Create class to maintain personal budget for a year

Assignment Help Computer Network Security
Reference no: EM1352019

Q1) Create a class to maintain a personal budget for a year. The name of this class is Budget. The data your class will need, at a minimum, are:

an array of categories (like Tuition, Food, Clothes, etc). You should have at least six categories. You can use your own expenses as a guide.

an array for EACH category, storing the total monthly expenses for that category (think - how many items would be in each array?)

Create a constructor for the budget. You should have at least two constuctors - one if you have no expenses to record yet, and one if you are adding your first expense. Remember, each expense has two "fields" - the category name and the amount.

Create a method to add an expense to the budget. This method should know in which month the expense occurred, so figure out how many, and what data type, parameters are needed.

Create a method to print a report of the budget. Each category's current yearly total should appear on a separate line, and the final line would show the total expenses so far spent this year. For instance, a sample output might be:

Expenses as of Nov 4, 2011:

Tuition: $3200
Food: $2600
Clothes: $600
Books: $450
Total expenses: $6850

Reference no: EM1352019

Questions Cloud

Organizational culture and organizational spirituality : Organizational Culture and Organizational Spirituality - Identify the factors responsible for creating organizational culture for transmitting it, and getting it to change.
What is the radius of jupiter : How much acceleration does a 747 jumbo jet of mass 45000 kg experience in takeoff as the thrust for each of four engines is 45000 N.
Provide some examples of how technology is creating employee : Provide some examples of how technology is creating employee/employer rights and policy issues
Suggest a control weakness and test method : Proposed test method. On at least a quarterly basis, internal audit will go to each register and attempt to enter prices different from the list price for a selection of items using different employee names.
Create class to maintain personal budget for a year : Create a class to maintain a personal budget for a year. The name of this class is Budget. The data your class will need, at a minimum.
Risk tolerance levels of investors : Discuss and explain the risk tolerance levels of investors and also describe your risk tolerance level?
Explain carver memorial hospital surgeons : Explain Carver Memorial Hospital's surgeons have a new procedure that they think will decrease the time.
Explain a sample of 50 women is obtained : Explain a sample of 50 women is obtained and their heights and pulse rates are measured
Intrinsic and extrinsic motivation : What are the differences between intrinsic and extrinsic motivation? Do you believe that age and gender are influences in driving one to be more intrinsically or extrinsically motivated? Why or why not?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Dissect an email

Dissect an email you have received. First, get the original, ASCII text of the email, including the headers, and the blank line separating the headers and the body of the email.

  Cyber terrorism

competitive intelligenc, information safekeeping governance, administration, ISO/IEC 27002, Conceptual Framework

  Network security

SLE, ARO, and ALE, behavioural biometric technology, Enterprise Information Security Policy, Issue Specific Security Policy, System Specific Security Policy, firewalls protect network, creating a DMZ during firewall implementation, use of SSL to se..

  Different logon passwords to be five upper-case letters

Computer system 1 needs logon passwords to be five upper-case letters. How many different passwords are there for system 1?

  Identify and describe the organizational authentication

Identify and describe the organizational authentication technology and network security issues

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Digital forensic investigation

computer security incident, Trojan Defence, anti-forensics technique, chain of custody, FAT file system, SQLOracleHacks.txt, SQLOracleAttacks.txt, SQLInjection.html

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Analyse security procedures

Analyse security procedures

  Cryptography assignment

cryptography assignment:  Consider the following problems: (P1) computing the output p from an input n; (P2) computing the output phi(n) from an input n. Which one of the following statements is true?

  Cyber-terrorist crime and security breach

Large Commercial Corporation has witnessed a terrorist security breach of network, and has discovered one laptop on the scene belonging to victim.

  Strong ciphers produced by the enigma machine

Concur with, dispute, or qualify following statement: "The strong ciphers produced by Enigma machine are  result of complex mathematical trapdoor functions used to encrypt messages."

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd