subject

SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN JAVA. Assume that the classes listed in the Java Quick Reference have been imported where appropriate. Unless otherwise noted in the question, assume that parameters in method calls are not null and that methods are called only when their preconditions are satisfied.
In writing solutions for each question, you may use any of the accessible methods that are listed in classes defined in that question. Writing significant amounts of code that can be replaced by a call to one of these methods will not receive full credit.

A set of classes using inheritance is used to represent animals observed at a wildlife sanctuary. A portion of the class hierarchy is shown in the following diagram.
The figure presents a diagram of a class hierarchy with three levels. The highest level has one class labeled Animal. The middle level has two classes labeled Carnivore and Herbivore. The lowest level has one class labeled Elephant. Three arrows are drawn: one from Elephant to Herbivore, one from Herbivore to Animal, and one from Carnivore to Animal.

All Animal objects have the following attributes.

A String variable indicating whether the animal is a carnivore or a herbivore
A String variable representing the animal species (e. g., lion, giraffe, zebra)
A String variable representing the name of the individual animal (e. g., Lisa, Gary, Percy)

The Animal class also contains a toString method that indicates the state of an animal.

The following table shows the intended behavior of the Animal class.
Statement Result
Animal lisa = new Animal("carnivore", "lion", "Lisa"); A new Animal object is created.
lisa. toString(); The string "Lisa the lion is a carnivore" is returned.

(a) Write the complete Animal class. Your implementation must meet all specifications and conform to the behavior shown in the table.

The Herbivore class is a subclass of Animal. The Herbivore class does not contain any attributes or methods other than those found in the Animal class.

The constructor to the Herbivore class accepts two parameters for the species and name of the herbivore. The constructor passes those parameters along with the string literal "herbivore" to the Animal class to construct the object.

The following table shows the intended behavior of the Herbivore class.
Statement Result
Herbivore gary = new Herbivore("giraffe", "Gary"); A new Herbivore object is created.
gary. toString(); The string "Gary the giraffe is aherbivore" is returned.

(b) Write the complete Herbivore class. Your implementation must meet all specifications and conform to the behavior shown in the table.

The Elephant class is a subclass of Herbivore. The Elephant class contains one additional attribute not found in Herbivore: a double variable representing the length of the elephant’s tusks, in meters.

The constructor to the Elephant class accepts two parameters for the name and tusk length of the elephant. The constructor passes those parameters along with the string literal "elephant" to the Herbivore class to construct the object.

The following table shows the intended behavior of the Elephant class.
Statement Result
Elephant percy = new Elephant("Percy", 2.0); A new Elephant object is created.
percy. toString(); The string "Percy the elephant is aherbivore with tusks 2.0 meters long" is returned.

(c) Write the complete Elephant class. Your implementation must meet all specifications and conform to the behavior shown in the table.

ansver
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 06:20, Masielovebug
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network availability confidentiality integrity identity automated attack software? those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? single most expensive malicious attack hipaa what are script kiddies? advanced persistent threat security manager security engineer what level of security access should a computer user have to do their job what process describes using technology as a basis for controlling the access and usage of sensitive data? cybercriminal
Answers: 1
image
Computers and Technology, 22.06.2019 11:10, lberman2005p77lfi
The total cost of textbooks for the term was collected from 36 students. create a histogram for this data. $140 $160 $160 $165 $180 $220 $235 $240 $250 $260 $280 $285 $285 $285 $290 $300 $300 $305 $310 $310 $315 $315 $320 $320 $330 $340 $345 $350 $355 $360 $360 $380 $395 $420 $460 $460
Answers: 2
image
Computers and Technology, 22.06.2019 23:30, elizabethburkha
Which text format is this, "the text is transcribed exactly as it sounds and includes all the utterances of the speakers. "?
Answers: 2
image
Computers and Technology, 23.06.2019 04:00, china236
In a word processing program, such as microsoft word, which feature to you choose the desired picture enhancement?
Answers: 2
You know the right answer?
SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN JAVA. Assume that the classe...

Questions in other subjects:

Konu
English, 27.09.2020 14:01
Konu
History, 27.09.2020 14:01
Konu
Mathematics, 27.09.2020 14:01