object oriented programming, JAVA Programming

Assignment Help:
Theobjectiveoftheassignment is tofamiliarize youwithinheritance, GUIand abstraction.
Create anabstractclass named that includesprivatefields for the InternationalStandard BookNumber(ISBN),price, author anda protected fieldtitle. Include properties for eachfield. (An ISBN is aunique number assigned to eachpublished book.) Providepublicget and set accessors for eachfield.Create a child class named that includes aprivategrade levelfield, andachildclass that contains no aditionalfields.(Note: Youyourself have to decide on the data type and name ofthe field.)The following class diagram demonstrates the scenario. Include agetTitleabstract method (which is just an
accessor method) in theBookclass and override this method in its subclasses.
<>
Book


TextBook


CoffeeTableBook


In the child classes, overide the accessormethodofa ’sprice so that s must be pricedbetween $20.0 and $80.0, inclusive, and themust bepriced between $35.0 and$10.0, inclusive.Also provide get and set accessors forgrade levelfieldin theclass named .Overloadconstructors for allclasses.

Design two User Interfaces (forms):ILoginandIBook.
TheILoginwill be used to get access to the IBook interface. Once successfully logged-in the IBookinterface should be displayed. (Use the following data for Login?UserName: User1; Password:
passwd )
respectively.Use Either JLabel,JTextField and JButton ortheJOptionPane instead, fordata entry, i.e.setting values forthe datamembers andoutputthevaluesof allthe data membersin anicely formattedfashion.(Note: youyourself have to anticipatethe display of the interface)You are only required to validate the Books price in TextBook and CoffeeTableBook Classes. Assume that the
user does the other work (entry) correctly i.e. no other error handling is required.
for eachsuper & subclassmethod to describe what the method is doing when invokedbythe mainprogram.Also writeyourstudent Id number, name and program of study at the top of theJFrame classusing comments.

Related Discussions:- object oriented programming

Enumerate the java program development and execution steps, Java Program De...

Java Program Development and Execution Steps Java program normally go through five phases. These are 1. Edit, 2. Compile, 3. Load, 4. Verify and 5. Execute Co

Explain the concept of inheritance, Question: (a) (i) Explain the conc...

Question: (a) (i) Explain the concept of inheritance. Illustrate your answer with a suitable Java example. (ii) Java does not support multiple inheritance but does provide

Relate in brief - microsoft vs java, Relate in brief - Microsoft vs Java ...

Relate in brief - Microsoft vs Java Microsoft hates Java, as a Java program (portable) isn't tied to any particular operating system. If Java is popular, then programs written

Java Project, How to start a java project? how to draw a flow chart?

How to start a java project? how to draw a flow chart?

Explain the term - garbage collection, Explain the term - Garbage Collectio...

Explain the term - Garbage Collection Java  performs  garbage  collection  and  eliminates  the  need  to  free  objects  explicitly.  When an object  has  no references   to

A service locator, J2EE prepares use of the JNDI interface to access differ...

J2EE prepares use of the JNDI interface to access different resources like JMS, JDBC, EJB etc. The client finds up for these resources through the JNDI look-up. The JNDI look like

How can you describe a consistent web design, How can you describe a consis...

How can you describe a consistent web design? Why is it required? A consistent web design is Easy understandable, not along with heavy graphics, easy navigation. It is required

what is meant by binding in rmi, Binding is a method of associating or re...

Binding is a method of associating or registering a name for a remote object that can be used at a later time to look up that remote object. A remote object can be linked with a na

Describe about user security issues and social engineering, Describe about ...

Describe about User Security Issues and Social Engineering ? Contrary to popular belief most computer break-ins through external hackers don't happen since of great knowledge

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd