A) Add these features to the Circle.java class from the lecture examples: • Make the 'color' attribute private • Make a constructor with two attributes for assigning a value to radius and color when the Circle is instantiated. add any missing setters or getters for the radius and color attributes.
Q: In your own word what is Cybersecurity, Threat, Risk, & Vulnerability?
A: CYBERSECURITY: Cyber security is the use of technology, procedures, and policies to prevent cyber…
Q: Describe the requirement for a continuous information security maintenance programme.
A: Intro We store and access information on various devices like computers, mobiles, records, etc.…
Q: In the physical layer, multiplexing is done via TDM, FDM, and CDM. Is it possible to explain the…
A: Multiplexing Multiplexing is a common networking technology that combines numerous analogue and…
Q: What is the most popular routing protocol used by Autonomous Systems to route traffic within…
A: Introduction: Border Gateway Protocol (BGP) is a standardised outside gateway protocol used on the…
Q: Write a program that prompts the user to enter two integer numbers A and B. The program must check…
A: Using if else and for loops we can solve this problem.
Q: Q5-What will be the output of the following code?A=100; if(A>99) clear A; end A never gets stored in…
A: Given: What is the output of the following code .
Q: What is the function of information security management in today's society?
A: Intro Information security management describes the set of policies and procedural controls that IT…
Q: Where will the network's physical and virtual networking equipment be kept?
A: Given: It is the physical devices that enable the hardware on a computer network to connect with and…
Q: --Problem -3 -Create a flowchart design that depicts the solving of the following problem: Asks user…
A: Please refer to the following step for the complete solution of the problem above.
Q: Do you agree that technological developments usually result in better games? What is your…
A: Better games are always the outcome of technological advancements.
Q: Pointer design considerations are discussed. The majority of pointers in computer languages are…
A: Thank you _______ This is called levels of pointers. According to ANSI C, each compiler must have…
Q: Computer science Describe the four fundamental components of counter-controlled iteration.
A: Introduction: When the user knows how many times the statement block should be executed, a…
Q: There are several needs (goals) for information security; please identify three of them.
A: Intro Requirements for Information Security: Information Security is the process of securing…
Q: The current state of information security management
A: Introduction: Information security management defines and manages controls that ensure a corporation…
Q: Summarize information security and related upgrading requirements on a single slide.
A: Intro Overview of information assurance and the associated upgrade needs .Information Assurance
Q: System Description Data Dictionary (Description of each table and attribute) Conceptual Model…
A: A data entity is a data item or component. In an ER diagram, an entity is represented by a…
Q: This is possible because computers nowadays are so powerful. What factors, and what evidence, have…
A: Computer Education: Online education and research are both possible with computers. Students may…
Q: List and describe FOUR (4) data mining and predictive analysis applications.
A: List and describe FOUR (4) applications of data mining Answer: Applications of data mining are:…
Q: ) Using booth algorithm, find out the following signed multiplications: 7 x (-5) 2) Convert the…
A: Note:- As per our guidelines, we are allowed to answer only first question of multiple questions.…
Q: In what ways does the Unix operating system excel and where does it falter?
A: 1 - Ecommerce - Big online stores use UNIX or Linux servers to host their websites. 2- Portable - It…
Q: An example of how the knowledge of the existing cybersecurity defences may help a company to…
A: The answer is as follows.
Q: Why does a good information security programme start with a policy? List and briefly describe three…
A: Introduction: According to the question, we need to know why a good information security programme…
Q: What exactly are security control families?
A: Intro security controls are to avoid security risks. The security control families are divided to…
Q: Assume there is a villiage with 3 houses whose owner's strongly dislike eachother. So they wish to…
A: Ans:) I have given two diagrams with justification below. please check according to requirments. The…
Q: When it comes to installing and administering both physical and virtual networking devices across a…
A: SDN controller: For better network administration and application performance, software-defined…
Q: Describe the flaws with the pointer's design. Which variable may be pointed to using pointers in…
A: Introduction: Here we are required to explain flaws with the pointer's design.
Q: Conver to MIPS code: d[3] = d[2] + a %3D
A: # let consider d is stored in $s0# and 'a' in stored in $s1# first load the d[2]lw $t0, 2($s0) # t0…
Q: Why are Firewalls required in a system? Explain different types of firewalls.
A: A Firewall is a network security device that monitors and filters approaching and outgoing network…
Q: Knowing the cybersecurity defences available may help companies select risk mitigations as part of a…
A: The answer is as follows.
Q: What is the hash function's purpose? And how exactly does it work?
A: Introduction: The hash function is a delicate mathematical technique that is crucial in obtaining…
Q: Hackers and their and companion viruses are an increasing problem, especially on the internet. What…
A: Keep your gadget secure Try to download suggested refreshes from your gadget's producer or working…
Q: Define the many forms of information security policies.
A: Intro What are Information Security Policies Those security policies that state or describes the…
Q: How would you describe the aim of a system security policy as an information systems security…
A: Intro A brief, high-level statement defining what is and is not permitted during the operation of…
Q: Explain your response. Is it True or False? - Regular member functions are slower than virtual…
A: A virtual function is a member function that is declared within the base class and is overridden by…
Q: n FDM from a TDM. A one-page summary of your findings would be much appreciated.
A: Introduction: TDM stands for Time Division Multiplexing and is a multiplexing technology. TDM can…
Q: Write (and clearly label) the pre-, in-, and post-order sequences of traversal for the given tree in…
A: To determine the pre-order, in-order and post-order traversal of the tree, there are different…
Q: Computer science WHAT ARE THE BENEFITS OF USING CRYPTOCURRENCY PRACTICALLY?
A: Introduction: Cryptography is a means of securing communication in the presence of malicious third…
Q: Explain and demonstrate the three main methods of file management.
A: The three primary file management techniques are as follows: Ordinary files are used to store data…
Q: Why neural network is very suitable for federated learning? Select one: a. Federated Learning can…
A: The above question is solved in step 2:-
Q: Create a form of the hybrid merge-join method that is appropriate for the situation in which both…
A: Hybrid merge join algorithm is a version of the merge join procedure, which is done on unsorted…
Q: Provide a normalized version of the Index metadata relation and explain why utizing it will result…
A: Metadata: There are a number of methods to talk about metadata. In other words, data that tells us…
Q: A single LAN connects 200 workstations and four servers through switches. You're noticing too many…
A: The answer is given in the below step
Q: Provide a normalized version of the Index metadata relation and explain why utilizing it will result…
A: Normalization: Normalization is a scaling technique that shifts and rescales values to make them…
Q: When it comes to network configuration and management, where will physical and virtual networking…
A: It's unclear exactly where the network's hardware and software management infrastructure will be…
Q: On the Internet, where can you get credible information?
A: Sorts of sources There are three sorts of sources: essential, auxiliary, and tertiary. Essential…
Q: What are some examples of wireless architectures? When would you utilise each?
A: Introduction: We must pick which wireless network will be constructed in the network region while…
Q: What is the difference between the Kernel and the Shell in the context of Unix?
A: The question is to write the difference between the Kernel and the Shell in the context of Unix.
Q: what the term "salt" implies in the context of cryptography You should talk about how passwords are…
A: Introduction: Cryptography is the process of converting data into scrambled code that can be decoded…
Q: Is hacktivism distinct from other forms of cybercrime in terms of cybercrime and terrorism?
A: Answer: Hacktivism is the peaceful application of unlawful or legally unclear digital tools for…
Q: Write a program that reads from the user two integers of three digits each. The program finds the…
A: import java.util.Scanner;//to readinputpublic class Main{ public static void main(String[] args) {…
~Using java~
Having problems with sovling the three bullet points
~The second screenshot is the circle.java code we are using
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- Information: Java Script There are two types of accounts - S for short term contract and L for long term contract. 3.1 Create an Employee objects project. Create an Employee class and use the provided UML diagram to code the instance fields, constructors and methods. 3.1.1 Both constructors must increment the static numberOfEmp field by one. Both constructors must call the setEmpCode() method to compile a code for the employee. Both constructors must call the setCommission() method. 3.1.2 setEmpCode() method: The empCode must be constructed in the following way: First character is the type of contract Next three characters a random 3 digits Add a backslash and the number of objects value to the code NOTE: You have to use the Random class in your code (See Ch 9). Do NOT use the Math.random() method. Example of code: S781/1 Explanation: Short term contracts (S), 781 is the 3-digit random value, first employee object. 3.1.3 setCommission() method: Assign a basic amount to the…Create a program that exhibits inheritance. Software Requirements: Latest version of NetBeans IDE Java Development Kit (JDK) 8 Procedure: 1. Write a simple information system that will store and display the complete information of a student, faculty, or employee. 2. Create four (4) no-modifier classes named Person, Student, Faculty, and Employee. 3. Create a public class named CollegeList. This class shall contain the main method. 4. Refer to the UML Class Diagram for the names of the variables and methods. The (-) symbol represents private variables, while (+) represents public method. This should be the sequence of the program upon execution: a. Prompt the user to select among Employee, Faculty, or Student, by pressing E, F, or S. b. Ask the user to type the name and contact number. c. For Employee, ask the user to type the employee's monthly salary and the department where he/she belongs to (Ex. Registrar). Then, display name, contact number, salary, and department. For Faculty, ask…Decision Structures Do this for jGrasp This program will calculate the cost of having a framed picture for customers. After the customer enters the appropriate prompted values, the program will calculate the cost of the framing based on the specifications outlined below. The program should allow the user to order a second frame if desired. Define a java instance class as described below. Save the class definition in a file with an appropriate filename. Class Name: Frame Instance Variables: length – float (representing inches) (Fields) width – float (representing inches) type – char (valid values P, W, or M for Plastic, Wood, or Metal) matte – integer (representing the number of matting layers) Static Variable: count – tracks the number of frames created Instance Methods: A constructor that accepts no arguments and sets default values as follows: the length to 8,…
- Create a java class person with following data members. Age: SHOULD BE VISIBLE TO ALL CLASSES. Name: SHOULD BE VISIBLE ONLY INSIDE THE CLASS AND TO INHERITED (DERIVED) CLASSES OF PERSON. Derived a class student from Person and add one data member name of the school (That should be visible to all the classes in the application).Create three files: Student.java - Abstract Class definition ENGRStudent.java - Derived Class definition Client.java - Contains main() method (1) Implement the abstract Student class with the following specifications: 3 private members String name int ID int yearAdmitted 1 constructors (public) A constructor with that accepts the student’s name, ID, and yearAdmitted as arguments. These values should be assigned to the object’s name, ID, and yearAdmitted fields. 2 public member methods A method named toString() that returns the values of name, ID, and yearAdmitted with String data type A abstract method name getRemainingHrs with int data type (2) Implement the derived class ENGRStudent class with the following specifications: 3 final private members with the following values : int MATHSCHRS=32 int MAJOR_HRS=66 int GenEdHrs=29 3 private members: int mathScHrs; int majorHrs; int GenEdHrs; 1 constructors (public) A constructor that accepts the student’s name, ID, and yearAdmitted…Part – 3 (Abstract Class and Interface) Consider the Class that you designed in Part#1 of this project and do the following:1. Implement the Comparable and Cloneable interface for your class.2. The Test class should create 5 instances (objects) of your class.3. Store these instances in Array and ArrayList4. Show the demo of sorting these objects stored in Array and ArrayList Include the below in your project report: 1. Screenshot of relevant (Comparable and Cloneable) outputs.2. Code for all classes. part1: Part 1) CODE import java.util.ArrayList; import java.util.Arrays; import java.util.List; class Person { private String fName; private String lName; private String gender; private boolean isHungry; public Person() { fName = "John"; lName = "Doe"; gender = "Male"; isHungry = false; } public Person(String fName, String lName, String gender, boolean isHungry) { this.fName = fName; this.lName = lName;…
- Data structure & Algrothium java program Create the following classes: 1. Name.java object class containing two strings attributes first name and last name (and appropriate constructors, setters/getters)2. NicePerson.java object class containing the name object and an ArrayList of string to store the list gifts ( and appropriate constructors, setters/getters). This class would extend the attached NicePersonInterface.java3. Santa.java object class containing one ArrayList of Names to store the naughty names. Another ArrayList of NicePerson to store the nice names and gifts. Add atleast 4 names in each list and display all information.Class: Square Create a class called "Square", which is inherited from“TwoDimensionShape” class. The "Square" class is used to calculate theArea and the Perimeter of square shapes when their side-length is given, or in contrast,finding the side-length of the square when the Area or the Perimeter of the square is given.The specifications of this class are below. Data Members (Attributes): All are private. sideLength: the sidelight (L) of the square. Methods/Operations/Getters/Setters: Default Constructor: when creating an object this constructor must set the side-length of the square by calling the method setSideLength(). Also, this constructor willcall the findArea() and the findPerimeter() in addition to summaryPrint() to calculateand print all needed information. User-Defined Constructor: when creating an object this constructor shouldfind the side-length of the square by calling the method findSquareSideLength()and pass the Area or the…Project in Java programming language : Choose an enterprise and do a business description of it. 1-2 pages. Create all classes for entities. All classes must have at least a constructor, get and set methods for all private variables and a toString method. Create classes also for connection entities (e.g. orders, reservations, etc.) All information should be saved in files. When opening the program, all information from files must be loaded in array lists. Use an array list for every class. The program must have at least one menu where the user can choose the operations to work. You should at least have one class that inherits from another class. You should have at least one interface that is extended by at least 2 classes. You must use the interface methods in your program. You are allowed to use the GUI for this project. If not use JOptionPane You are allowed to use databases, instead of files.
- Classes and Objects) Hand-write a complete Java class that can be used to create a Car object as described below. a. A Vehicle has-a: i. Registration number ii. Owner name iii. Price iv. Year manufactured b. Add all instance variables C. The class must have getters and setters for all instance variables d. The class must have two constructors, a no-args and a constructor that receives input parameters for each instance variable.is a construct that defines objects of the same type. A class An object A method A data fieldTask 2: Delivery Vehicle We want to develop a delivery vehicle that can carry a limited number of equally weighted boxes. To do this we can build off of our previous task by extending the BasicVehicle class. Instructions 1. Create a new class called DeliveryVehicle that is a subclass of BasicVehicle: • a private attribute cargoList of type String[] • a private attribute numItems of type int 2. Create a constructor that takes two parameters: a String for registration, and an int for maxCapacity: • pass on the registration parameter to the super constructor along with 0.0 for altitude, longitude and latitude. • use the maxCapacity parameter to create a new array for cargoList 3. Create a boolean method called isFull that returns if the cargoList is full. 4. Create a boolean method called isEmpty that returns if there are no boxes loaded. 5. Create a method called loadCargo that takes a String parameter description and adds the cargo description to the cargo list (if it is not already…