Select an animal from a menu

Assignment Help Basic Computer Science
Reference no: EM131330373

For this project, you will write a Java program that allows the user to select an animal from a menu and then display information about the animal.

  • Create a new project in your IDE named "AnimalInfo."
  • Create a class called "AnimalInfo" as the main class for the program.
  • Create a class called "Animal" with a virtual method displayInfo().
  • Create 3 classes inherited from Animal (one for each of your animals). Each of the inherited classes should override Animal.displayInfo() to display information about the animal. The information should just be a short description of the animal displayed to the screen.
  • In the AnimalInfo.main() method, display a menu allowing the user to choose 1 of 3 animals or quit the program. The menu should accept input from the user and take the appropriate action and then repeat until the user selects the option to quit. Hint: Simple menus are easiest to implement if the user selects a letter or number for each menu item.
  • When the user selects an animal, use the displayInfo() method of the appropriate class to display information about the selected animal.
  • Use comments throughout your code demonstrating your understanding of each statement of code.
  • Make sure the program runs correctly before submission.
  • Create a zip that includes your project folder and Word document, and upload it to the course portal.

Reference no: EM131330373

Questions Cloud

Write down the situation as a strategic form game : Write down this situation as a strategic-form game, where the set of players is the set of people arrested, and the utility of each player (suspect) is 10 minus the number of years he spends in jail.
Advantages and disadvantages of biometrics : 1. Not all security experts agree about the value of biometrics. What are the advantages and disadvantages of biometrics? 2. What concerns to privacy advocates have about biometrics? Do you agree or disagree with the concerns? Please explain.
Discuss about the target market : Your term project is to select either an orphan brand or a potential product and draft a proposal for a launch of the product. Your paper is to include a description of target market, measurable objectives, description of the product (if an orphan..
Find all the equilibria in mixed strategies : Find all the equilibria in mixed strategies, and all the equilibrium payoffs.- Find each player's maxmin strategy.- What strategy would you advise each player to use in the game?
Select an animal from a menu : For this project, you will write a Java program that allows the user to select an animal from a menu and then display information about the animal.
Compute adjusted cash balance per bank for santas packaging : Using the following information, determine the adjusted cash balance per bank for Santa's Packaging on November 30. Internal control over a company's assets should include which of the following?
Protocol maps and tcp-ip addresses : Start with identifying what protocol(s) are causing the problem. What standard TCP/IP protocol is responsible for telling a computer what addresses and servers it should use to connect to the network? What application protocol maps TCP/IP addresses ..
Can you find rules that have interesting behavior : Create a SETUP button to initialize your model and a GO button to run it. In your write-up of the model, make sure to explicitly describe the rules the agents are following. Try running the model in different ways. What set of parameters gives you..
Write out the mixed extension of the game : For each of the games, where Player I is the row player and Player II is the column player:- Write out the mixed extension of the game.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the number of delays and multipliers required

What is the number of delays and multipliers required for the efficient implementation of a second-order all-pass system?

  Application-the strategic planning process

The volatile healthcare market demands that providers be nimble competitors with advanced, ongoing planning processes that drive growth and organizational effectiveness" (Zuckerman, 2006, p. 3). How does-or should-this perspective inform strategic ..

  The three most important deliverables in scope definition

What are the three most important deliverables in scope definition? What are some benefits and potential problems in using an abrupt cut-over conversion and in using a parallel conversion strategy?

  Show that if strings over an alphabet are encoded

Show that if strings over an alphabet A with at least two letters are encoded over a one-letter alphabet (a unary encoding), then strings of length n over A require strings of length exponential in n in the unary encoding.

  List and assess at least three kinds of damage a company

1. List and assess at least three kinds of damage a company could suffer when the integrity of a program or company data are compromised.

  Expect development success

The goal of most organizations is to operate in an environment similar to CMM levels 2 repeatable or level 3 defined where projects are well documented and follow standards and best practices learned from previous implementations. It is virtually imp..

  Strategic choices that the firm has made

How do these issues relate to the strategic choices that the firm has made? Does the analogy to a manufacturing firm seem appropriate?

  How difficult would it be to maintain this index

How difficult would it be to maintain this index within the add and remove operations?

  How a non-it senior manager would arrive at the decision

How a non-IT senior manager would arrive at the decision to support one IT diffusion model over another. List the factors that would have to be considered. Determine which model you would choose and explain why.

  What are the pros and cons of out-of-band network

A network management system can communicate with a managed device using a request-response protocol or a trap mechanism. What are the pros and cons of these two methods?

  How to construct a moore fsm

It is straightforward to show that every Moore FSM is a Mealy FSM. Given a Mealy FSM, show how to construct a Moore FSM whose outputs for every input sequence are identical to those of the Mealy FSM.

  How to implement standard approach to systems development

"Implementing the standard approach to systems development helps experienced staff and new hires to be more productive, as they spend less time wondering how to do something and more time doing it?"

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd