Write a program that converts a number entered

Assignment Help Basic Computer Science
Reference no: EM131348831

Programming Exercises

1. Write a program that converts a number entered in Roman numerals to decimal form. Your program should consist of a class, say romanType. An object of romanType should do the following:

a. Store the number as a Roman numeral.

b. Convert and store the number into decimal form.

c. Print the number as a Roman numeral or decimal number as requested by the user. (Write two separate functions-one to print the number as a Roman numeral and the other to print the number as a decimal number.)

The decimal values of the Roman numerals are: me of type

M 1000

D 500

C 100

L 50

X 10

V 5

I  1

Remember, a larger numeral preceding a smaller numeral means addition,

so LX is 60. A smaller numeral preceding a larger numeral means subtraction, so XL is 40. Any place in a decimal number, such as the is place, the 10s place, and so on, requires from zero to four Roman numerals.

d. Test your program using the following Roman numerals: MCXIV, CCCLIX, and MDCLXVI..

2. Write the definition of the class dayType that implements the day of the week in a program. The class dayType should store the day, such as Sunday for Sunday. The program should be able to perform the following operations on an object of type dayType:

a. Set the day. 

b. Print the day.

c. Return the day.

d. Return the next day.

e. Return the previous day.

f. Calculate and return the day by adding certain days to the current day.

For example, if the current day is Monday and we add 4 days, the day to be returned is Friday. Similarly, if today is Tuesday and we add 13 days, the day to be returned is Monday.

g. Add the appropriate constructors.

3. Write the definitions of the functions to implement the operations for the Class dayType as defined in Programming Exercise 2. Also, write a program to test various operations on this class.

Reference no: EM131348831

Questions Cloud

Program for keeping track of team members : Your program for keeping track of team members is coming along, but now you want to be able to include phone numbers and jersey numbers along with your team member's name. Modify your program from week 4 so that the program utilizes object-oriente..
Write an essay about cell phone control our relationships : Write an essay. This draft will include argument about cell phone control our relationships. It should have 3 new sources. It should be 750 words.
Vulnerabilities the terms threat : Topic 1: Threats, Risks, and Vulnerabilities The terms threat, risk, and vulnerability are sometimes used interchangeability. However, these terms have distinct meanings and must be used properly when conducting risk assessments and protecting sys..
Write about mens and womens appearances : Write about men's and women's appearances. In one paragraph, describe someone you know who is overly concerned about his/her appearance.
Write a program that converts a number entered : 1. Write a program that converts a number entered in Roman numerals to decimal form. Your program should consist of a class, say romanType. An object of romanType should do the following:
Reviews the management of adelaides metropolitan beaches : Regular reviews of the management of Adelaide's metropolitan beaches havesupported the replenishment strategy as the most cost-effective way of maintaining sandy beaches and protecting property on the foreshore.
Explain the basic composition of the network : - Explain the basic composition of the network (LAN, WAN) - Transmission technologies involved (copper, fiber, wireless)
Discuss what you learned about your own moral reasoning : Discuss what you learned about your own moral reasoning compared with the moral reasoning of others who participated in this experiment (this will be available to you in the analysis section).
Standardization of html : Explain what is meant by effective HTML code. Decide if all HTML code should be the same (standardized) or at the discretion of the designer. Explain your decision.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Provide your opinion on the gui versus the command line

provide your opinion on The GUI versus the Command Line. Use the Internet to research the long standing debate of the "GUI versus the Command Line". Based on your research and what you have learned so far in this class.

  Mobile computing and mobile applications to the enterprise

What are some of the challenges organizations face with mobile computing and mobile applications and what are some of the promises of mobile computing and mobile applications to the enterprise?

  Labsim testout security pro

Please log into LabSim TestOut Security Pro and complete all labs and end of chapter exams in Chapter 7. There is NO TIME LIMIT to complete these labs and you may try them more than once.

  Network layer and the data link layer

The source and destination are connected through two intermediate routers. During the data transmission from source to destination how many times each packet has to visit the network layer and the data link layer?

  Basis of physical and chemical structure

Discuss classification of insulating materials on the basis of physical and chemical structure.

  Create a bourne shell script

you need to package your commands in a script so that the patching team can run them on the production environment - Create the directory structure and create the files as defined in the previous Individual Project.

  Conditions and requirements of application security

This seminal publication outlines a set of basic principles that define a logical way to classify and respond to threat. It also describes the critical things you should consider while building software. These underlying principles dictate the con..

  What is the total efficiency of the protocol

Consider two nodes A and B uses the slotted ALOHA protocol to contend for a channel. Suppose node pA and pB are A and B's retransmission probabilities. Provide a formula for node A's average throughput. What is the total efficiency of the protocol..

  Exposure of confidential data

Find two examples of data/security breaches that resulted in theft/loss/exposure of confidential data, preferably health care related data. Describe the incidents and explain what could have been done to prevent or mitigate them.

  Critical appraisal that demonstrates comprehension

To write a critical appraisal that demonstrates comprehension of the research study conducted, and respond to each of the action items listed under the headings below. Successful completion of this assignment requires that you provide a rationale,..

  What are the similarities and differences in the functioning

Discuss the processes an organization would use to develop, design and implement an Information System (IS), or to change an existing IS, to effect improvements in operations. What is the role of the Chief Information Officer?

  What is the q complexity of the sum

What is the Q complexity of the sum? Please give a detailed answer so that I may learn from it. Thank you!

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd