Create a sub class for managers which inherits

Assignment Help Management Information Sys
Reference no: EM132191455

You are a software development employee at a startup company. Your HR department has tasked the IT department with developing a simple application (Windows Form Application) to load and display employee records.

Your application will need to do the following:

Create an Employee Class with the following properties:

First Name

Last Name

Street Address

City

State

Zip

Create a sub class for Managers which inherits from the Employee Class. The Manager class will have the following additional properties:

Cost Center

Supervisor

Create a sub class for Developers which inherits from the Employee Class. The Developer class will have the following additional properties:

Developer Type (Script, .NET, Mobile, etc.)

Supervisor

Tax Type (W2, 1099-Contract)

Load employee information from a text file selected by the user into an array consisting of Managers and Developers. The format of your text file should be something like this:

First Name, Last Name, Street Address, City, State, Zip, Employee Type (Manager or Developer), Cost Center (0 if Developer), Supervisor, Tax Type (NA if Manager)

There should be a separate line for each employee (only one line per employee with the fields above) and your file should contain at least 7 - 10 employee records. You should save the file with a .txt or .csv extension.

The UI should allow the user to select how many records to view (start at 3 and allow up to the total number of records loaded).

The following requirements detail the critical elements that will determine the grading criteria for your submission. Please see the rubric below these requirements.

The application should compile and run successfully

The application should display Inheritance (Steps 1 - 3 above).

The application should allow the user to load a text or csv file for processing (Step 4 above).

The application should load the text file elements into an array of employee records (Step 4 & 4a above).

The application should display records from the array. The number of records to display should be selected by the user. (Step 5 above).

Your application should contain comments to explain the data and process flow of your code.

Reference no: EM132191455

Questions Cloud

Why might a profitable motel shut down in the long run : Why might a profitable motel shut down in the long run if the land on which it is located becomes extremely valuable due to surrounding economic development?
What was the topic of your academic argument essay : What was the topic of your academic argument essay? Who is your audience for the everyday argument? What are you proud of with your argument?
Should the company enter new countries : Market recommendations: should the company enter new countries, refocus on the home market or seek to diversify geographically to reduce exposure to reduce.
The reserve brand be marketed as compared to ritz carlton : How will “The Reserve” brand be marketed as compared to a Ritz Carlton branded hotel?
Create a sub class for managers which inherits : You are a software development employee at a startup company. Create a sub class for Managers which inherits from the Employee Class.
What is the weight of the path : What is the path between 0 and 5? What is the weight of the path between 0 and 5?
What method did kellogg primarily use to get cereal : What method did Kellogg’s primarily use to get the cereal into the homes of potential customers?
How much money would the person earn on average : How much money would the person earn on average - What is the probability that at least one of the upward facing sides of the dice is a four, five or six
Statements regarding operations planning : Which of the following statements regarding operations planning is FALSE? The textbook lists the following activities as Supply Chain Risk Management activities

Reviews

Write a Review

Management Information Sys Questions & Answers

  The use of virtualization in a mid-sized to organization

The use of virtualization, cloud computing, mobile devices, wireless, and fiber optics present challenges and opportunities for the security professional charge

  How digital media has been used to influence organizations

You will research and identify articles/news stories that demonstrate how digital media has been used to influence individuals or organizations.

  Determine the benefits of visually displaying your data

From the dataset you chose, choose one categorical and one continuous variable and perform the appropriate visual display for each variable.

  Important information about replacement chain

Important information about Replacement Chain - Should the firm replace its old knitting machine, and if so, which new machine should it use?

  Question about data modeltrouble in trying to figure out

question about data modeltrouble in trying to figure out and draft a model that initially identifies the entities and

  Write similar research report describing sap key erp systems

AS a contrast to the Oracle research paper in Module 7, write a similar research report describing SAP key ERP systems. Your report should include a description of each ERP.

  Create a communications plan for the project

Create a communications plan for the project. He would like to meet with you in two hours to review your thoughts on the key objectives.

  Write a three page paper on social networking

Write a three page paper on Social Networking. what it is, how it is used, and potential positive and negative impacts on individuals and on society.

  Create a network drawing

Create a network drawing, specific to Acme Corporation, listing the network's topology including any necessary hardware.

  How healthcare data is incorporated into statistics

Hypothesize two (2) ways that today's healthcare informatics plays an even greater role in quality healthcare delivery and research techniques.

  Describe a fictional healthcare organization and its techno

How has the law protecting health information impacted access to healthcare information and According to the insights, posts, and press releases posted on the site, how successful has the law been at protecting health information?

  Describe the process of performing a risk assessment

Analyze the term "risk appetite". Then, suggest at least one practical example in which it applies.Describe the process of performing a risk assessment.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd