Prepare a program that utilizes your computer class

Assignment Help Computer Engineering
Reference no: EM132062148

Assignment: First assignment: Step 1: Define a Computer class that can be used to describe your computer. The class must have at least two attributes. One variable must be an integer data type and the other must be a String data type. At least one method should be defined in your class. Step 1a: Prepare a class diagram to illustrate your Computer class. Copy to a Word document. Step 1b: Prepare the source code that implements your Computer class. Give your source code a filename of Computer.java.

Step 2: Prepare a program that utilizes your Computer class. The requirements for the program include prompting the user for input, making a calculation, and printing out the results. Begin by creating your pseudocode for this program. Once you have your pseudocode, copy it into your Word document. You can now begin writing your program.

Your program should prompt the user for information about their existing computer followed by information about a future, more desirable computer. This means that your program will create two instances of Computer class, the first instance reflects the existing Computer, and the second instance reflects the future Computer.

Use the Scanner class for obtaining input from the user keyboard. The program must calculate the difference (improvement) between the existing and future Computer class variables of integer data type. For example, Computer class may contain an integer variable named memory. The value of the memory variable for the existing Computer instance may be 8, while the value for this variable in the future Computer instance may be 10. Calculating the difference would indicate an improvement of 2.

Print to the screen the values for the existing computer class and the desired computer class, along with the calculated improvement.

Your assignment submittal should include your properly commented Java source code for your Computer class as well as for your program.

The first step should be to plan your program. Prepare a Word document that shows your program plan description including class diagram and your pseudocode defining program logic.

The second step should be to write the code based upon your planning document.

Second Assignment: Your consulting firm has been hired to develop a program that meets the following requirements.

Your program must provide a menu to the user. This menu should list three different products of your choice. Once the user selects one product, they should specify which state they are located. The state choices should include CT, VT, WI, CA and WA. State taxes vary for each state (7.5%, 7.8%, 6.8%, 7.2% and 6.4%, respectively). The user should then specify the desired number of cases (assume there are 12 items per case). The appropriate state tax should be added to the total cost of the product (item quantity multiplied by unit price).

Display the following to the user.

Name of the product selected

Number of cases

Number of items

Subtotal (units x price per unit)

State tax (with the percentage and state abbreviation in parentheses)

Total cost (subtotal plus state tax)

a) Your program needs to include at least one repetition statement, one selection statement, Scanner class, and at least one array in this code.

b) Appropriate calculations are necessary.

c) Print out to the user the above bulleted items.

Your assignment submittal should include your Java source code, class files, program design document including class diagrams and pseudocode.

3rd Assignment: You are the lead trainer for the software development team at a large telecommunications company. You have been tasked with preparing a training document that explains the principles of polymorphism, inheritance, and encapsulation. Research these principles and provide examples for each principle, showing how they would be used in software development. Be sure to answer the question of how each principle would be employed in the software development process.

Java programmers use class hierarchies for the purposes of inheritance. For example, given a Tree class, you could define Conifer and Deciduous subclasses that inherit from the parent Tree class, as follows:

143_Tree.png

In your training document explanations regarding inheritance, depict inheritance by using a computer memory hierarchy in a class hierarchy diagram.

Deliverable: Prepare a 6-8-page document that provides detailed explanations for polymorphism, inheritance, and encapsulation. Research computer memory hierarchy and the topic to use in your inheritance explanations at this link, making sure to cite it in APA style if you use specific information from the article. Develop a class hierarchy diagram for the memory hierarchy found at the URL. Include in your class hierarchy diagram at least three subclass levels. Each class and subclass must include at least one variable and one method.

Reference no: EM132062148

Questions Cloud

Replacement of old petroleum refining machine : ABC Gas industries is considering a replacement of an old petroleum refining machine (model 16) acquired 4 years ago with costs of:
Summarize the coso risk management framework : Summarize the COSO Risk Management Framework and COSO's ERM process. Recommend to management the approach that they need to take to implement an effective.
Find the pseudo-american option value : The risk-free interest rate is 0.7% per month, and the stock’s volatility (standard deviation) = 8% per month. Find the pseudo-American option value.
What is the bond promised yield to maturity : What is the bond’s promised yield to maturity? What is the formula ( Hint look in chapter 5) for the present value of a perpetuity?
Prepare a program that utilizes your computer class : Prepare a program that utilizes your Computer class. The requirements for the program include prompting the user for input, making a calculation.
The dollar amount of interest paid each period : In a typical loan amortization schedule ,the dollar amount of interest paid each period.
How gender inequality is perpetuated through schooling : How gender inequality is perpetuated through schooling? Any theories that explain explicitly on this issues in sociology?
What is the delta put option : How many dollars’ worth of the market-index portfolio should it purchase to hedge its position. What is the delta a put option?
Shares of common stock outstanding : Filer Manufacturing has 5100000 shares of common stock outstanding. The current share price is $33.07, and the book value per share is $9.03.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd