Implement all attributes with appropriate data structures

Assignment Help Computer Engineering
Reference no: EM132383884

Competency

In this project, you will demonstrate your mastery of the following competency:

Implement appropriate language constructs for an object-oriented programming language

Scenario

Global Rain logo

You work for Global Rain, a software engineering company that specializes in custom software design and development. As a junior software developer, you are part of a software development team at Global Rain that collaborates to create software solutions for entrepreneurs, businesses, and government agencies around the world.

You have been newly assigned to a development team at Global Rain that is currently working on a project for an innovative international rescue animal training company, Grazioso Salvare. Grazioso Salvare is seeking a software application that will help track rescue animals, sometimes referred to as search and rescue animals, which are obtained and trained by the company to rescue humans or other animals from difficult (or even life-threatening) situations.

A portion of this work has already taken place on this project. Your team lead has assigned you to create one new class and modify the existing classes in the software application. You will deliver these class files to the team lead, who will consolidate them with the work from other team members and present the application to your client.

Directions

Grazioso Salvare has provided you with a specification document detailing its software needs. Other members of the Global Rain development team have started creating the RescueAnimal.java, Dog.java, and Driver.java class files. Your team lead has asked you to modify the existing classes and create a Monkey.java class as your contribution to the team.

Three individuals gathered around a computer

To gain a clear understanding of the client's software requirements, review the Grazioso Salvare specification document in the Supporting Materials section. As you read, pay close attention to the attributes and methods that you will need to implement into the program.

Open the Virtual Lab by clicking on the link in the Virtual Lab Access module. Then open your IDE. Follow the IDE tutorial in the Supporting Materials section to upload Grazioso.zip into your IDE. This zipped folder contains three class files. Once you upload the files, compile the code. Although the program is not complete, it will compile without error.

Read through the code for each class. This will help you understand what code has been created and what code must be modified or created to meet the software requirements.

Before you begin modifying and creating classes, your team lead reminds you to demonstrate industry standard best practices in all your code to ensure clarity, consistency, and efficiency among all software developers working on the program. This includes ensuring the following:

In-line comments denote your changes and briefly describe the functionality of each method or element of the class

Appropriate variable and method naming conventions are used throughout your code

Once you have completed your pre-work, you are ready to begin your assigned tasks. To start, modify the RescueAnimal.java class file by adding accessor and mutator methods for each class variable.

Create the Monkey class, using the specification document as a guide. The Monkey class must do the following:

Inherit from the RescueAnimal class

Implement all attributes with appropriate data structures

Include accessors and mutators for all implemented attributes

Select a method from the Software Requirements section of Grazioso Salvare's specification document. Using the selected method, modify the Driver.java class file to do the following:

Implement the method you have chosen

Add attributes, as needed, to support the required functionality

What to Submit

To complete this project, you must submit the following:

RescueAnimal.java Class File

Modify the RescueAnimal.java class file in accordance with the requirements of the specification document. Be sure to include in-line comments that explicitly identify the changes you made as well as describe the functionality of the code.

Monkey.java Class File

Create a Monkey.java class file that meets the requirements laid out in the specification document. Be sure to include in-line comments that explicitly identify the changes you made as well as describe the functionality of the code.

Driver.java Class File

Modify the Driver.java class file in accordance with the requirements of the specification document. Be sure to include in-line comments that explicitly identify the changes you made as well as describe the functionality of the code.

Dog.java Class File

Submit the Dog.java class file, even though you were not required to make changes to it for this project.

Reference no: EM132383884

Questions Cloud

Explain what collaboration technologies are : Explain what collaboration technologies are and how they function. Then clearly describe three (3) examples of collaboration technologies.
How the knowledge and skills have been applied : Provide a reflection of at least 800 words of how the knowledge, skills, or theories of this course have been applied or could be applied.
Managers face in managing precariousness at work : What challenges do managers face in managing precariousness at work? In your answer, consider the nature of precarious work and the link to HR functions
Risk would your project team face in either : Consider the development of a new software product and compare it to coordinating an event, such as a school dance. What likely forms of risk would your project
Implement all attributes with appropriate data structures : You work for Global Rain, a software engineering company that specializes in custom software design and development.
Address national security and critical infrastructure : Address national security and critical infrastructure needs through objective research that helps government agencies prevent and mitigate terrorist activities
Select a real-life business analytics project topic : Select a real-life business analytics project topic whose real data can be found/gather. This can be a real problem/opportunity.
Explain three key components of a telecommunications : Explain the advantage and disadvantages of using 802.11g for wireless access and usage in an office environment.Explain 3 key components of a Telecommunication.
Combine principles and applications from criminal justice : Combine principles and applications from criminal justice, psychology, communications, business and other disciplines into a framework for hostage negotiation

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd