Design a class named rectangle to represent a rectangle

Assignment Help Basic Computer Science
Reference no: EM131158078

Following the example of the Circle class in Section 9.2, design a class named Rectangle to represent a rectangle. The class contains:

  • Two double data fields named width and height that specify the width and height of the rectangle. The default values are 1 for both width and height.
  • A no-arg constructor that creates a default rectangle.
  • A constructor that creates a rectangle with the specified width and height.
  • A method named getArea() that returns the area of this rectangle
  • A method named getPerimeter() that returns the perimeter.

Draw the UML diagram for the class and then implement the class. Write a test program that creates two Rectangle objects-one with width 4 and height 40 and the other with width 3.5 and height 35.9. Display the width, height, area, and perimeter of each rectangle in this order.

Reference no: EM131158078

Questions Cloud

Example of a programming problem : What is an example of a programming problem that would be difficult, if not impossible, to code without the use of arrays? Describe the problem and write the pseudocode for it using an array.
Draw and label a flow chart the process : draw and label a flow chart the process. In addition to the process provided in the above flow sheet, Additional variables and relationships are defined. They are shown separately here for clarity
Using digital forensic tools or encryption tools : Using digital forensic tools or encryption tools in the virtual lab to extract the text in the picture (10%) and answer the question (10%).
Create a risk-free hedge portfolio can be created : Determine two to three methods of using stocks and options to create a risk-free hedge portfolio can be created. Support your answer with examples of these methods being used to create a risk-free hedge portfolio.
Design a class named rectangle to represent a rectangle : Following the example of the Circle class in Section 9.2, design a class named Rectangle to represent a rectangle. The class contains:
Which platform has a higher market share : Which platform has a higher market share? What are the common security concerns for both platforms? Which platform would you suggest implementing and why?
How globalization affected stakeholder coalition building : Why do stakeholders build coalitions as a means of increasing salience? How has globalization affected stakeholder coalition building? How has globalization of coalitions affected stakeholder salience?
Sketch the energy band diagram for an n p n transistor : Sketch the energy band diagram for an n-p-n transistor in equilibrium.- Sketch the energy band diagram for n-p-n BJT in forward active mode.
Find an article where important information : Find an article where important information was recovered from the recycle bin or the INFO2 folder, summarize the article in your own words, and discuss why an investigator should care about this information. Include the link to the article

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Automate basic system administrator processes

This course introduces basic programming concepts, logic, and scripting language tools used to automate basic system administrator processes. Critical thinking, logic, and troubleshooting are emphasized.

  Write a teacharithmeticframe class that teaches children

When the Next button is clicked, display a new problem. The numbers are limited to two digits.

  Regards to the order of hierarchy

Q1. With regards to the order of hierarchy, what is the best possible scenario in terms of controlling risk?Q2. What is the hierarchy of control from most to least preferred?

  Sketch a normal.probability plot to check the normality

If it is a t test, sketch a normal.probability plot to check the normality of the population.6. State the null and alternative hypothesis.7. Decide on the significance level, alpha.

  Data representation-numbers

Think about the examples we discussed in class - how numbers can be represented in 4 bits or 8 bits, etc. Expand this thinking to 16 bits. If you were given 16 bits to work with, as the basis for your representation scheme:

  Find out how a client can negotiate its use

Assume the server reads each client message with gets() or the equivalent, which reads in a string up to an . What would it have to do even to detect that a client had used command pipelining?

  Implement a database link cheap solution

My idea is to choose the distributed database management system because it is a solution for this small company and if this company plans to grow in the future de distributed database management system is the true solution. I want to develop more ..

  In linux how do i remove from a file all the words

In linux how do I remove from a file all the words containing the characters "mrte'ng"

  Why is a serial schedule considered correct

Why is a serial schedule considered correct?

  Consider a variant of cbc-mode encryption

Consider a variant of CBC-mode encryption where the sender simply increments the IV by 1 each time a message is encrypted (rather than choosing IV at random each time). Show that the resulting scheme is not CPA-secure.

  Compare the size of all three-image files

Open the GIF image the image editor and save it as a JPG - Reopen the same GIF image and save it as a PNG-8 image - Compare the size of all three-image files

  Solve decanting problem using euclidean algorithm

Use Euclidean algorithm to solve decanting problem for decanters of sizes 1317 and 1075. Or we can say, determine integers x and y.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd