Create class to maintain personal budget for a year

Assignment Help Computer Network Security
Reference no: EM1352019

Q1) Create a class to maintain a personal budget for a year. The name of this class is Budget. The data your class will need, at a minimum, are:

an array of categories (like Tuition, Food, Clothes, etc). You should have at least six categories. You can use your own expenses as a guide.

an array for EACH category, storing the total monthly expenses for that category (think - how many items would be in each array?)

Create a constructor for the budget. You should have at least two constuctors - one if you have no expenses to record yet, and one if you are adding your first expense. Remember, each expense has two "fields" - the category name and the amount.

Create a method to add an expense to the budget. This method should know in which month the expense occurred, so figure out how many, and what data type, parameters are needed.

Create a method to print a report of the budget. Each category's current yearly total should appear on a separate line, and the final line would show the total expenses so far spent this year. For instance, a sample output might be:

Expenses as of Nov 4, 2011:

Tuition: $3200
Food: $2600
Clothes: $600
Books: $450
Total expenses: $6850

Reference no: EM1352019

Search the web for news on computer security breaches

Search the web for news on computer security breaches that occurred during April-August 2015. Research one such reported incident. Prepare a report focusing on what the prob

Network security

SLE, ARO, and ALE, behavioural biometric technology, Enterprise Information Security Policy, Issue Specific Security Policy, System Specific Security Policy, firewalls protec

Evaluate the strengths and weaknesses of the organizations

Evaluate the strengths and weaknesses of the organizations cybersecurity policy along attributes - Analyze the range of organizational policies (the policy framework) that are

Compute shortest path tree or implement dijkstras algorithm

Write a function compute Dijkstra(sourceID,C)' which takes as inputs the source node ID and the link cost matrix and returns the final best cost vector and the final predece

Identification of preventative controls

Identification of preventative controls and the development of recovery strategies and Explanation of the information technology (IT) contingency planning process to include

Routing protocol is a convention

An ad hoc routing protocol is a convention, or standard, that controls how nodes decide which way to route packets between computing devices in a mobile ad-hoc network. give

How did the attacker gain access to the system

How did the attacker gain access to the system? Provide as much detail as possible about the attack, the tool used, etc. What IP address or addresses did the attacker use?

Design and build a network infrastructure

You recently joined a small company of less than 50 employees to help design and build a network infrastructure. Analyze the network with the determination of how to secure th


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd