Create class to maintain personal budget for a year

Assignment Help Computer Network Security
Reference no: EM1352019

Q1) Create a class to maintain a personal budget for a year. The name of this class is Budget. The data your class will need, at a minimum, are:

an array of categories (like Tuition, Food, Clothes, etc). You should have at least six categories. You can use your own expenses as a guide.

an array for EACH category, storing the total monthly expenses for that category (think - how many items would be in each array?)

Create a constructor for the budget. You should have at least two constuctors - one if you have no expenses to record yet, and one if you are adding your first expense. Remember, each expense has two "fields" - the category name and the amount.

Create a method to add an expense to the budget. This method should know in which month the expense occurred, so figure out how many, and what data type, parameters are needed.

Create a method to print a report of the budget. Each category's current yearly total should appear on a separate line, and the final line would show the total expenses so far spent this year. For instance, a sample output might be:

Expenses as of Nov 4, 2011:

Tuition: $3200
Food: $2600
Clothes: $600
Books: $450
Total expenses: $6850

Reference no: EM1352019

Questions Cloud

Organizational culture and organizational spirituality : Organizational Culture and Organizational Spirituality - Identify the factors responsible for creating organizational culture for transmitting it, and getting it to change.
What is the radius of jupiter : How much acceleration does a 747 jumbo jet of mass 45000 kg experience in takeoff as the thrust for each of four engines is 45000 N.
Provide some examples of how technology is creating employee : Provide some examples of how technology is creating employee/employer rights and policy issues
Suggest a control weakness and test method : Proposed test method. On at least a quarterly basis, internal audit will go to each register and attempt to enter prices different from the list price for a selection of items using different employee names.
Create class to maintain personal budget for a year : Create a class to maintain a personal budget for a year. The name of this class is Budget. The data your class will need, at a minimum.
Risk tolerance levels of investors : Discuss and explain the risk tolerance levels of investors and also describe your risk tolerance level?
Explain carver memorial hospital surgeons : Explain Carver Memorial Hospital's surgeons have a new procedure that they think will decrease the time.
Explain a sample of 50 women is obtained : Explain a sample of 50 women is obtained and their heights and pulse rates are measured
Intrinsic and extrinsic motivation : What are the differences between intrinsic and extrinsic motivation? Do you believe that age and gender are influences in driving one to be more intrinsically or extrinsically motivated? Why or why not?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Mitigating dos attacks against broadcast authentication

Mitigating DOS Attacks against Broadcast Authentication in Wireless Sensor Networks

  Analyze security requirements and prepare a security policy

Analyze security requirements and prepare a security policy.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

  Question on security infrastructure and protocols

Question on Security infrastructure and protocols

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Scenario-based project

Authentic Assessment:   The scenario will be a realistic, enterprise-level situation encompassing diverse networking components, including Microsoft Windows, Linux, VoIP, security, wireless, and Cisco technologies.

  Concept of subletting in v6

small package routing is more efficient in IPV6 than in IPV4, increase the hacking factor, network security model (NSM), ACL, VLAN, war dialing

  Defects of gsm networks

Security mechanism, threat, GSM networks, DDoS attacks, IPv4, IPv6, IPsec integrity, authentication and privacy, IPsec AH,  ‘single sign-on' in the context of access control, Secure Electronic Transaction (SET) protoco,  Encryption

  Turtle shell architecture

Turtle Shell Architecture, zero-byte representation, Access Control List, DNS Cache Poisoning attack, 16-pass iterative and 9-pass recursive PHP function

  Cryptosystem

Block cipher, Primitive root, Confusion, Diffusion, Digital signature, Conventional Symmetric-Key Encryption

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Owasp top 10 web application security risks

Reflected XSS and Stored XSS attack, threat Modeling methodologies, Extended Stack Pointer (ESP) and the Extended Base Pointer (EBP), Canary-based defense to buffer overflow attacks in C language, admin.aspx, Index hijacking, cross-site request fo..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd