Consider an online mobile phone application in which customers can purchase smartphones, including iPhone and Samsung models. The software designer considers applying the Gang of Four (GoF) Factory Method pattern to enhance their design. Currently, there are classes including: SalesInterface, Sales Process (to process the sales), Customer, Phone, iPhone, Samsung and Payment, in their design model. Which of the following is a good design? Select one: a. A Factory class should be created to hide the Phone and Customer classes. b. A Factory class should be created to hide the SalesInterface and Customer classes. C. A Factory class should be created to hide the SalesInterface and Sales Process classes. d. A Factory class should be created to hide the Phone, iPhone and Samsung classes.
Q: What sets database programming apart from other programming languages? What specific instances of…
A: Every database management system has capabilities for the administration and management of the…
Q: What factors should be considered first when planning for data backup and restoration?
A: Backup of data: Directories, registration, licensing, and vital operational data are the most…
Q: Considering the current COVID 19 virus pandemic, it is important to assess the key benefits and…
A: Introduction: There are several benefits of information technology for the education industry.When…
Q: What did Ada Lovelace do to the field of computing?
A: During the early 20th century, Lady Ada Lovelace was a prominent figure in computer programming. Ada…
Q: I need Matlab code to draw the Figure below: X2 2. 1 1 0 0 1 1 0 0 0 2 X1
A: Here is the matlab code of the above problem. See below steps.
Q: Look at the current companies in the "tech domain" and analyze their business models to see how open…
A: Please find the answer below :
Q: list. entry will be the list created for the second dictionary, and so on.) eated for the first…
A: Algorithms: START Make an empty list to hold the results. loop through each dictionary -- Make an…
Q: Reference the attached zip file containing all data files and birthday_run_once.py. Q1.) Find the…
A: def hi_low_diff(*arg): low = 100000000 high =-100000000 for i in arg: if i…
Q: In this python practice problem, you should be able to filter a dictionary based on upper and lower…
A:
Q: When it comes to backing up your data, what are the most crucial factors to consider?
A: To talk about why backups are important and how to avoid data loss Solution: Backup is the process…
Q: Given an undirected, weighted graph G(V, E) with n vertices and m edges, design an (O(m + n))…
A: The question is solved in step2
Q: 1. A Rook-y Move! In chess, a rook can move horizontally or vertically to any square in the same row…
A: ALGORITHM : 1. Start2. Create a 2D array of size nxn and set all the entries to 0.3. Set the entry…
Q: Why is Computer Security Incident Response Team (CSIRT) important in software security?
A: Why is CSIRT Important : As the Department's first point of contact for computer security issues,…
Q: How to Reading Data from MongoDB Databases in R?
A: please follow the instruction given in step 2 to read data from the MongoDB database in R.
Q: Python For this lab, you will use a tuple to represent a student record. A student record consists…
A: def read_records(n): records = [] for _ in range(n): name = input("Enter student's…
Q: Some time should be devoted to discussing the evolution of information systems, with special…
A: Highlight the key figures and occasions that shaped the history of information systems as you talk…
Q: 5. What are the ethical dilemmas involved with having such a course offered by a private company?
A: An ethical dilemma is defined as the conflict between alternatives that may have some ethical…
Q: defined in chapter 24). Or put another way, it should have the fewest number of levels and still be…
A: class BinarySearchTree { private Node root; public BinarySearchTree(String[] arr) {…
Q: JAVA SCRIPT TASKS SET - I 1. Create a Smiley Face filled with colors.
A: Given task is to draw a smiley face in Java Applet.Approach: Create three Ovals, one for the…
Q: Network sniffing and wiretapping seem to share some similarities; what are your thoughts on this?…
A: The following is a discussion of the similarities that exist between network sniffing and…
Q: steps of standard algorithm
A: Algorithm is a step by step representation of the program. The program is performing the two sorts…
Q: Write SQL query that returns the Name of ALL employees (based on EMP_LNAME and EMP_FNAME in EMPLOYEE…
A: Answer: SQL queries=> 1) For getting EMP_NAME from EMP_FNAME and EMP_LNAME Select…
Q: a) Show that T(n) = 3n²+
A: Answer: O(g(n)) = { the set of all f such that there exist positive constants c and n0 satisfying 0…
Q: Implement a CircularArray class that supports an array-like data structure which can be efficiently…
A: This problem really has two parts to it. First, we need to implement the CircularArray class.…
Q: Consider a 6-drive, 150 GB-per-drive RAID array. What is the available data storage capacity for…
A: Dear Student, The answer to your question is given below -
Q: Find an incorrect statement about the following code. class TenNums { private: int *p; public:…
A: a. ) a.dsplay(); will display 0 1 2 3 4 5 6 7 8 9 as in class TenNumber the method display for…
Q: Problem: Ms. Clark wishes to record the assignment grades of the students in her Programming class.…
A: The given menu driven program is in java with the Student class and Grades.
Q: What are some examples of how technology may affect education?
A: While it's great to see technology being used in classrooms, there are still obstacles to overcome…
Q: What are some examples of how technology may affect education?
A: Although technology is now being more fully incorporated into education, using it to teach and learn…
Q: Your task is to locate and summarise two peer-reviewed research articles on project management…
A: Articles about project management ethics: The first paper is titled "Workplace Bullying: An Ethical…
Q: Demonstrate signature creation, transmitting the message, and validating the signature. Show what…
A: Introduction: A digital signature is a mathematical method to prove that a message, piece of…
Q: What advantages does cloud computing have over local installations
A: Please find the answer below :
Q: Question 11 mah .How would you use one command to look for all valid email addresses in a file…
A: According to the information given:- We have to define one command to look for all valid email…
Q: Using Java code Do the given, Using the Necessary conditions, Recover the Binary Search tree (T)…
A: Using Java code : Using the Necessary conditions, Recover the Binary Search tree (T) from the given…
Q: .Write a program that uses a FOR loop to print the 10 times table. (Required: IPO, Pseudocode,…
A: IPO (Input - Process - Output) chart - Input Process Output number input number Iterate loop…
Q: Exactly what causes problems and causes for concern when using a siloed information system?
A: Introduction: Failure of computers and the loss of data stored on them are two of the most…
Q: 8 queen problem genetic algorithm cross over condition in c
A: Let's see the answer
Q: Find the multiplicative inverse of (x6 + x3 + 1) in GF(28) mod x8 + x4 + x3+ x + 1 using the…
A: Here is the given solution for the above problem: We have to find the multiplicative inverse of…
Q: What is the size of the cache in bytes for: data: 32KB 1 block = 8 words 1 block = 1 cache line…
A: The question is solved in step2
Q: Are all of the following programs required to keep your computer operating efficiently: Power…
A: Dear Student, The answer to your question is given below -
Q: What did Ada Lovelace add to the field of computing?
A: Introduction: An early twentieth-century computer programmer named Lady Ada Lovelace is introduced.…
Q: Why would you choose to utilize a menu versus enabling the user to enter characters? Give two…
A: Introduction: Menu driven interfaces are incredibly basic and straightforward to use, and this…
Q: In a wide variety of businesses, memory sticks (USB Flash drives) are frequently used. What benefits…
A: Answer:
Q: Do you realize how important Ada Lovelace was to computing?
A: Ada Lovelace: Ada Lovelace was an English mathematician and writer best known for her contributions…
Q: (a) Show that T(n) = 3n²+ 10n + 1 is not (n²)
A: INTRODUCTION: The conclusion of an analysis of an algorithm is often a formula that specifies the…
Q: A clear definition of "security service" would be much appreciated.
A: Introduction: Give an explanation of the security service. A processing or communication service…
Q: The obvious next step is to name the stars and planets using random numbers. Names usually follow…
A: Assume we want to populate a two-dimensional galaxy with stars. Assume that the galaxy is discrete…
Q: Let's pretend for a second that you own a company that plans to begin selling and advertising…
A: Introduction: Assume you are the business owner of a firm that is set to begin advertising and…
Q: Given a text file food.txt containing the availability of food items. Write a program that reads the…
A: As the programming language is not mentioned here, we are using Python The Python code is given…
Q: (a) Describe the computer system components using a suitable diagram. (b) Describe…
A: Introduction: A computer is a tool for taking raw data and turning it into actionable intelligence.…
Step by step
Solved in 2 steps
- Design and implement a class called Bug, which represents a bug moving along a horizontal wire. The bug can only move for one unit of distance at a time, in the direction it is facing. The bug can also turn to reverse direction. For your design, create a UML Class diagram similar to that on the attachment. Note that you need to include the constructor in the methods section if you code a constructor. Bug will require a toString method to return the current position and which direction the bug is facing to the driver so it can be output. Hint: Remember that a horizontal line has a zero position in the middle with positive to the right and negative to the left. Consider that a bug will land on the wire at some point before starting along the wire. Write an interactive test driver that instantiates a Bug, then allows the user to manipulate it with simple commands like Output (to see the position and direction), Move, Turn, Exit ... single letters work just fine. All output…Analysis: Q1: There are common attributes and methods between passengers and drivers. What is the best choice for designing and writing the codes of these two classes? Explain your answer. Q2: Draw a simple class diagram showing only relationships between the classes. Implementation: After analysing the given requirements, implement the required application: with Object Oriented Programming style following the rules of good programming style (e.g. adding comments, etc.) • using only the material covered in M251 (and its prerequisites) Java language*In a university there are different classrooms, offices and departments. A department has a name and it contains many offices. A person working at the university has a unique ID and can be a professor or an employee. "A professor can be a full, associate or assistant professor and he/she is enrolled in one department. •Offices and classrooms have a number ID, and a classroom has a number of seats. • Every employee works in an office. 1. Draw the class diagram for the scenario above
- A jeepney is a vehicle that can ferry commuters from one point to another. Jeepneys are built by Filipino manufacturers, engraved in the body of the car, with their touch of style. From a four-wheeled vehicle setup, modern jeepneys can now drive with three wheels. Some of these vehicles are equipped with speed limiters, GPS, and sometimes WiFi. Create a Jeepney Class considering the abovementioned characteristics of the vehicle. Identify the attributes and the behaviors/methods of the Class. At this point, you are not required to create the methods that will set and get the values of your attributes.Question 1 Computer Science In your drone application of precision agriculture create an object diagram (showing qualities of attributes and methods) for the classes you designed (to be updated as you proceed with the project)Define a Course base class with attributes number and title. Define a print_info() method that displays the course number and title. Also define a derived class OfferedCourse with the additional attributes instructor_name, term, and class_time. Ex: If the input is: ECE287 Digital Systems Design ECE387 Embedded Systems Design Mark Patterson Fall 2018 WF: 2-3:30 pm the output is: Course Information: Course Number: ECE287 Course Title: Digital Systems Design Course Information: Course Number: ECE387 Course Title: Embedded Systems Design Instructor Name: Mark Patterson Term: Fall 2018 Class Time: WF: 2-3:30 pm python code used in this coding: class Course: # TODO: Define constructor with attributes: number, title # TODO: Define print_info() class OfferedCourse(Course): # TODO: Define constructor with attributes: # number, title, instructor_name, term, class_time if __name__ == "__main__": course_number = input()…
- What would a default and parameterized constructor look like for the given scenerio below. A car dealership has hired your software development firm to create a new car inventory program. You will first need to develop a class that represents the inventory of the dealership. What components and attributes will need to be included in your Automobile Class? Why? Illustrate a default and parameterized constructor for your class.Define a Course base class with attributes number and title. Define a print_info() method that displays the course number and title. Also define a derived class OfferedCourse with the additional attributes instructor_name, term, and class_time. Ex: If the input is: ECE287 Digital Systems Design ECE387 Embedded Systems Design Mark Patterson Fall 2018 WF: 2-3:30 pm the output is: Course Information: Course Number: ECE287 Course Title: Digital Systems Design Course Information: Course Number: ECE387 Course Title: Embedded Systems Design Instructor Name: Mark Patterson Term: Fall 2018 Class Time: WF: 2-3:30 pmQuestion1: Consider the MyReader class as given below. Identify any two problems (Problem 1, Problem 2) avoiding MakeTableand Centre the Name of the Class in the class design and provide fixed/correct version of this diagram. Also point out/mention/highlightyour fixes for identified Problem 1 and Problem 2, respectively. MyReader validateLocation() checkFTP() ping() readFromDisk() readFromWeb() readFromNetwork()
- Define a Course base class with attributes number and title. Define a print_info() method that displays the course number and title. Also define a derived class OfferedCourse with the additional attributes instructor_name, term, and class_time. Ex: If the input is: ECE287 Digital Systems Design ECE387 Embedded Systems Design Mark Patterson Fall 2018 WF: 2-3:30 pm the output is: Course Information: Course Number: ECE287 Course Title: Digital Systems Design Course Information: Course Number: ECE387 Course Title: Embedded Systems Design Instructor Name: Mark Patterson Term: Fall 2018 Class Time: WF: 2-3:30 pm Note: Indentations use 3 spaces. Original Code: class Course:# TODO: Define constructor with attributes: number, title # TODO: Define print_info() class OfferedCourse(Course):# TODO: Define constructor with attributes: # number, title, instructor_name, term, class_time if __name__ == "__main__":course_number = input()course_title = input() o_course_number = input()o_course_title =…Analysis: Q1: There are common attributes and methods between kids and trainers. What is the best choice for designing and writing the codes of these two classes? Explain your answer. Q2: Draw a simple class diagram showing only relationships between the classes. Implementation: After analysing the given requirements, implement the required application: with Object Oriented Programming style following the rules of good programming style (e.g. adding comments, etc.) using only the material covered in M251 (and its prerequisites) Hints: For each class, it is required to implement constructors, setters, getters, toString() method, and any other necessary method If the user tries to do an operation that could violate the state of objects, the operation should be ignored and the application should display an error message (e.g. adding a kid to the same group twice, etc.) Checking equality of any 2 objects should be done via the equals() method There is a class that will do the main job of…1: There are common attributes and methods between kids and trainers. What is the bestchoice for designing and writing the codes of these two classes? Explain your answer.2: Draw a simple class diagram showing only relationships between the classes