Two emergency response plans

Assignment Help Basic Computer Science
Reference no: EM131524454

Consider the following scenario. You have been asked to extend WERS so that two emergency response plans can be generated for spills that are reported simultaneously.

To handle this, you will need to develop code that generates two response plans concurrently using the WERS Planner. The response plan processes must be created as threads, and they must run simultaneously. You may create threads as either subclasses of the Thread class or as classes that implement and use the Runnable interface. Whichever way you decide to implement them you must make sure that they are running simultaneously.

Your processes should provide enough output to standard error (stderr) to clearly show when each thread starts and finishes, what its Project ID is, and what planner it is using. You may wish to include additional information from each thread as it runs.

At the minimum, make sure that your system sends the following information to stderr :

  • What threads are running
  • When each thread starts and ends
  • What planner object each thread accesses

Once you have completed your updates, confirm the system runs as required.

Verified Expert

For them to run at the same time, each of these two assignments will run in an isolated string. To characterize a execute job simultaneously we will wrap each of these Runnables around an object. Runnable. A Runnable question characterizes an real assignment that is to be executed.

Reference no: EM131524454

Questions Cloud

Command to show all commands : Use the fc command to show all commands you have executed since the last time you executed grep.
Symmetric and public-key encryption : One of the most widely used public-key encryption algorithms is RSA. RSA was developed at the Massachusetts Institute of Technology (MIT) in 1977 by Ron Rivest
Find the approximate ce for the investment : A decision maker's assessed risk tolerance is $1,210. Assume that this individual's preferences can be modeled with an exponential utility function.
Clinicians practicing rogerian therapy : How do you think clinicians practicing Rogerian therapy would approach these concepts for these clients?
Two emergency response plans : You have been asked to extend WERS so that two emergency response plans can be generated for spills that are reported simultaneously.
Describe how physical structure affects human behavior : Describe how physical structure affects human behavior.Analyze architecture as a means of controlling human behavior.
Analyze an equation and graph of a generic model : In the first part of the activity, you will analyze an equation and graph of a generic model of limited logistic growth.
Element of an it system : What element of an IT system do you think is responsible for most problems according to many (most, I think) security practitioners?
Ideal communication mechanism : The Internet is an ideal communication mechanism because of its openness and anonymity but people must make ethical decisions about how to use this power.

Reviews

inf1524454

5/9/2018 5:56:47 AM

Submit the following: The source code for any new or updated classes with appropriate comments (Make sure to include the following comment above your updates: "// CHANGED for THREAD IMPLEMENTATION".) A brief description of how you applied the threads (as either a subclass of thread, or as separate runnable processes) and a justification for how you applied them Screenshots of the updated system running, with the relevant output to stderr A single, updated UML sequence diagram that shows how your thread process interacts with the WERS Planner

Write a Review

Basic Computer Science Questions & Answers

  Describe advantages of the cta over the fft algorithms

For which applications is the zoom-FFT more suitable than the basic FFT algorithm?

  What is the magnitude of this force

Physics Suppose that during a storm, the force of the wind blowing against a skyscraper can be expressed by the vector (115, 2018, 0), where each measure in the ordered triple represents the force in Newtons. What is the magnitude of this force?

  Analyze the use of gestures in ipads

Analyze the use of gestures in iPads. Address how users feel about gestures. Evaluate how users feel about the user input when it comes to filling out complicated forms on the iPad.

  Recode the hotelroom class programming

Recode the HotelRoom class programming Problem 4, Section 10.3 as follows. Replace the string room number by a character array that stores a 3-character room number.

  Very simple python problem

VERY SIMPLE PYTHON PROBLEM An evil number is a positive integer whose binary digits add up to an even number (the opposite of an evil number is an odious number, whose binary digits add up to an odd number). For example, 14 is odious:

  Capturing the functional requirements

1. Draw a use case diagram capturing the functional requirements from thestatement below: Show the correct use of either > or >. 2. Develop a domain class diagram needed to support your use case diagram.

  Scr internet site and learn about the company

1. Investigate SCR's internet site and learn about the company's history, purpose, and values. Send Jesse a brief email with suggestions to expand or improve these sections.

  What are the benefits of flexible page layouts

What are the benefits of flexible page layouts? What are the benefits of fixed layouts? Can you provide URLs that point to examples of both?

  Endowment of factor accounted for by each country

Here is the information about each country share of the world endowment of a factor. Percentage of the world endowment of factor accounted for by each country:

  Challenges in the global business environment

According to the textbook, ongoing challenges in the global business environment are mostly attributed to unethical business practices, failure to embrace technology advancements, and stiff competition among businesses. Use the Internet to researc..

  Write a pseudo code program for shifting data

write a pseudo code program for shifting data to make a gap at some specified location of a sorted fi le. Pay particular attention to the details of shifting the last item out of one block and into the first position of the next block.

  Explaining good message digest function

Then calculate message digest on the result. Would this be a good message digest function? Describe. Message digests are reasonably fast.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd