Select appropriate variable

Assignment Help Basic Computer Science
Reference no: EM13859797

1. (TCOs 1-8) NOTE: YOU DO NOT have to compile/run this code in eclipse. You are writing the code here only.

Write a class called point

that has attributes and methods to model an (x,y) coordinate in a 2-D environment.

Select appropriate variable(s).

Write a default and parameterized constructor.

Write set and get methods for the variables.

Write a Print method to display the variables when called.

Write a test program to test the methods.

2. (TCOs 1-8) NOTE: YOU DO NOT have to compile/run this code in eclipse. You are writing the code here only.

Write a class called square which inheres the above point class.
A square is described by a point which is one corner of the square and the length
of the side of the square.
Select appropriate variable(s).
Write constructors.
Write access methods for the variables.
Override the inherited print method to display variable in square and point.
Write a test program to test it.

 

3. (TCOs 1-8) Start from the following code, and add Action Listener to make it functional. The user inputs a temperature in celsius or farenheit in the appropriate textbox, then clicking the arrow will convert and display the result. (Note ONLY code the ACTION LISTENER, you should only need about 10 lines of code)

Note the formula to convert farenheit to celsius:  C = 5/9(F - 32)

import javax.swing.*;
import
java.awt.GridLayout;
import
java.awt.event.*;
import
java.text.DecimalFormat;

public class temperatureConverter extends JFrame {
public static void
main(String[] args) {
JFrame frame = new temperatureConverter();
frame.setTitle("Temp");
frame.setSize(200, 100);
frame.setLocationRelativeTo(null);
frame.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
frame.setVisible(true);
}

public
temperatureConverter() {
JLabel lblC = new
JLabel("C",SwingConstants.CENTER);
JLabel lblF = new
JLabel("F",SwingConstants.CENTER);
final
JTextField jtfC = new JTextField();
final
JTextField jtfF = new JTextField();
JButton jbtLeft = new JButton(" JButton jbtRight = new JButton("=>");

JPanel panel = new JPanel(new GridLayout(2, 3));
panel.add(lblC);
panel.add(jbtLeft);
panel.add(lblF);
panel.add(jtfC);
panel.add(jbtRight);
panel.add(jtfF);

this.add(panel); // Add panel to the frame

final
DecimalFormat dec = new DecimalFormat("#.00");
}
}

4. (TCOs 1-8) Start from the given class, and create a NewPanel class to draw a figure like below: YOU DO NOT have to compile/run this code in eclipse. You are writing the code here only. Need about 15 lines of code.

import javax.swing.*;
import
java.awt.Graphics;
import java.awt.Color;

public class drawFlag extends
JFrame {
public
drawFlag() {
add(new
NewPanel());
}
public static void
main(String[] args) {
drawFlag frame = new drawFlag();
frame.setTitle("Flag");
frame.setSize(200, 200);
frame.setLocationRelativeTo(null); // Center the frame 
frame.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
frame.setVisible(true); 
}
}

The post tip is a solid circle coordinate and size is (68, 28, 4, 4).
The flag tip is a rectangle with coordinate and size is (70, 30, 50, 30).
The text coordinate is (85, 118).
The starting and ending coordinate for the post is (70, 30, 70, 120).
Color blue with text black.

Reference no: EM13859797

Questions Cloud

A hotel salesperson enters sales in a text file : A hotel salesperson enters sales in a text file. Each line contains the following, separated by semicolons: The name of the client, the service sold (such as Dinner, Conference, Lodging, and so on), the amount of the sale, and the date of that event...
The traditional approach to modelling : 1. Outline the primary ways in which the traditional approach to modelling a use case differs from an object-oriented approach. Develop a scenario in which you would use the traditional approach over the object-oriented approach, and explain your rea..
Explain the various privacy rights : Explain the various privacy rights that businesses on the Web are lawfully obligated to adhere to. Describe some of the gray areas in enforcing these laws on the Internet. When we consider gray areas, think about privacy issues that companies may not..
New string and the string''s length : Copy first half and last half of the characters into two other strings. Print the two strings. Form a new string like this:  _? . (first half of the string followed by the 3 characters _,?, and then followed by second half of the string). Print this ..
Select appropriate variable : 1. (TCOs 1-8) NOTE: YOU DO NOT have to compile/run this code in eclipse. You are writing the code here only. Write a class called point that has attributes and methods to model an (x,y) coordinate in a 2-D environment. Select appropriate variable(s..
The probability of finding an electron at a point in an atom : The probability of finding an electron at a point in an atom is referred to as the probability density (). The spatial distribution of these densities can be derived from the radial wave function and angular wave function , then solving the Schrdinge..
Calcium sulfate is sparingly soluble in water : Calcium sulfate is sparingly soluble in water. describe and explain what would you see when few cm^3 of concentrated of Na2SO4 (aq) were added to a solution of CaSO4 (aq).
Calculate the percent yield of al2o3 : Assume you take a sample of 13.6 g Al and oxidize it (in an excess of O2) to produce 12.07 g of Al2O3. Calculate the percent yield of Al2O3. Reaction: 4 Al + 3 O2 → 2 Al2O3.
What concentration of sulfuric acid remains after neutraliz : 2KOH + H2SO4 --> K2SO4 + @H2O .850 L of .450 m h2so4 is mixed with .800 L of .230 M KOH. what concentration of sulfuric acid remains after neutralization

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain how primitive values like doubles are passed

Explain how primitive values like doubles are passed between functions in Java. How are string objects passed between functions in Java?

  Analytics-management science or model challenge in the real

The last section of the report should discuss the future opportunities and challenges of solving the problem. What will help solutions improve? What limitations remain?

  Information systems manager for a small manufacturing plant

As the information systems manager for a small manufacturing plant,

  Create a new group called mygroup

Directions: As you complete each of the following steps, keep track of what occurs at each point, including what you type, the output given, and if you experience any errors.

  Design an enhanced entity relationship

Develop, document and design an Enhanced Entity Relationship (EER) model for this situation.  You are working for country club with thousands of members. You have been tasked with designing a database to keep track of the members and their guests.

  Create a class for triangle objects

Create a class for Triangle objects..Triangle class should inherit from a Shape class and implement its own getArea() and getPerimeter() methods. create a program to test Triangle class and include a method that takes a Shape object as a parameter..

  Prior insertion system.out.printf formatting output in java

Prior to insertion of System.out.printf(), formatting the output to the console in Java

  What fraction of bus cycles are available for dma transfer

Estimate the maximum transfer rate if DMA is used. For DMA access, assume one word is transferred for each bus cycle, and ignore any setup or status-checking time. Your answer from part B should be helpful for this calculation. million words /sec

  Use the sql command line in oracle to perform

One of a DBA's primary responsibilities is to create and manage database user accounts and to grant or revoke access privileges as needed. Users should be able to access or modify only those parts of the database that they need to perform their jo..

  Describe the meaning of the resource

Describe the meaning of the subsequent two Resource Records:

  Determining the decryption exponent for rsa key

Let the public key associated with an RSA key be (3,15) where e = 3 is the encryption exponent, and n = 15 is the modulus. The corresponding decryption exponent d is then

  How does a network based idps differ from a host based idps

How does a network based IDPS differ from a host based IDPS?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd