Design and implement java program for " Covenant System"; the system stores a covenant name, type and date for each object. Also, each Covenant should have the employee name and ID. The system contains a Covenant class and TestCovenant class. To implement the class, you must: (not exclusively) Make at least one constructor to initialize the object with a Date object and ID. Each private data must have setter and getter method. In the main class you have to create 5 Covenants objects and assign for each object its (name, id, datecreated, Employee name, Employee ID). Submit UML class diagram
Q: Please provide a brief explanation of memory addressing and the reasoning for its extreme…
A: Memory Addressing: The device or CPU tracks detailed data using a memory address, which is a…
Q: Why is it beneficial to use a firewall, and what steps should be taken to instal one?
A: An organization's previously set security policies are used to monitor and filter incoming and…
Q: Imagine that your company's email server sends you a message informing you that your password has…
A: The response: Solution: When a computer system sends information to the attacker through a virus…
Q: Is it possible to name a disadvantage of billing software?
A: 1. The process of creating a set of instructions that tells a computer how to perform a task is…
Q: What kind of concerns and issues arise due to the utilisation of disparate data systems?
A: Human error is the most prevalent cause of computer-related errors, including typos, omissions, and…
Q: guish between the "Internet" and the "Wo
A: Introduction: The essential distinction between the World Wide Web (WWW) and the Internet is so…
Q: Since servers on a flat network perform most of the company's business functions, a Network Security…
A: Introduction: DMZs (demilitarised zones), which provide some network isolation, protect secure…
Q: Examine the pros and cons of different authentication techniques as they relate to protecting…
A: This authentication method doesn't rely on the user because it is sent to a monitoring team or a…
Q: In what ways does the use of a disjointed information system raise concerns and problems?
A: Computer failure and loss are two of the most important problems with computers that cause…
Q: Authentication exists for what purpose? Analyzing the benefits and drawbacks of various…
A: Authentication: Authentication is the process of authenticating the identification of a person or…
Q: Give one argument for the Turing test being a good test for measuring intelligence.? 2- Give one…
A: 1. The simulation of human intelligence processes by machines, particularly computer systems, is…
Q: There are several different kinds of digital memory that may be employed. These include cache…
A: Definition: There are numerous digital memory standards, so it would be beneficial if there were…
Q: When conducting a sniffer attack, what actions must the attacker do to be successful? If a…
A: In several movies, police enforcement and criminals bug telephone lines to listen to a person's…
Q: it always the case that a hash table of size en trying to understand the value of hash al-world case…
A: Lets see the solution.
Q: How can you evaluate the merits and drawbacks of various authentication strategies?
A: Authentication is nothing but a authenticating the user with different techniques it may be…
Q: How can you protect yourself against MITM attacks? Your reply should be broken down into sections.
A: Introduction : Man In The Middle attack is a sort of assault in which an intruder (more…
Q: TDM, FDM, and CDM are all multiplexing techniques used at the physical layer. What are the upsides…
A: The answer to the question is given below:
Q: How can you protect yourself against MITM attacks? Your reply should be broken down into sections.
A: Please find the answer below :
Q: c++ data structures In this problem, you need to implement Merge sort algorithm. You need to…
A: Algorithm:- It is defined as the set of instructions that can perform a specific task.
Q: What factors contribute to the growth of a system's total information storage capacity over time?
A: What factors lead to changes in the information system design's scope? The topic of change…
Q: n other words, why is authentication even necessary? The effectiveness of various authentication…
A: Authentication: It provides access control for systems by checking to see if a user's credentials…
Q: Can you explain what the "Structure" part of this phrase means?
A: Due to this: What does the Structure statement really mean? Explanation: The structure-related…
Q: Consider the following chip sequences for a Code Division Multiple Access (CDMA) with chip length m…
A: CDMA is a channelization protocol for multiple access, where information can be sent simultaneously…
Q: the difference between a fully associative cache and a directly mapped cache.
A: Please refer to the following step for the complete solution to the problem above.
Q: Are Classes and Structures really the same thing, or are there meaningful distinctions between them?
A: the system of class division in society or a group that is based on hierarchy. The overwhelming…
Q: Are there any limitations to the Tor network?
A: Introduction: Constraints imposed by the Tor network It is made explicit that you are using Tor when…
Q: Does RAID stack up against other backup options? What do you think about this remark, agree or…
A: No, RAID cannot be regarded a replacement for backups. Data loss as a result of disc failure is less…
Q: What are some of the most important things to keep in mind while creating the software for an…
A: Creating a software for an information system refers to the process of designing, developing, and…
Q: The data tablet's resolutions are on par with those of a CRT display, yet it takes a fraction of the…
A: The data tablet device may be used with a computer in much less time than the light pen can, and its…
Q: The following companies offer reputable application development tools: We ask that you illustrate…
A: App development software is a tool that assists in the process of developing mobile applications by…
Q: How come the number of iterations in the waterfall approach is capped? One could then wonder what…
A: The waterfall approach uses a linear strategy, sometimes known as a software development sequence.…
Q: However, what precisely is me audio into digital format.
A: SummaryWhat is digital audio?Digital audio is the technology used to record, store, edit, create,…
Q: Talk about the top three causes of delays in IT projects. When a project gets off course, what steps…
A: Many factors cause projects to be late. Here are 3 reasons. It's: Project visibilityProject goal is…
Q: Why should I use the term "Internet" when "World Wide Web" seems more appropriate?
A: The world wide web are the pages you see when you're at a device and you're online. But the internet…
Q: Let's pretend your company's mail server sends you a notification asking you to verify a password…
A: Phishing attacks are a kind of virus that target passwords. The attacker receives information from…
Q: Describe the distinctions between online transaction processing (OLTP) and data warehousing (DWH)…
A: The answer to the question is given below:
Q: Making a list of the six parts of an information system and then defining them in the order they…
A: Introduction: IS (Information System): An information system is a system that organizes, stores,…
Q: However, what precisely is meant by "digital audio?" The transformation of analogue audio into…
A: The reproduction and transmission of sound in a digital format are known as digital audio. In other…
Q: How can employing a billing programme benefit your business?
A: Given: What advantages do billing software packages offer? billing software benefits: Reduce Late…
Q: capabilities of a desktop OS?
A: The answer to the question is given below:
Q: As opposed to the rest of the Internet, why is the World Wide Web treated as if it were a completely…
A: The World Wide Web (WWW or Web) is a vast collection of interconnected documents and other…
Q: In your own words, explain the monetary advantages patent rights may offer to individuals or groups,…
A: We must address the economic advantages of patent rights to specific people or groups and how to…
Q: Since wireless networks have their own unique characteristics, there are many different problems…
A: INTRODUCTION: "Wireless" means that there is no wire and that the media comprises electromagnetic…
Q: I'm curious as to what the GRANT declaration can do and how it affects IP protection, so I'd…
A: Introduction: In order to execute actions on database objects, it is used to provide privileges to a…
Q: Write a binary search tree to store strings. You program should do the following: A. Your program…
A: Answer:
Q: Multiprocessor systems are advantageous because of the plethora of options they provide their users…
A: Introduction: The following is a list of the benefits that the multiprocessing system offers:…
Q: #Use python to solve this math #Find the minima and maxima of the following functions at a given…
A: Following Code Is executed in Jupyter Notebook We need to find the minima and maxima of the…
Q: How can I get access to the simulator's crash records?
A: Introduction: Crash reports for Tombstone are created whenever an Android application has a native…
Q: The fundamental distinction between web-based apps and native applications is the method through…
A: The answer is given below step.
Q: Explanation about RAID 5: Why does RAID 5 need to be used instead of the other available RAID levels
A: Dear Student, The answer to your question is given below -
Design and implement java program for " Covenant System"; the system stores a covenant name, type and date for each object. Also, each Covenant should have the employee name and ID. The system contains a Covenant class and TestCovenant class. To implement the class, you must: (not exclusively)
Make at least one constructor to initialize the object with a Date object and ID.
Each private data must have setter and getter method.
In the main class you have to create 5 Covenants objects and assign for each object its (name, id, datecreated, Employee name, Employee ID).
Submit UML class diagram
Trending now
This is a popular solution!
Step by step
Solved in 5 steps with 4 images
- Create an Account Object project. 1. Create an Account class and use the provided UML diagram to code the instance fields, constructors and methods. Note: The type of accounts are 1 (Savings) or 2 (Cheque) The constructor must assign the values of the parameters to the data fields/instance variables. The static field must be increased by one in the constructor. The setAccNumber() is a private void method. The account number must consist of the first 3 letters of the name of the account holder, the digit indicating the type of account and #-character and a 3-digit random value. This method must be called from the constructor. The makeDeposit() method must add the amount received as a parameter to the balance if the value received is not a negative value. The withdrawAmount() method must check whether the balance allows for the amount to be withdrawn. There must always be a minimum amount of R 100.00 in an account. If there is not enough money in the account to do the transaction,…Java Object Oriented Programming Create a Shape class that shall have color and filled instance variables of enum Color and boolean type. The filled boolean variable shall show, whether the shape is filled (colored). The enum Color shall be defined within the class having 4 color names (choose any four). Also define getArea and getPerimeter method in Shape class, both shall return 0. Create Rectangle class with length and width attributes and a Circle class with radius attribute, of type double. Properly encapsulate all fields. Circle and Rectangle shall extend Shape class and override getArea and getPerimters methods as per its type and specific formula. In Test class, create an object of Rectangle and Circle, by initializing all attributes in constructor and print both shapes' area and perimters. In Test class, define a static method with following signature, public static void printEachShapeCount(Shape... shapes) As you know, the parent type variable can hold the…Design a LandTract class that has two fields (i.e. instance variables): one for the tract’s length(a double), and one for the width (a double). The class should have: a constructor that accepts arguments for the two fields a method that returns the tract’s area(i.e. length * width) an equals method that accepts a LandTract object as an argument. If the argument object holds the same data (i.e. length and width) as the calling object, this method should return true. Otherwise, it should return false. a toString method (that returns a String representation of the tract’s length, width, and area). Demonstrate the class in a program by creating an array of three LandTract objects initialized with user input. Then, print the info of the LandTract objects stored in the array by invoking the toString method (implicitly or explicity). Also, use the equals method to compare at least two LandTract objects and print wether they are of equal size or not. Sample Output:…
- For this portion of the assignment you will need to create the Employee class * based on the instructions in the API and have implemented the Equals method for that class. * * There is one parameter being passed as to this method that you will use as part of your solution:* An Employee object reference with the identifier testEmployee* * 1) Instantiate an instance of the Employee class using the default constructor and * assign it to an object reference with the identifier defaultEmployee* * 2) Instantiate an instance of the Employee class using the alternate constructor, * passing the following arguments:* name: "Keanu Reeves"* ID: 10010* salary: 78000.00* Assign the instance to an object reference with the identifier keanuEmployee* * 3) Declare a variable of type Employee with the identifier excellentEmployee and assign it * a reference to the same object that is being referenced by the keanuEmployee object reference. * 4) Construct a selection statement that tests if testEmployee is…Scenario:You are hired by a game development company. Your task is to create an RPG hack & slash console game. The game will have a movement system that will be based on the x, y, z coordinate system. You will need to start with creating 3 classes.1. A class that represents a player2. A class that represents an enemy3. An abstract class that contains the movement logic.Step 1:Start by creating the superclass which defines the movement system for both enemy and player. The movement system is based on the Coordinate system. Imagine an x, y, z plane, the y coordinate is used to move forward and backward in the virtual plane, x to go left and right, z to go up and down.For example, A player with coordinates x, y, z with values -5, 10, 0 represents a player -5 units to the left, 10 units forward, and 0 z units mean on the ground. (0, 0, 0) are the base units which means the player or enemy is at the start of the level.Step 2:Create a class to represent the player which is derived from…Age calculation. You must use the object oriented programming for this problem. USE JAVA LANGUAGE (1) Create a class called Date that Includes three pieces of information as data members—a month (type int), a day (type int) and a year (type int). Have a constructor with three parameters to initialize the three data members. Call setters inside to initialize each attribute. Provide a set and a get method for each data member. Assume that the values provided for the year and day are correct, but ensure that the month value is in the range 1–12; if it isn’t, set the month to 1. Provide a member function displayDate that displays the month, day and year separated by forward slashes (/). Provide a member function called calculateAge with three parameters that indicate a future date (represented as month, date, and year). Calculate one’s age based on one’s birth date and this future date. Inside the method simply print out one’s age in the format of how many years and how many days. Note…
- Age calculation. You must use the object oriented programming for this problem. (1) Create a class called Date that Includes three pieces of information as data members—a month (type int), a day (type int) and a year (type int). Have a constructor with three parameters to initialize the three data members. Call setters inside to initialize each attribute. Provide a set and a get method for each data member. Assume that the values provided for the year and day are correct, but ensure that the month value is in the range 1–12; if it isn’t, set the month to 1. Provide a member function displayDate that displays the month, day and year separated by forward slashes (/). Provide a member function called calculateAge with three parameters that indicate a future date (represented as month, date, and year). Calculate one’s age based on one’s birth date and this future date. Inside the method simply print out one’s age in the format of how many years and how many days. Note that here you are…Scenario:You are hired by a game development company. Your task is to create an RPG hack & slashconsole game. The game will have a movement system that will be based on the x, y, zcoordinate system. You will need to start with creating 3 classes.1. A class that represents a player2. A class that represents an enemy3. An abstract class that contains the movement logic.Step 1:Start by creating the superclass which defines the movement system for both enemy andplayer. The movement system is based on the Coordinate system. Imagine an x, y, z plane,the y coordinate is used to move forward and backward in the virtual plane, x to go left andright, z to go up and down.For example, A player with coordinates x, y, z with values -5, 10, 0 represents a player -5units to the left, 10 units forward, and 0 z units mean on the ground. (0, 0, 0) are the baseunits which means the player or enemy is at the start of the level.Step 2:Create a class to represent the player which is derived from the…Design and implement a Restaurant class with at least three meaningful attributes and two methods. Implement a test program which creates at least two instances of the restaurant class and calls all the methods. Some possible attributes are name, numberOfTables, cuisine, numberOfReservations, capacity, etc. Some possible methods are make Reservation, checkAvailability, etc. Note the following: -All properties must be declared as private and you need accessor and mutator methods for each property. - You need to define at least one constructor. Documentation o Include header comments that include description of the program. o Include body comments o Consistent indentations o Consistent white line spaces Properties are declared as private o Accessor and mutator methods are created o At least one default constructor o At least two instances are created
- 3. Person and Customer Classes The Person and Customer Classes Write a class named Person with data attributes for a person’s name, address, and telephone number. Next, write a class named Customer that is a subclass of the Person class. The Customer class should have a data attribute for a customer number, and a Boolean data attribute indicating whether the customer wishes to be on a mailing list. Demonstrate an instance of the Customer class in a simple program.Define a class named Employee. This class should extend the Person class from the previous question. The class should have a constructor, which takes the name, age, employer (String) and salary (int) as parameters (in that order). The first two parameters should be passed to the constructor of the superclass and the value of the last two parameters should be stored in instance variables. The class should define the methods, getSalary which returns the salary of the employee and getEmployer which returns the name of the employer. Any methods from the previous question that need to be overridden should be overridden! Use super and instanceof as appropriate. I.e., for the following methods you should be able to call the method in the superclass for specific situations (e.g. the compareTo method in the superclass can be called if you receive anything other than an Employee, and this also holds for the equals method). The toString method only needs to append details and as such can also…Note : ALL Code Must be in OOP (JAVA) And perform all in ecplis (console base) Scenario:You are hired by a game development company. Your task is to create an RPG hack & slashconsole game. The game will have a movement system that will be based on the x, y, zcoordinate system. You will need to start with creating 3 classes.1. A class that represents a player2. A class that represents an enemy3. An abstract class that contains the movement logic.Step 1:Start by creating the superclass which defines the movement system for both enemy andplayer. The movement system is based on the Coordinate system. Imagine an x, y, z plane,the y coordinate is used to move forward and backward in the virtual plane, x to go left andright, z to go up and down.For example, A player with coordinates x, y, z with values -5, 10, 0 represents a player -5units to the left, 10 units forward, and 0 z units mean on the ground. (0, 0, 0) are the baseunits which means the player or enemy is at the start of the…