Design a software system for a bookstore that keeps an inventory of two types of books: Traditional books and books on CD. Books on CD may also contain music. The bookstore purchases books from publishers and sets a price for each book. Customers can purchase books from the bookstore, using either cash or a credit. The bookstore keeps track of which books it has in its inventory, and the books purchased by each customer

a. What are the objects in your object- oriented Solution?
b. What are the interactions between objects in your solution?
c. Which objects "have" other objects?
d. Which Objects "Use" other objects?
e. Which objects are other objects?

Answers

Answer 1

Answer:

Explanation:

a. In this scenario, the best solution would have an Object of Traditional Books, CD, Music, Bookstore and Customer.

b. All five objects would be able to be called by the main program loop and the Customer Object would call upon and use either the Books or CD object, While the Bookstore object would call upon all of the other objects.

c. Both the Bookstore object and Customer object will "have" other objects as the Bookstore needs to hold information on every Book or CD in the Inventory. While the Customer object would call upon the Book and CD object that they are purchasing.

d. The Music Object will extend the CD object and use information on the CD object as its parent class.

e. Since the Music Object extends the CD object it is also considered a CD since it is in CD format like the Books on CD and therefore is both objects.


Related Questions

It is for employees to make mistakes that compromise the security of an organization’s computer devices and sensitive information.

impossible
difficult
easy

Answers

Answer: Easy

Explanation: Correct on my Edg 2021.

It is simple for employees to make mistakes that jeopardize a company's computer system security and sensitive data.

What exactly is sensitive data?

Sensitive information has been defined as personal data that includes facts or opinions concerning a person's race or ethnicity. political affiliations or beliefs. beliefs in religion or philosophy. Data that needs to be shielded from unwanted access in order to protect the security or privacy of a person or organization is considered sensitive information.

Pattern-based classifiers called sensitive information types (SIT) are used. To see a complete list of all SITs, see Sensitive information types entity definitions. They look for sensitive information like social security, credit card, or bank account numbers to identify sensitive things.

Therefore, It is simple for employees to make mistakes that jeopardize a company's computer system security and sensitive data.

To know more about sensitive information visit;

brainly.com/question/26191875

#SPJ3

You were just hired as an IT Specialist for Smalltown School District. Your first assignment is to review a problem area& in student records processing. It seems that the program currently used to compute student grade point averages and class rankings runs terribly slow and as a result end of year reports are habitually late. Your are asked to come up with a list of items that should be checked in order to determine if a modification to code is in order. The IT department head is asking you to do this without the opportunity to actually see the current application/programs in use. What questions would you ask about the current code? What areas of code would you look at? What would you need to know about the student data?

Answers

Answer:

Explanation:

There are various questions that you can ask in this scenario, such as

What grading policies are being implemented?

How many student grades are being calculated by the program?

What is the requirements for a student to pass?

All of these questions would allow you to get an idea of how extensive the code may be and its complexity. Once you know this you would look at the code revolving around actually looping through the data and doing the necessary calculations. You can then determine how to manipulate the code and make it much more efficient.

You would also need to know how the student data is being saved, which will help determine if it is the best data structure for saving this type of data or if it can be replaced in order to maintain the data secure while increasing the speed of the program. Mainly since this information needs to be continuously used from the data structure.

A mathematical process of coding information so that only the intend user can read it

Answers

Answer:

asymmetric encryption with the intended user's public key.

Explanation:

Only that user will be able to decrypt the information.

Why did Elena Gilbert Turn her humanity off when she was sired to Damon? (In The Vampire Diaries)

Answers

Answer:

Ok, so when her brother died she couldn't take it and was in denial for like the longest time. And since she was still sired to Damon bofre her humanity was off she could still listen to him.

Explanation:

Other Questions
Name four African leaders and discuss their motivations African independence? Which expression is equivalent to tan(x pi)? Which factor most contributed to the spread of railroads in Great Britain? i need help this is dude tomorrow PLZ HELP OMGNEEDIT RN PLZ what is the perimeter of 6 and 2 Opinion Essay-Should Students Do Activities to ImproveSchools? You can write a function to find Fibonacci numbers using recursion.How do you find the next number?add five to the previous numberadd one to the previous numbermultiply the two previous numbersadd the two previous numbers PLEASE HELP ME WITH THIS IT IS 12 AM i need help with the volume, tsa and x please the two scientists responsible for discovering that both plant and animal tissue is made of cells are whatA. Schwann and SchleidenB. Hooke and SchwannC. Virchow and Hooke What is one way to say "e-mail" in Spanish? Assume that when adults with smartphones are randomly selected, 64% use them in meetings or classes. If 5 adult smartphone users are randomly selected, find the probability that exactly 3 of them use their smartphones in meetings or classes. The probability is (Round to four decimal places as needed.) I need helppp plzzzzz man as historical being explain "Fossil" is Latin for "prehistoric record." True or false Read the passage.All over the country of [China] there is a kind of black stone existing in beds in the mountains, which they dig out and burn like firewood. If you supply the fire with them at night, and see that they are well kindled, you will find them still alight in the morning, and they make such fine fuel that no other is used throughout the country. It is true that they have plenty of wood also, but they do not burn it, because those stones burn better and cost less.The Travels of Marco Polo,Rustichello da PisaWhich conclusions does the passage best support? Choose three correct answers.China burned coal more than wood for heat.Marco Polo wrote about a new energy source from China.China had used up most of its wood by clearing land for farming.China lacked coal resources that could be easily mined and burned.Marco Polo helped spread technology and ideas from China to Europe. A town plans to clear a patch of forest to make a road wider. What possible changes should the town take into account? (2,2) and (2,-2) slope? Help brainy please help help help