In which case there are no pricing changes

Assignment Help Basic Computer Science
Reference no: EM13219763

A friend of yours owns two houses at Football City, the site of the next Super Bowl. Your friend wants to rent those two houses for the Friday, Saturday, and Sunday of the Super Bowl weekend. House #1 has 3BR (3 Bedrooms), 3BA (3 Baths), and house #2 has 1 BR, 1BA. For this project, concurrency is not an issue; you should assume that two customers will never access your system at exactly the same time. You should also assume that the management-side software and the customer-side software will never run at the same time. We can assume that we run the management-side software first, then the customer-side software. This friend has asked you to build a file-based reservation system enabling the following: A. Management-side software: Your friend controls the rental price and may change it every day. He/she sends you a change file every day; this file may be empty, in which case there are no pricing changes. If the file is not empty, pricing has changed (for one or more houses, or for one or more days). You are in charge of this project, and therefore, you are in charge of specifying the file format; however, this must be simple text file because your friend is not a computer person. You do not have to simulate the act of sending the file by your friend; you should assume that the file is a text file in your directory and that you only need to read the data. Your management-side software needs to read this file and update a different file, with which you control the reservation system. You can create your own design for the structure of that file. Of course, prices for existing reservations cannot be changed. Finally, your management-side software should write to a file the status of the reservations; that is, which house is rented to whom, when, and for what price.

Reference no: EM13219763

Questions Cloud

Use one supper class and two sub classes : Give a UML example illustrating aggregation. Include classes, fields, methods, instance fields, etc.Use one supper class and two sub classes.inlcude pseudo code for at least one method of each class l. Also explain the whole part relationship and ..
State the difference in density of the air at the top : What is the difference in density of the air at the top and bottom of the room? (Hint: assume that the volume and pressure is the same, if you like, you can take the volume to be 1L and the pressure to be 1atm, but if you think carefully you may r..
Discuss what makes a successful information security : Discuss what makes a successful information security awareness program and how a security awareness program can be one of an organization's most powerful protection strategies.
Calculate the percentage changes using the midpoint formula : Suppose that the price elasticity for hip replacement surgeries is 0.2. Further suppose that hip replacement surgeries are originally not covered by health insurance and that at a price of $50,000 each, 10,000 such surgeries are demanded each year..
In which case there are no pricing changes : Finally, your management-side software should write to a file the status of the reservations; that is, which house is rented to whom, when, and for what price.
What is maximum drug developer should be willing to invest : Suppose a drug developer just received a patent on a new chemical compound, which could be used in developing a new drug to control cholesterol. The developer knows (with certainty) that it could successfully develop the compound into a safe
Explain a cobalt compound has an observed magnetic : A cobalt compound has an observed magnetic moment of 5.2 B.M. What can you deduce about the compound?
How much will venesa be able to spend on health insurance : The Federal tax code allows businesses but not individuals to deduct the cost of health insurance premiums from their taxable income. Consider a company named HeadBook that could either spend $5000 on an insurance policy for an employee named Vane..
What is called a whitespace character : Given an int variable modelYear write a statement that assigns true to norecall if the value of modelYear does NOT fall within the two recall ranges and assigns false otherwise. Do not use an if statement in this exercise!

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determine size of one minute mono audio file

Digital audio transducer samples real sound at the rate of 40 kHz and assigns 8 bits to each sample. Determine the size of one minute mono audio file?

  Consider a 2-dimensional mesh

Consider a 2-dimensional mesh with n^2 nodes. The shortest distance that a message travels in the mesh is 1 link; the longest distance is 2(n-1) link

  Design a plan for email content which was leaked

Suppose that you feel that your (or your boss's) email content was always leaked (e.g., some confidential information in your email was known to many others). Design a plan for this investigation.

  Simulate the operation of a simple robot

Write a program to simulate the operation of a simple robot . the robot moves in four directions :forward, right,left. the job of the robot is to move items and place it in the right slots in each station

  When merge sorting you could recursively

Suppose when merge sorting you could recursively sort four sub-lists instead of two and still merge them all in linear time. Give the recurrence relation that describes this.

  Explore and estimate software programs

Explore and estimate software programs based on following criteria: Needs assessment -- Why would the prospective user require program? Write down the features of the program?

  Determine the expected number of empty bins

Assume that n balls are tossed into n bins, where each toss is independent and ball is equally likely to end up in any bin. Determine the expected number of empty bins?

  Design a module

Design a module, using pseudocode, named getNumber, which uses a reference parameter variable to accept an Integer argument. The module should prompt the user to enter a number and then store the input in the reference paramter variable.

  Explain computer viruses spread by email or other methods

Explain computer viruses spread via email or by other methods. What negative consequences can they have on an organization's operations?

  Explaining security risks for computing infrastructure

In your new position at XYZ Corporation, you have been asked to lead risk assessment team. As part of project to assess security risks for computing infrastructure.

  In the k-bounded spanning tree problem

In the k-bounded spanning tree problem you are given an undirected graph G(V,E). The goal is to decide whether or not G contains a spanning tree T(V,E') such that each vertex v in V has degree at most k in the spanning tree T.

  Program to randomly select three numbers

Write a program to randomly select the numbers of 3 finalist to recieve a prize. Make sure not to pick the same number twice.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd