Explain the purpose of the program

Assignment Help Basic Computer Science
Reference no: EM13828326

A car insurance company rates cars for insurability on two criteria-

1. Model of car. This company only insures Ford, Chevy and Toyota cars.

2. Year of car. Anything older than 1990 is not insured.

Write a Java program to enter the make and year of a car and tell the user if the car can be insured.

Follow this hierarchy chart to design the program:

1. The Initialize module is the welcome module. The module should also explain the purpose of the program before execution is passed on to the insureProcess module.

2. The InsureProcess module asks for the model of the car. That car model is then passed to the CheckModel module. If the car model is a Chevy, Ford, or a Toyota it returns a value of true to the insurable variable.

3. If the return value of insurable in the InsureProcess module is true, the program asks for the year of the car. That year is passed to the checkYear module and returns a value of true to the insurable variable, if the car is new enough.

4. The InsureProcess calls the printResults module passing it the insurable value (true or false) telling the user whether the car can be insured.

5. The cleanUp module thanks the user for using the program and at that time the program exits.

Reference no: EM13828326

Questions Cloud

Importance of bank relationship management : There is a growing importance of bank relationship management. Imagine you work in the corporate finance or treasury department of a medium-sized firm that often struggles with cash flow and liquidity.
Incorporate into your mass manufacturing business : Below is a list of items that you will need to incorporate into your mass manufacturing business. You are to create a manufacturing plant with 2 separate divisions. Each division will make one type of product (i.e. Textbooks and Pens or Shoes and Pur..
Report on porters five force : Report on Porters Five Force
Developing a personal investment strategy : First analyse your own situation and risk profile (character, life-style, time horizon, objectives, etc.), then reflect this is a portfolio of funds or ETF using the examples and providers chosen from David Costa's book (you can also use any ETF a..
Explain the purpose of the program : If the return value of insurable in the InsureProcess module is true, the program asks for the year of the car. That year is passed to the checkYear module and returns a value of true to the insurable variable, if the car is new enough.
Recommendations for howard schultz to sustain in the years : Recommendations for Howard Schultz to sustain in the years to come
Full responsibility for any unsold shares : Question 1    Your friend from Germany has decided to come and visit you in the United States. You estimate the cost of her trip at $2,805. What is the cost to her in euros if the U.S. dollar equivalent of the euro is 1.3112? Question 2    Which one ..
Identify a minimum of two neuropsychological tests : Identify a minimum of two neuropsychological tests Dr. Binet is likely to administer and explain why the tests were chosen. Justify the tests based on their validity and reliability
Financial objective of company in maximization : The primary financial objective of a company is the maximization of the wealth of shareholders ...per corporate finance theory.    However, this objective is usually replaced by the surrogate objective of maximization of the company's share price...

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write down macro definitions for adding and subtracting

Write down macro definitions for adding and subtracting two arguments.

  Newly released vulnerabilities on a daily basis

The world has to deal with newly released vulnerabilities on a daily basis.  These vulnerabilities eventually lead to active exploits of systems, and it is our job as cyber security professionals to stop that from happening.

  Use mcnaughton''s wrap around rule

Use McNaughton's wrap around rule to construct a preemptive

  How many sensors does snort use

Is Snort an HIDS or an NIDS? 2. How many sensors does Snort use? 3. What does a preprocessor do? 4. Is Snort anomaly-based or signature-based?

  Create the new instance of problem with graph

Assume we replace each edge cost Ce by its square, Ce^2, thereby creating the new instance of problem with same graph but different costs.

  Calculate the product of the two numbers

In general ask the user for 2 numbers, calculate the product of the two numbers (mul) and store product in memory. Then divide the 2 numbers entered and store the quotient and remainder in memory.

  Describe various types of dos attacks and techniques for pre

Describe various types of DoS attacks and techniques for preventingthem

  You should write each functionality

You should write each functionality from 1-7 in separate functions. You should provide a menu to the user as following:For inputs:

  How many hemoglobin molecules are there in an average red

How many hemoglobin molecules are there in an average red cell? Assume that the molecular weight of the human hemoglobin tetramer is 65 kd.

  Efforts to increase consumer awareness of products

Use of digital media within organizations has transformed how organizations communicate with prospective and current customers.

  Advantage to process the data

You can write your program to next the loops in either direction, that is, process row by row or column by column. Explain which way you would choose to process the data. What is the advantage?

  Describe the main elements of data breach notification

From the e-Activity, describe the main elements of data breach notification laws. Discuss the importance of breach notification for credit card information, as it relates to PCI-DSS.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd