object oriented programming, JAVA Programming

Assignment Help:
Theobjectiveoftheassignment is tofamiliarize youwithinheritance, GUIand abstraction.
Create anabstractclass named that includesprivatefields for the InternationalStandard BookNumber(ISBN),price, author anda protected fieldtitle. Include properties for eachfield. (An ISBN is aunique number assigned to eachpublished book.) Providepublicget and set accessors for eachfield.Create a child class named that includes aprivategrade levelfield, andachildclass that contains no aditionalfields.(Note: Youyourself have to decide on the data type and name ofthe field.)The following class diagram demonstrates the scenario. Include agetTitleabstract method (which is just an
accessor method) in theBookclass and override this method in its subclasses.
<>
Book


TextBook


CoffeeTableBook


In the child classes, overide the accessormethodofa ’sprice so that s must be pricedbetween $20.0 and $80.0, inclusive, and themust bepriced between $35.0 and$10.0, inclusive.Also provide get and set accessors forgrade levelfieldin theclass named .Overloadconstructors for allclasses.

Design two User Interfaces (forms):ILoginandIBook.
TheILoginwill be used to get access to the IBook interface. Once successfully logged-in the IBookinterface should be displayed. (Use the following data for Login?UserName: User1; Password:
passwd )
respectively.Use Either JLabel,JTextField and JButton ortheJOptionPane instead, fordata entry, i.e.setting values forthe datamembers andoutputthevaluesof allthe data membersin anicely formattedfashion.(Note: youyourself have to anticipatethe display of the interface)You are only required to validate the Books price in TextBook and CoffeeTableBook Classes. Assume that the
user does the other work (entry) correctly i.e. no other error handling is required.
for eachsuper & subclassmethod to describe what the method is doing when invokedbythe mainprogram.Also writeyourstudent Id number, name and program of study at the top of theJFrame classusing comments.

Related Discussions:- object oriented programming

Explain the different kinds of exceptions, Explain The different kinds of e...

Explain The different kinds of exceptions ? Checked Exceptions  : Environmental error in which cannot necessarily be detected through testing; e.g. broken socket, disk full,

Development of an application using jade agent toolkit, You need to build a...

You need to build an agent system using the JADE Toolkit that allows the lecturer of FIT5031 to broadcast their availability and arrange for consultation with students in a dynamic

Creating applications based on soa, Creating applications based on SOA ...

Creating applications based on SOA Select your implementation technologies carefully. Carefully check if Web services are suitable. Sometimes using traditional methods suc

What are trojan horses, What are Trojan Horses? Trojan Horses are unlik...

What are Trojan Horses? Trojan Horses are unlike viruses usually they are stand-alone programs. The look such as what they are not. They appear to be something harmless and int

Website for swapping and selling books, Website for swapping/selling books ...

Website for swapping/selling books Project Description: Seeking a website where students can sell and buy books. I want them to swap books as well. Payment options are requir

Reading or writing disk files, For this assignment, you will simulate a fil...

For this assignment, you will simulate a file system. You will be neither creating files nor reading or writing disk files. Rather, you will have a simulation of a file system that

Code, Alia is appearing for the board exams. In order to qualify for the ne...

Alia is appearing for the board exams. In order to qualify for the next class Alia need to get exactly X credits. In current semester Alia has to study N number of subjects, and ev

Java, 1. Which of the following are not valid Java identifiers, and why? (...

1. Which of the following are not valid Java identifiers, and why? (a) wolVes (b) United(there is only one) (c) 87 (d) 5 3 (e) Real ale (f) isFound?by 2. A class Television

Design and implement online food delivery system, You are required to desig...

You are required to design & implement online food delivery system using Java RMI technology. This involves writing both the server and the client program(s). Client programs can u

Difference between hashmap and hash table, Difference between HashMap and H...

Difference between HashMap and Hash table HashMap: It allow us to have null values and also one null key It is Unsynchronized. Iterator in HashMap is Fail-Safe.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd