1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liono4ka [1.6K]
4 years ago
8

Look at the following description of a problem domain:The bank offers the following types of accounts to its customers: saving a

ccounts, checking accounts and money market accounts. Customers are allowed to deposit money into an account (thereby increasing its balance), withdraw money from an account (thereby decreasing its balance) and earn interest on the account. Each account has an interest rateAssume that you will write the code for an application that will calculate the amount of interest earned for a bank account.Use word document to answer the following questions:1) Identify the potential classes in this problem domain be list all the nouns2) Refine the list to include only the necessary class names for this problem3) Identify the responsibilities of the class or classes.
Computers and Technology
1 answer:
Alchen [17]4 years ago
5 0

Answer:

The answers are explained below

Explanation:

1) Identify the potential classes in this problem domain be list all the nouns

class Customer

class Acco  unt

2) Refine the list to include only the necessary class names for this problem

the class customer is not necessary to solve the problem itself, therefore the only class could be the account class

3) Identify the responsibilities of the class or classes.

The responsibilities of the class account will be

* determination of the type of account--> Acc  ount . type(char)

*  deposit money into the account --> Acc  ount . de posit(float)

* withdraw money into the account --> Acc  ount . with draw(float)

* show balance of the account --> Acc  ount . bal ance()

* generate interest --> Acc  ount . int erest()

Please join the words together. I used spaces due to regulations

You might be interested in
Write a Python function to determine the volume of material remaining after the hole is drilled. The function should take as inp
Andru [333]

Answer:

height = int(input ("Enter height : ") )

print (height)

width = int( input("Enter length : ") )

print (width)

half_width =width/2

half_height=height/2

while 0==0:

   radius = float( input("Enter radius : ") )

   print (radius)

   

   if radius<half_width and radius <half_height:

       break

def remainingVolume(height,width,radius):

       

   vol_box=height*width*width

   print (vol_box)

   vol_hole=3.14178*radius*radius*height

   print (vol_hole)

   

   remaining_vol=vol_box-vol_hole

   print ("Remaining volume is ",remaining_vol)

   

remainingVolume(height,width,radius);

Explanation:

Take input from user for height ,width and radius. To find volume of box formula is vol=height* width*length\\

Let's assume width and length is same so

length= width

Using this formula of box volume find box volume.Now find volume of hole.

Consider hole as small cylinder, find volume of cylinder and subtract from volume of box to get remaining volume of box after hole.

vol_of_cyl=\pi radius^{2} height

5 0
3 years ago
HELLLLLLLLLLLLLLLLLLLLP PLSSSSSSSSSSS HELLLLLLLLLP
motikmotik

Answer:

i think it is c. whatever that is.

Explanation:

because its not any of those. D. is exceptional tho

hope this helps!  :)

3 0
3 years ago
If the authenticator is encrypted with the sender's private key, it serves as a signature that verifies origin, content, and seq
brilliants [131]

Answer:

A. True.

Explanation:

Authentication in computer technology can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Digital certificates, smart cards, picture passwords, and biometrics are used to perform an authentication.

Hence, if the authenticator is encrypted with the sender's private key, it serves as a signature that verifies origin, content, and sequencing.

<em>This simply means that, when a user enters his or her private key (password); the authenticator matches the private key to the uniquely defined credentials. Permission and access is granted by the authorization system right after a successful authentication. </em>

8 0
3 years ago
What is (9x - 3) - 7^2, if x=6.
attashe74 [19]

Answer:

23

Explanation:

you will see trust me, I had this question but cant tell with writing

3 0
3 years ago
Read 2 more answers
Find a password that "breaks" zxcvbn, i.e. it is probably easy to crack but zxcvbn reports that it has a cracking time of centur
levacccp [35]

Answer:

C0r3CtPP4zzu0Rd

Explanation:

zxcvbn is a password security and "strength" meter. This meter can identify password repetitions and patterns that will make it easier for some of your passwords to be discovered and your account to be hacked. This meter has as easy passwords to be discovered passwords that have dates, popular words or phrases, personal names and etc.

For zxcvbn to consider a password as strong, which would take centuries to be discovered, it is recommended that two words are used. In addition, these words must have a combination of uppercase and lowercase letters, numbers and symbols.

In this case, we can consider that the password "C0r3CtPP4zzu0Rd" is an easy password that could break zxcvbn.

If you pay attention, the password shown above is a code for the words "correct password", however, there is a combination of letters, numbers and symbols that follow a logical sequence and easy to be memorized, however zxcvbn would consider a * that it would take centuries to be discovered.

5 0
3 years ago
Other questions:
  • Your colleague received an E-mail from a bank that is requesting credit card and PIN number information. Which of the following
    6·1 answer
  • Storing a value in a variable<br> Exponent<br> Variable<br> Assignment<br> Operator
    13·1 answer
  • After reviewing the various types of network connections available, a client chooses a network connection that is considered to
    13·1 answer
  • Which of the following is typically used in a flowchart to indicate a decision?
    8·1 answer
  • Why are computers complicated?
    15·1 answer
  • A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log
    14·1 answer
  • What is the missing line of code?
    10·2 answers
  • Use the {blank} to view your presentation the way an audience will see it.
    13·2 answers
  • Does nature behave the exact same way as fractals?
    15·1 answer
  • Write a program that prints the sum of the even numbers and the products of odd numbers on the screen
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!