Structure of the new program - activity scheduler program

Assignment Help Computer Engineering
Reference no: EM131285604

Class Factory - Activity Scheduler

For this assignment you will modify the Activity Scheduler program, changing it to use the Class Factory design pattern. The behavior of the program is exactly as before. The structure of the new program is shown below:

1103_figure3.jpg

As before, assume that the user will enter the correct type of input in response to the prompts.

Classes IActivity, Activity, Name, LanId, and PhoneNumber

These classes are the same as before.

Class ScheduledActivity

This class is almost the same as before, except that now it both creates and destroys the IActivity objects:
- The constructor argument is now a pointer to a Factory object (not a pointer to an IActivity object). The constructor does exactly what it did before, except that it sets the attribute ‘activity' by invoking the Factory method NewActivity() (instead of setting it from the argument).
- The destructor now deletes the attribute ‘activity'.

Class Scheduler
This class is almost the same as before, except that it passes Factory objects to ScheduledActivity:
- Method addActivity() now takes a parameter that is a Factory* (instead of an IActivity*). It passes this parameter to the ScheduledActivity constructor.

Class Factory
This class is the interface for the four subclasses below. It has the following:
- A pure virtual method NewActivity(), which returns an IActivity*.
- A virtual destructor with an empty implementation (provided in the class declaration).

Classes ActivityFactory, LanIdFactory, NameFactory, and PhoneNumberFactory
These four classes implement interface Factory. Each provides an implementation of method NewActivity(), returning a new object of the appropriate type. (For example, ActivityFactory::NewActivity() returns a new Activity object, LanIdFactory::NewActivity() returns a new LanId object, etc.)

File MainControl.cpp, method main
This method is simpler than before, since it is no longer responsible for creating and destroying activities. Instead it creates four Factory objects (NameFactory, LanIdFactory, PhoneNumberFactory, and ActivityFactory). It passes each of these to the scheduler's addActivity() method, and deletes all four Factory objects. Then it calls the scheduler's run() method, and returns 0.

General Information
Make sure you follow all coding conventions.

Make sure you have no memory leaks: delete any objects that are no longer reachable by any pointer.

Reference no: EM131285604

Questions Cloud

Current emergency plan : Assume that your selected agency received funding to expand its current emergency plan, which involves the Department of Corrections and Department of Juvenile Justice. Provide a one-page email memorandum that introduces the plan, the role of the ..
Who do you think uses internet dating services : Who do you think uses Internet dating services? What, if anything, should dating services do to protect their clients?
Determine the steadystate amplitude of the block : For the system shown, m = 5.5 kg, k = 2300 N/m, and c = 37 N · s/m. The horizontal displacement imposed on the shaker table B is y(t) = 2.5 sin 18t mm, where the time t is measured in seconds. Determine the steadystate amplitude of the block.
Philosophical and legal issues this case raises : Review "The Katrina Breakdown" in Chapter 3. Setting aside the philosophical and legal issues this case raises, identify and explain two to three management or efficiency arguments for and against a more centralized response to large national disa..
Structure of the new program - activity scheduler program : Modify the Activity Scheduler program, changing it to use the Class Factory design pattern. The behavior of the program is exactly as before.
The ways marketing has helped our political process : What are some of the ways marketing has helped our political process? What are some ways the marketing of politicians might have an adverse effect on our government?
Human resource competency study aid : How would the HR skills identified in the Human Resource Competency Study aid an HR executive in assessing potential outsourcing partners?
Find the damping coefficient of each spring : An electric motor and its base have a combined mass of M = 12 kg Each of the four springs attached to the base has a stiffness k = 480 kN/m and a viscous damping coefficient c.
Why did black actors play in roles that were not necessarily : How were black actors portrayed in independent black films? Why did black actors play in roles that weren't necessarily positive stereotypes? What is meant by the "No Negro" era?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd