Create class to maintain personal budget for a year

Assignment Help Computer Network Security
Reference no: EM1352019

Q1) Create a class to maintain a personal budget for a year. The name of this class is Budget. The data your class will need, at a minimum, are:

an array of categories (like Tuition, Food, Clothes, etc). You should have at least six categories. You can use your own expenses as a guide.

an array for EACH category, storing the total monthly expenses for that category (think - how many items would be in each array?)

Create a constructor for the budget. You should have at least two constuctors - one if you have no expenses to record yet, and one if you are adding your first expense. Remember, each expense has two "fields" - the category name and the amount.

Create a method to add an expense to the budget. This method should know in which month the expense occurred, so figure out how many, and what data type, parameters are needed.

Create a method to print a report of the budget. Each category's current yearly total should appear on a separate line, and the final line would show the total expenses so far spent this year. For instance, a sample output might be:

Expenses as of Nov 4, 2011:

Tuition: $3200
Food: $2600
Clothes: $600
Books: $450
Total expenses: $6850

Reference no: EM1352019

Questions Cloud

Organizational culture and organizational spirituality : Organizational Culture and Organizational Spirituality - Identify the factors responsible for creating organizational culture for transmitting it, and getting it to change.
What is the radius of jupiter : How much acceleration does a 747 jumbo jet of mass 45000 kg experience in takeoff as the thrust for each of four engines is 45000 N.
Provide some examples of how technology is creating employee : Provide some examples of how technology is creating employee/employer rights and policy issues
Suggest a control weakness and test method : Proposed test method. On at least a quarterly basis, internal audit will go to each register and attempt to enter prices different from the list price for a selection of items using different employee names.
Create class to maintain personal budget for a year : Create a class to maintain a personal budget for a year. The name of this class is Budget. The data your class will need, at a minimum.
Risk tolerance levels of investors : Discuss and explain the risk tolerance levels of investors and also describe your risk tolerance level?
Explain carver memorial hospital surgeons : Explain Carver Memorial Hospital's surgeons have a new procedure that they think will decrease the time.
Explain a sample of 50 women is obtained : Explain a sample of 50 women is obtained and their heights and pulse rates are measured
Intrinsic and extrinsic motivation : What are the differences between intrinsic and extrinsic motivation? Do you believe that age and gender are influences in driving one to be more intrinsically or extrinsically motivated? Why or why not?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd