Create class to maintain personal budget for a year

Assignment Help Computer Network Security
Reference no: EM1352019

Q1) Create a class to maintain a personal budget for a year. The name of this class is Budget. The data your class will need, at a minimum, are:

an array of categories (like Tuition, Food, Clothes, etc). You should have at least six categories. You can use your own expenses as a guide.

an array for EACH category, storing the total monthly expenses for that category (think - how many items would be in each array?)

Create a constructor for the budget. You should have at least two constuctors - one if you have no expenses to record yet, and one if you are adding your first expense. Remember, each expense has two "fields" - the category name and the amount.

Create a method to add an expense to the budget. This method should know in which month the expense occurred, so figure out how many, and what data type, parameters are needed.

Create a method to print a report of the budget. Each category's current yearly total should appear on a separate line, and the final line would show the total expenses so far spent this year. For instance, a sample output might be:

Expenses as of Nov 4, 2011:

Tuition: $3200
Food: $2600
Clothes: $600
Books: $450
Total expenses: $6850

Reference no: EM1352019

Questions Cloud

Organizational culture and organizational spirituality : Organizational Culture and Organizational Spirituality - Identify the factors responsible for creating organizational culture for transmitting it, and getting it to change.
What is the radius of jupiter : How much acceleration does a 747 jumbo jet of mass 45000 kg experience in takeoff as the thrust for each of four engines is 45000 N.
Provide some examples of how technology is creating employee : Provide some examples of how technology is creating employee/employer rights and policy issues
Suggest a control weakness and test method : Proposed test method. On at least a quarterly basis, internal audit will go to each register and attempt to enter prices different from the list price for a selection of items using different employee names.
Create class to maintain personal budget for a year : Create a class to maintain a personal budget for a year. The name of this class is Budget. The data your class will need, at a minimum.
Risk tolerance levels of investors : Discuss and explain the risk tolerance levels of investors and also describe your risk tolerance level?
Explain carver memorial hospital surgeons : Explain Carver Memorial Hospital's surgeons have a new procedure that they think will decrease the time.
Explain a sample of 50 women is obtained : Explain a sample of 50 women is obtained and their heights and pulse rates are measured
Intrinsic and extrinsic motivation : What are the differences between intrinsic and extrinsic motivation? Do you believe that age and gender are influences in driving one to be more intrinsically or extrinsically motivated? Why or why not?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Research on workplace privacy laws

Determine how much time, if any, these two employees are spending surfing the Web. Is it wrong to access these records? Do some research on workplace privacy laws to justify your answer.

  Symmetric encryption algorithms

block cipher and a stream cipher, Caesar cipher, cryptanalytic attacks, mono alphabetic cipher and a poly alphabetic cipher, Mix Columns, Add Round key, PGP services, traffic padding, contrast link and end-to-end encryption

  Use of keys to communicate when alan sends private message

Alan and Beatrice are both users of (PKI)also called public key infrastructure. Describe how they use their keys to communicate when Alan sends a private message to Beatrice

  Discretionary and mandatory access control

Logic bombs, War dialing, Ping of death attack, steganography, RSA scheme, digital signature, A chain of certificates, A certificate revocation list, A trust anchor, asymmetric algorithm used by PGP, IPSec mode, IP virtual Private Networks

  Explaining wtls does not give message integrity protection

An earlier version of WTLS supported a 40-bit XOR MAC and also supported RC4 stream encryption. Show that this scheme doesn't give message integrity protection.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Identify and describe the organizational authentication

Identify and describe the organizational authentication technology and network security issues

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  Turtle shell architecture

Turtle Shell Architecture, zero-byte representation, Access Control List, DNS Cache Poisoning attack, 16-pass iterative and 9-pass recursive PHP function

  Protocol stack for wap2

WAP protocol, cellular network infrastructure, SSL protect against eavesdropping, network datagrams (packets) be protected at the network layer, pin and fingerprint, Certificate Revocation, Public Key Infrastructure, modern symmetric algorithm bl..

  Basic encryption and platform security

Read and summarize "Big iron lessons, Part 5: Introduction to cryptography, from Egypt through Enigma"

  Constructing the parameters of the rsa cryptosystem

The general method for constructing the parameters of the RSA cryptosystem

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd