You are a bank manager and you are helping

Assignment Help Basic Computer Science
Reference no: EM13163620

You are a bank manager and you are helping a new bank teller understand the kind of accounts the bank offers. If a customer comes in asking to open a new savings account, the teller needs to ask what kind of account-passbook savings or certificate of deposit-the customer would like to open. Remind the customer that all accounts with our bank are insured by the FDIC. You should explain that all accounts earn some interest; a savings account's interest is compounded monthly. You should assign a unique account number after accepting the customer's initial deposit. If the customer chooses to receive statements electronically, the system will send an e-mail with a monthly statement; if the customer chooses not to, then a paper statement will be sent by mail quarterly.

If savings account is a class, give an example of each of the following as it relates to that savings account. Explain your reasoning behind your example.

o    Superclass

o    Subclass

o    Attribute

o    Method

o    Instance (object)

o    Encapsulation

Reference no: EM13163620

Questions Cloud

Write a function to convert the two dimensional coordinates : write a function to convert the two dimensional coordinates of a point from cartesian system to polar system by using x and y as its parameters
Write a program that computes the amount of money : Write a program that computes the amount of money the computer club will receive from proceeds of their granola bar sales project. Allow the user to enter the number of cases sold and the sale price per bar. Each case contains 12 bars; each case is p..
Write a function to compute the volume of a cone : write a function to compute the volume of a cone by using the base radius r and the height h of the cone as the parameters of the function Vcone = xr^2h/3
Write a program that can be used to determine the tip amount : Write a program that can be used to determine the tip amount that should be added to a restaurant charge. Allow the user to input the total, before taxes and the tip percentage (15% or 20%). Produce output showing the calculated values including the ..
You are a bank manager and you are helping : You are a bank manager and you are helping a new bank teller understand the kind of accounts the bank offers. If a customer comes in asking to open a new savings account, the teller needs to ask what kind of account-passbook savings or certificate..
Achieve these two important features : Java TM is a portable language, and being an object-oriented programming language, it also encourages component reusability. How does Java TM achieve these two important features
Define a class called plot that has private members of lengt : Define a class called Plot that has private members of length and width. Include a constructor and a public function that calculates the area and the length of the boundary of the field.
With replacement order matters : Given an alphabet of size N=9. Write a c++ program that compares the number of possible sequences of the length L that can be generated inder the following assumptions: With replacement order matters, without replacement order matters, and without..
Write a program to keep track of a cd or dvd collection. : write a program to keep track of a CD or DVD collection. This can only work exclusively with either CDs or DVDs since some of the data is different. The data will be stored ina file. The data from the file will be stored ina text file as records. Eac..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create cron file which will regularly perform backup

Create a cron file that will regularly perform the following back ups: performs a level 0 backup once per month and performs a level 2 dump one day per week

  Describe significance of having test coupled with real users

Describe the significance of having test coupled with real users' views of product at the end of development effort,even if it is test of a prototype and not the completely developed software.

  Boolean variable called wantstoppings

After reading the input character, the program shall assign a value to a Boolean variable called  wantsToppings ( true  for a customer who wants toppings,  false  for a customer who does not).

  Explain checksum detect all errors caused by odd number

Let the 32-bit hash function defined as concatenation of two 16-bit functions: XOR and RXOR. Will this checksum detect all errors caused by odd number of error bits? Describe.

  User enters a negative number or a nondigit number

If the user enters a negative number or a nondigit number, throw and handle an appropriate exception and prompt the user to enter another nonnegative number.

  Solve equations and show that no solution exists

Solve the following equations for x and y or show that no solution exists. Show your work (in particular, what division must you carry out to solve each case). (i) 5x + 23  6 mod 47

  Minimum-spanning-tree problem for lp formulation

The minimum-spanning-tree problem is to find an acyclic subset T + E that connects all of the vertices and whose total weight c(T ) = ce is minimized. Write down the dual of your LP formulation.

  Determining asymptotic formula for recurrence equations

Give an asymptotic formula for each of the recurrence equations given below, using big "Θ" rather than just big "O" for better results when possible.

  Design hardware-software driver processor-peripheral device

Design the hardware and software driver that will implement a byte-wide data transfer from your processor to a peripheral device.

  Write advantages of group work on project

When working in group are you generally a leader, a follower, a slacker or some other role? Describe. Write down two advantages of group work and two disadvantages of working on project in group?

  Encryrption of some unknown

Assume (A1,B1) is an encryrption of some unknown m1. Prove that (A1,B2g^(m2) mod p) is a valid  encryption of m1 + m2 mod p. More generally, if (A2,B2) is an encryption of m2, what is (A1A2  mod p,B1B2 mod p) an encryption of?

  Explaining components of computing environment

According to Raggad's taxonomy of information security, a computing environment is made up of ?ve continuously interacting components namely; activities, people, data, technology and networks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd