MITS4002 Object-Oriented Software Development Assignment

Assignment Help Computer Engineering
Reference no: EM132387845

MITS4002 Object-Oriented Software Development

Victorian Institute of Technology

Project - Tattslotto

Programming Project

Part 1: Arrays & Inheritance

Problem Description

This project is based on the design, and implementation in Java, of the seven different Lottery games being Saturday Tattslotto, Oz Lotto and Powerball.

In Part 1 of the project, you are asked to use arrays and inheritance to code versions of these games and in Part 2 to create an appropriate GUI that writes to a report file.

Summary of Some of the Lottery Games
(From the Help pages of the above web site)

You will notice from your research and examination of the table that all games have several things in common.
All games
• have a name,
• run on a day of the week
• have a set of randomly generated numbers.

Also, each of the randomly generated numbers have a minimum and maximum possible value, for example: For Powerball, the minimum value is 1 and the maximum value is 35.

An abstract class, LuckyGame can be used to represent the generic concept of a game of chance. A suitable partial design is shown in the following UML diagram. In the UML diagram:

• The LuckyGame class represents the generic concept of a game of chance and therefore is to be declared as an abstract class. It contains two abstract methods setNumberOfRandoms( ) and collectUserInput (String input). The LuckyGame class also contains an array of String which is used to record the randomly generated numbers used by each object of LuckyGame type.
• The class TattslottoGame is a LuckyGame and it thus should implement code for
LuckyGame's two abstract methods as well as its own constructor and any other methods.
• The games SaturdayTattslotto and Oz Lotto are all instances of the class
TattslottoGame.

• You can implement the remaining class games in any manner you believe appropriate.
For example, class PowerBallGame can be implemented using either using

o Option 1: the class PowerBallGame is a LuckyGame and thus should implement code for LuckyGame's two abstract methods as well its own constructor and other methods.

o Option 2: the class PowerBallGame is a TattslottoGame and thus should implement code for its own constructor and other methods.

• You have been provided with some code for the class TestGames, which is a text-based application used to create instances of games and test all of their respective behaviours.

• To collect user input for all games, a class UserInput is needed. It should collect user input and deal with any problems in the input, such as repeat numbers or numbers outside the possible range of values.

Programming Project

Part 2: Graphical User Interfaces/Applets & Files & Exceptions

In Part 1 of the project, you are asked to use arrays and inheritance to code versions of 7 Lottery games. In Part 2, using swing classes wherever possible, you need to create an applet for players. The applet should allow a player to choose and run a game of their choice and find out the results of their game. Each time a game is played, the applet writes information about the game to a file called report.txt. This information would be similar to that shown as sample output for Part 1.

Attachment:- Object-Oriented Software Development.rar

Verified Expert

This assignment is of Java GUI programming in which we implement 3 different kind of Lottery Game.The program uses the concept of classes, inheritance, abstract classes, and array, array list, and random numbers to implement the GUI for the playing lottery games.

Reference no: EM132387845

Questions Cloud

Discuss the advantages of the tool : Discuss the advantages of the tool. Your research paper should be at least 3 pages (600 words), double-spaced, have at least 3 APA references.
People are the weakest link in an organization network : People are the weakest link in an organization's network. Do you agree that people are the weakest link in the information security chain?
What are your proposed countermeasures : Introduction for your topic. Also, include a few major statistics about related threats. What are your proposed countermeasures to solve the problem?
Discusses decision making using system modeling : discusses decision making using system modeling. The author briefly mentions open source software tool, EMA Workbench, that can perform EMA and ESDMA modelinG
MITS4002 Object-Oriented Software Development Assignment : MITS4002 Object-Oriented Software Development Assignment help and solution, Victorian Institute of Technology, Assessment help-Design and implementation in Java
Despite the alleged importance of scientific advice : We learn from the author's case studies that, despite the alleged importance of scientific advice in the policy-making process, its evident.
Cybersecurity for successful acquisition : Cybersecurity for a Successful Acquisition, Slides to Support Executive Briefing. Knowledge of methods and tools used for risk management and mitigation of risk
Formulate policies associated with climate change : The authors assert that the twentieth century is considered as the century of population explosion and fossil fuels burning, environmental policies.
What are the cloud security myths : Review in 500 words or more the video above called Cloud Security Myths. Cite your sources. Do not copy. Write in essay format not in bulleted, numbered.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd