public abstract class Media {...} Media.java public class Audio extends Media {.….} Audio.java public class Video extends Media {..} Video.java public class Medialibrary { public void play(Media m){..} } Medialibrary.java 2) What datatype(s) of objects can be passed to play()|
Q: What was the impact of the Facebook 2021 breach on global communication and commerce?
A: Facebook's leading data protection regulator in the European Union is seeking answers from the tech…
Q: Executive summary of business communication with social media
A: Answer :
Q: Describe the requirement for a continuous information security maintenance programme.
A: Intro We store and access information on various devices like computers, mobiles, records, etc.…
Q: What are the three most effective ways to protect Windows systems? How do they function?
A: Introduction: Windows System Hardening Hardening a computer system involves strengthening it in…
Q: Question 1 Write equivalent compound statements for the following statements. a. x 2*x+x*y* 3; b. x…
A: The question is to write the equivalent compound statements for the given statements.
Q: 1. Describe information security and its relevance to the organisation as quickly as possible; I do…
A: Intro Concepts of Information Security This chapter discusses security policies in the context of…
Q: Discuss the importance of backups and the actions required to avoid data loss or computer failure.
A: To discuss the purpose of backups and the steps to prevent data loss.
Q: Write a command to modify the permissions of all the files and directories in the XYZ directory…
A: Let's see the solution in the next steps
Q: What is the relationship between information security policy and an information security plan? Give…
A: Intro The cornerstone of every information security program is an information security policy. It…
Q: A top-down strategy is superior since it's more effective at protecting sensitive data.
A: Sensitive Data: It is defined as any information that is safeguarded from being released without…
Q: Computer science What kinds of transactions will the machine be able to handle?
A: Introduction: The operations of a transaction are those it does. The transaction may retrieve…
Q: How is the SAP 4/HANNA different from previous versions of SAP and what are its capabilities and…
A: SАР S/4HАNА Сlоud is а соmрlete, mоdulаr сlоud ERР sоftwаre designed fоr every business…
Q: Give a full description of the key security management concepts as well as the underlying security…
A: Intro Provide a thorough explanation of the major security management concepts and the underlying…
Q: Let p and q be the propositions "The exam is decided“ and "The marks have been counted,"…
A: 1) ~p: The exam is not decided 2) pvq: The exam is decided or the marks have been counted. 3) ¬p ∧…
Q: Which RAID implementation, Windows or hardware, is more reliable?
A:
Q: write program segment to find number of ones in register BL : Using test instruction B.Using…
A: The answer is given in the below step
Q: Q1. Describe and list the key purposes of information security.
A: Intro Three primary goals of information security are preventing loss of availability, the loss of…
Q: In order to better understand RAID 5, please explain its functions. Are there any situations when…
A: RAID 5 is a configuration that uses disc striping and parity to build a redundant array of separate…
Q: Explain the primary function of the computer bus.
A: Introduction: A computer bus is a communication link in a computer system that is used to transfer…
Q: Peer-to-peer sharing may be blocked by an intrusion detection or intrusion prevention system. Is…
A: Please find the detailed answer in the following steps.
Q: Explain what functional programming is in a concise manner. How would you describe the distinction…
A: Given: Programming a language is the name of the language that is used to write down the steps for…
Q: Explain how the Use case and Use case diagram came to be.
A: In general, while explaining any concept, the explanation can be more effective if there is a Use…
Q: What is the difference between the Kernel and the Shell in the context of Unix?
A: The question is to write the difference between the Kernel and the Shell in the context of Unix.
Q: By closing a number of offices in order to save money and decrease the environmental effect of…
A: Start: Agile and waterfall a approaches are two separate methodologies for completing projects or…
Q: Why is a top-down approach to data security preferred over a bottom-up one?
A: We have to state that why is a top-down approach to data security preferred over a bottom-up one.
Q: Computer science Different sorts of mobile devices should be identified and described.
A: Introduction: Computers on wheels. The tablet computer Netbook. Player of digital media.Cell phones.…
Q: To launch a successful distributed denial-of-service attack, the malicious hacker must first…
A: Intro A successful distributed denial-of-service attack requires the malicious hacker to download…
Q: There are ten steps to implementing a good security strategy inside a business.
A: Intro 1. Distinguish your risks What are the dangers of improper use? Do you have data that ought…
Q: Do you agree that technological developments usually result in better games? What is your…
A: Better games are always the outcome of technological advancements.
Q: 189.17.192.0/18. You must create 128 subnets with equal numbers of host in each subnet. Find the…
A: 189.17.192.0/18 A) /18 means number of network bits is 18. Number of subnet bits = log 128 = 7…
Q: Computer Science: Explain the fundamentals of information security risk management.
A: INtro Primary aspects of information security risk management Primary aspects:Information…
Q: In order to avoid data leaking, how are repair processes organised and run?
A: Data leak prevention: It is the process of identifying and preventing data breaches, exfiltration,…
Q: As a software engineer, you'll be expected to recommend the best method for gathering customer…
A: Requirement Engineering is the process of defining, documenting and maintaining the requirements. It…
Q: iv. Briefly explain the how the requirements of 3NF enforce the 2NF (hint: you may frame your…
A: A dependency of type x->y where x is prime attribute or part of key is called partial functional…
Q: Consider this Preference Voting Table from 50 voters and 4 candidates Rank / Number of 19 14 10 7.…
A: Find the answer with reason given as below : As per company guidelines we are supposed to answer…
Q: Does external fragmentation have a cause? And what can be done to stop it?
A: External Fragmentation: When there is enough free RAM to handle all of the allocation requests, this…
Q: Why was a form application used instead of a console programme?
A: Introduction: To understand this, first consider the distinction between a console app and a Windows…
Q: Q5\Explain, what the meaning of the effected memory address (EA) and how can product the physical…
A: The meaning of the effected memory address (EA).
Q: Class B network is 146.98.0.0 You have been told to subnet this into at least 40 subnets and at…
A: Given IP address :- 146.98.0.0 (class B ) • Class B network has 16 bits for network part and 16 bits…
Q: buted ledger technologies from both functional and tec
A: Introduction: Below the distributed ledger technologies from both functional and technical point of…
Q: the study of computers What's the use of a prototype if it serves no purpose?
A: Given: A prototype is a sample, a model, or release of a product that is used to test an idea or a…
Q: What are some of the uses you might have for correlated subqueries?
A: Intro Correlated subqueries_ are used for row-by-row processing_. Each subquery is executed once…
Q: How can the integrity of the data be ensured?
A: The physical data model is a representation of the data that will be used to create the database:…
Q: Computer science What exactly does the phrase "multitasking" mean?
A:
Q: Explain why authentication remains a problem in our information-based society.
A: Introduction- Authentication is a process in which a legitimate user is separated from an…
Q: What should be the first thing to do when there is a problem with data?
A: We need to discuss the first thing to do when there is a problem with data.
Q: Explain the TCP/IP paradigm and the roles of each layer in brief.
A: Introduction: The TCP/IP Model assists you in determining how a particular computer should be linked…
Q: How can the integrity of the data be ensured?
A: answer is
Q: Is there a distinction between elastic and inelastic traffic? Computer science
A: The difference between elastic and inelastic traffic
Q: What is the most pertinent strategy accessible to database designers for influencing database…
A: Introduction: The following approaches can be used to create any database:
Step by step
Solved in 2 steps
- Design Patterns: Strategy Pattern : in Object Oriented design Programming Use Netbeans to execute the following Java code and show SCREENSHOTS to verify that the program runs correctly. Draw a UMl class diagram to model the program. Here is the java code: File : Billing.java public interface Billing { public double getDiscount();} File : LoyaltyBilling.java public class LoyaltyBilling implements Billing{ @Override public double getDiscount() { return 20.00; } } File : NormalBilling.java public class NormalBilling implements Billing{ @Override public double getDiscount() { return 0; } } File : SeasonalBilling.java public class SeasonalBilling implements Billing{ @Override public double getDiscount() { return 10; } } File :SaleBilling.java public class SaleBilling implements Billing{ @Override public double getDiscount() { return 50; } } File : Product.java public class Product { private String name; private…Requirements: Computer with Internet connection NetBeans IDE 8.2 or Microsoft Visual Studio Community 2015 IDE Procedure: 1. Using an object-oriented programming IDE, write the program for the given UML class diagram (as shown below) that implements the Composite design pattern. «interface» ImageEditor Graphic + move(x, y) + draw) Dot CompoundGraphic X, y |- children: Graphic[] + Dot(x, y) + move(x, y) + draw() + add(child: Graphic) + remove(child: Graphic) + move(x, y) + draw) Circle radius + Circle(x, y, radius) + draw() Figure 1. ImageEditor class diagram 2. Screenshot your codes and output. Then, upload the images to this DropBox.Design and implement Java program as follows:1) Media hierarchy: Create Media, EBook, MovieDVD, and MusicCD classes from Week 3 -> PracticeExercise - Inheritance solution. Add an attribute to Media class to store indication when media object is rented versusavailable. Add code to constructor and create get and set methods as appropriate. Add any additional constructors and methods needed to support the belowfunctionality2) Design and implement Manager class which (Hint: check out Week 8 Reading and Writingfiles example): stores a list of Media objects has functionality to load Media objects from files creates/updates Media files has functionality to add new Media object to its Media list has functionality to find all media objects for a specific title and returns that list has functionality to rent Media based on id (updates rental status on media, updatesfile, returns rental fee)3) Design and implement MediaRentalSystem which has the following functionality: user…
- Object Oriented Programming: Polymorphism DB What is an abstract class? What is the purpose of an abstract class (this may require some research)? Provide a unique Java code example of an abstract class.Objects enable the design practice of --------------—although they may know how to communicate with one another across well- defined interfaces, they normally are not allowed to know how other objects are implemented.Inheritance makes it more difficult to design object class tests. Explain.
- Shape -width: double -length: double +allmutatorMethods Shapes2D Shapes3D -height:double *calSize():double +calVolume():double 1. Define class Shape, 2DShape and 3DShape as per UML class diagram given. 2. Define all mutator methods(set and get) for all classes. 3. Define methods calArea() with formula area - width * length for 2DShapes. 4. Define methods calArea() with formula calvolume, volume = width*length*height for 3DShapes. In the main program, declare and set data in 1 object of 3DShapes. Create an array OR ArrayList of 2DShapes, set and display the info of all objects as shown in the output. 5.JAVA PROGRAMDefine the classes (see attached photo)PROGRAMMING LANGUAGE: JAVA SUBJECT: ADVANCED OOP WITH JAVA QUESTION NO 1: Make an abstract class named A1 with 2 abstract methods, then implement those methods in child class.
- Create a UML diagram to help design the class baby. class Baby{ //data members private String name; private int age; //default constructor Baby() { name = "xyz"; age = 3; } //parameterized constructor Baby(String n,int a){ name = n; age = a; } //sets name public void setname(String n){ if(n.isEmpty()) name = "xyz"; else name = n; } //sets age public void setage(int a){ if(!(a>=1 && a<=4)) age = 2; else age = a; } //returns name public String getname(){ return name; } //returns age public int getage(){ return age; } //check if two objects have same name and age public boolean equals(Baby b){ if (age==b.getage() && name.equalsIgnoreCase(b.getname())) return true; else return false; } } public class Main { public static void main(String[] args) { //two objects of type Baby Baby A=new Baby("abcd",3); Baby B= new Baby("abcd",3); //print information of object System.out.println("Name:" + A.getname() + " age:"+ A.getage()); //call equals on obejct…Polymorphism is the ability of an object to take on many forms. The most common use of polymorphism in OOP occurs when a parent class reference is used to refer to a child class object. class Main ( public static void main(String(1 args) { Animal al: al = new Animal (); al. displayInfo (); al - new Dog (); al. displayInfo (); Figure 2. PolymorphismSample Interaction: Constructor & Mutator Methods Output iPhone = ApplePhone('Black', '11 Pro', 64, 'Verizon') iPhone.set_airdrop_status('On'); print(iPhone) This is a Black 11 Pro Apple Phone Capacity is 64 GB. Carrier is Verizon | AirDrop Status is On aPhone = AndroidPhone('White', 'Note 10', 128, 'AT&T') aPhone.set_split_screen_mode('On'); print(aPhone) This is a White Note 10 Android Phone Capacity is 128 GB. Carrier is AT&T Split-Screen Mode is On Polymorphic Functions Output iPhone.get_storage() Storage is 64 GB iPhone.uprade_storage(128) Updating storage is not allowed on Apple phones aPhone.get_storage() Storage is 128 GB aPhone.upgrade_storage(256) Old storage is 128 GB New storage is 256 GB aPhone.upgrade_storage(128) You can't rollback memory! aPhone.get_storage() Storage is 256 GB iPhone.connect_cloud() Connecting to iCloud... iPhone.download_app('Starbucks') Opening Apple Store to download Starbucks app.. aPhone.connect_cloud() Connecting to gdrive..…