Write a java program that allows the user

Assignment Help Basic Computer Science
Reference no: EM131339484

For this project, you will write a Java program that allows the user to select an animal from a menu and then display information about the animal.

  • Create a new project in your IDE named "AnimalInfo."
  • Create a class called "AnimalInfo" as the main class for the program.
  • Create a class called "Animal" with a virtual method displayInfo().
  • Create 3 classes inherited from Animal (one for each of your animals). Each of the inherited classes should override Animal.displayInfo() to display information about the animal. The information should just be a short description of the animal displayed to the screen.
  • In the AnimalInfo.main() method, display a menu allowing the user to choose 1 of 3 animals or quit the program. The menu should accept input from the user and take the appropriate action and then repeat until the user selects the option to quit. Hint: Simple menus are easiest to implement if the user selects a letter or number for each menu item.
  • When the user selects an animal, use the displayInfo() method of the appropriate class to display information about the selected animal.
  • Use comments throughout your code demonstrating your understanding of each statement of code.
  • Make sure the program runs correctly before submission.
  • Create a zip that includes your project folder and Word document, and upload it to the course portal.

Reference no: EM131339484

Questions Cloud

Techniques used in a traditional workplace : How are Virtual Teams performance booster different from the techniques used in a traditional workplace? As a Virtual Leaders would you respond to the three Accountability questions?
What role company culture plays in executing managerial task : Discuss what is involved in performing the eight key managerial tasks that shape the process of implementing and executing strategy. Explain what role a company's culture plays in executing these managerial tasks.
Track a companys social media content : Create an inventory of the company's existing social media platforms including name, type, and general description for each platform. Next, determine each platform's main purpose and analyze the main role and influence that each platform has on th..
Security experts agree about the value of biometrics : 1. Not all security experts agree about the value of biometrics. What are the advantages and disadvantages of biometrics?
Write a java program that allows the user : For this project, you will write a Java program that allows the user to select an animal from a menu and then display information about the animal.
State the domain and range of the relation : State whether the graph represents a function. Explain.
Identify cybersecurity vulnerabilities that could introduced : Identify cybersecurity vulnerabilities that could be introduced by the new technology that might not be mitigated by technological configuration management.
Discuss about the social media competitive analysis : Read the article titled "30 Tips on Using Social Media for Competitive Analysis", located here. Next, select the top-three (3) tips that you would use to conduct social media competitive analysis for a small company of your choice. Explain your ra..
Research design flaws in cellular networks : Use the Internet to research design flaws in cellular networks that affect performance or security and find alternative designs that can improve capabilities.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Theorem for eulerian circuits

(a) Can you produce a similar arrangement for 1, 2, 3, 4, 5, 6, 7? (b) Use the theorem for Eulerian Circuits to show that there is a solution for n numbers if and only if n is odd.

  The goods are substitutes

(Substitutes and Complements) For each of the following pair of goods, determine whether the goods are substitutes, complements, or unrelated: Peanut butter and jelly, Private and public transportation, coke and pepsi, alarm clocks and automobiles, g..

  Mini case: k-mart

Mini Case: K-Mart

  Coordinates of both the robots

A robot B wants to cross a road, while another robot A is moving from left to right. (Fig 1.2) Assuming that each robot can determine the (x, y) coordinates of both the robots, outline the program for each robot,

  Representing passwords from the java console

1. Write a program that reads two words representing passwords from the Java console and outputs the number of characters in the smaller of the two. For example, if the two words are open and sesame, then the output should be 4, the length of the ..

  What trends in database technology

What is PL/SQL and how can that be used in DBA and database development work? What are stored procedures and triggers and how are they used in database applications? What trends in Database technology seem to be most prominent? Be sure to explain the..

  Sum-of-products representation

Run the program using step mode. Put the code inrto the online assignment area. Also indicate the new contents of the register affected by each instruction. For this you need to use the step mode.

  Sensitive to the needs of its customers

As a toy manufacturer, Lego must always be sensitive to the needs of its customers, both children and their parents, which requires the company to pay close attention to changing preferences and trends.

  Main types of file managers

There are three main types of file managers used in different distributions of Linux. Orthodox file managers or "Commander-like" file managers have three windows (two panels and one command line window).

  Driver class called fliprace whose main method created

PP 5.6: Using the Coin class defined in this chapter, design and implement a driver class called FlipRace whose main method created two Coin objects, then continually flips them both to see which coin first comes up heads three flips in a row. Contin..

  Analyze the behavior of the dns protocol

We also use ipconfig to manage the cached DNS records in the host computer. When we use these utilities, we set Wireshark to capture the packets sent by these utilities.

  Important considerations in the design of performance

What are some of the important considerations in the design of performance benchmarks for mobile devices? Why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd