftUI project named DogBreeds based on the Contacts app. The app should be...

"swift Create a SwiftUI project named DogBreeds based on the Contacts app. The app should be named DogBreeds. The app will display 10 dog images and names in a lis"

In: Computer Science

REGARDING RISK ASSESSMENT What are the control measures currently in use to protect against network threats?...

REGARDING RISK ASSESSMENT

What are the control measures currently in use to protect against network threats? What are the network-related vulnerabilities found by the risk assessment team?

PLEASE MAKE COPY PASTE AVAILABLE

MUST BE 250 WORDS

In: Computer Science

Need Advise, As a Student in Business Analyst and Data mining what steps should i take...

Need Advise, As a Student in Business Analyst and Data mining what steps should i take as a student to make myself more competitive for a current job market in the U.S.

Thanks.

In: Computer Science