Design a class named rectangle to represent a rectangle

Assignment Help Basic Computer Science
Reference no: EM131158078

Following the example of the Circle class in Section 9.2, design a class named Rectangle to represent a rectangle. The class contains:

  • Two double data fields named width and height that specify the width and height of the rectangle. The default values are 1 for both width and height.
  • A no-arg constructor that creates a default rectangle.
  • A constructor that creates a rectangle with the specified width and height.
  • A method named getArea() that returns the area of this rectangle
  • A method named getPerimeter() that returns the perimeter.

Draw the UML diagram for the class and then implement the class. Write a test program that creates two Rectangle objects-one with width 4 and height 40 and the other with width 3.5 and height 35.9. Display the width, height, area, and perimeter of each rectangle in this order.

Reference no: EM131158078

Questions Cloud

Example of a programming problem : What is an example of a programming problem that would be difficult, if not impossible, to code without the use of arrays? Describe the problem and write the pseudocode for it using an array.
Draw and label a flow chart the process : draw and label a flow chart the process. In addition to the process provided in the above flow sheet, Additional variables and relationships are defined. They are shown separately here for clarity
Using digital forensic tools or encryption tools : Using digital forensic tools or encryption tools in the virtual lab to extract the text in the picture (10%) and answer the question (10%).
Create a risk-free hedge portfolio can be created : Determine two to three methods of using stocks and options to create a risk-free hedge portfolio can be created. Support your answer with examples of these methods being used to create a risk-free hedge portfolio.
Design a class named rectangle to represent a rectangle : Following the example of the Circle class in Section 9.2, design a class named Rectangle to represent a rectangle. The class contains:
Which platform has a higher market share : Which platform has a higher market share? What are the common security concerns for both platforms? Which platform would you suggest implementing and why?
How globalization affected stakeholder coalition building : Why do stakeholders build coalitions as a means of increasing salience? How has globalization affected stakeholder coalition building? How has globalization of coalitions affected stakeholder salience?
Sketch the energy band diagram for an n p n transistor : Sketch the energy band diagram for an n-p-n transistor in equilibrium.- Sketch the energy band diagram for n-p-n BJT in forward active mode.
Find an article where important information : Find an article where important information was recovered from the recycle bin or the INFO2 folder, summarize the article in your own words, and discuss why an investigator should care about this information. Include the link to the article

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Briefly describe how you could achieve this

Suppose you would like to have most of your program variables residing in external RAM while a few time-critical variables should reside in the first 128 bytes of internal RAM. Briefly describe how you could achieve this.

  What is meant by the term point of view

What is meant by the term point of view?

  What is included in an it policy framework

What is included in an IT policy framework. Incident reporting, incident management, and user ID addition/removal are examples of which of the following

  Find monthly break-even volume for company

Variable cost per pound of fertilizer is $0.15. Evergreen sells fertilizer for $0.40 per pound. Find out the monthly break-even volume for company.

  Find newton interpolating polynomial for the function

Find Newton%u2019s interpolating polynomial for the function ;

  Enhanced home utility auditing program

The user should be able to do the following:Enter the cost per kilowatt-hour. Select from a list of home appliances which includes a > or >, among other appliances

  Critical infrastructure protection

Critical Infrastructure Protection According to the text, Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure.

  Copies are identical with high confidence

Devise an efficient protocol that requires Alice and Bob to communicate only avery small amount of data(e.g. 512 bits)in total, and yet allows them to determine whether their copies are identical with high confidence.

  Design an excess-3 code converter to drive a seven-segment

Design a circuit which displays the letters A through Jon a seven-segment indicator.The circuit has four inputs W,X , Y,Z which represent the last 4 bits of the ASCII code for the letter to be displayed.For example, if l.vXY.Z = 0001, "A" willbe d..

  Typical hierarchy chart for a program

Draw a typical hierarchy chart for a program that produces a monthly bill for a cell phone customer. Try to think of at least 10 separate modules that might be included. For example, one module might calculate the charge for daytime phone minutes ..

  Main elements of data breach

Discuss the importance of breach notification for credit card information, as it relates to PCI-DSS.

  Procedural structure of a simple inventory-accounting system

Using a structure chart, recognize the procedural structure of a simple inventory/accounting system for a small store (perhaps a rivately owned curio shop in a resort community)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd