Explain why java does not support multiple inheritance, JAVA Programming

Assignment Help:

Question:

(a) Differentiate between the following terms using suitable examples of your own:-

(i) inheritance v/s composition
(ii) subclass v/s superclass
(iii) software re-usability v/s data encapsulation

(b) Discuss why casting a superclass reference to a subclass reference is potentially dangerous. Use appropriate examples to support your answer.

(c) (i) Explain why Java does not support multiple inheritance.

(ii) What feature of Java helps to simulate multiple inheritance. Use a suitable example of your own to illustrate your answer.

(d) (i) Write down an inheritance hierarchy for classes Quadrilateral, Trapezoid, Parallelogram, Rectangle, Square. Use Quadrilateral as the
superclass of the hierarchy.

(ii) Identify a maximum number of subclass levels in your hierarchy.
(iii) The private data members of Quadrilateral should include the (x,y) coordinate pairs for the four endpoints of the Quadrilateral.

(iv) Write down a driver program that instantiates and displays objects of each of these classes.


Related Discussions:- Explain why java does not support multiple inheritance

How we use a car object in a different class, How we Use a Car object in a ...

How we Use a Car object in a different class ? class Car { String licensePlate; // e.g. "New York 543 A23" double speed; // in kilometers per hour double maxSpeed;

Explain java.lang.string library in java, Explain java.lang.string library ...

Explain java.lang.string library in java? Strings are objects. Specifically they're instances of the class java.lang.String . This class has several methods which are useful f

Explain what is naming applets in java applets, Explain what is Naming Appl...

Explain what is Naming Applets in java applets? You can give an applet a name by using the NAME attribute of the APPLET element. This allows communication between different app

Ejb container security?, EJB elements operate inside a container environmen...

EJB elements operate inside a container environment and rely heavily on the container to give security. The four key services needed for the security are: 1. Identification :

Project 7, Iterate through list of Fish. For each fish that isAlive, do th...

Iterate through list of Fish. For each fish that isAlive, do the following: * * 1. If this fishIsSurroundedByRocks, DO NOTHING, and move on to the next fish. * (This f

Program to calculate the value into hours and minutes, Specifically, you'll...

Specifically, you'll create a program that will hold minutes worked and assign a value. Calculate the value into hours and minutes. Display the result as shown in Figure 2. Reme

Dropbox calendar, code in dropbox calendar and loop for feruary leapyear

code in dropbox calendar and loop for feruary leapyear

Explain pop, SMTP (Simple Mail Transfer Protocol) permits two mail servers ...

SMTP (Simple Mail Transfer Protocol) permits two mail servers to communicate using a easy language, and gives a step-by-step protocol for exchanging information. SMTP delivers m

Java , what is thread synchronization

what is thread synchronization

What are the different scopes for java variables, What are the different sc...

What are the different scopes for Java variables? The scope of a Java variable is explained by the context in which the variable is declared. Therefore a java variable can have

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd