1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksivusya [100]
3 years ago
12

Design a software system for a bookstore that keeps an inventory of two types of books: Traditional books and books on CD. Books

on CD may also contain music. The bookstore purchases books from publishers and sets a price for each book. Customers can purchase books from the bookstore, using either cash or a credit. The bookstore keeps track of which books it has in its inventory, and the books purchased by each customer
a. What are the objects in your object- oriented Solution?
b. What are the interactions between objects in your solution?
c. Which objects "have" other objects?
d. Which Objects "Use" other objects?
e. Which objects are other objects?
Computers and Technology
1 answer:
Sophie [7]3 years ago
8 0

Answer:

Explanation:

a. In this scenario, the best solution would have an Object of Traditional Books, CD, Music, Bookstore and Customer.

b. All five objects would be able to be called by the main program loop and the Customer Object would call upon and use either the Books or CD object, While the Bookstore object would call upon all of the other objects.

c. Both the Bookstore object and Customer object will "have" other objects as the Bookstore needs to hold information on every Book or CD in the Inventory. While the Customer object would call upon the Book and CD object that they are purchasing.

d. The Music Object will extend the CD object and use information on the CD object as its parent class.

e. Since the Music Object extends the CD object it is also considered a CD since it is in CD format like the Books on CD and therefore is both objects.

You might be interested in
3.
gulaghasi [49]

Explanation:

the process of displaying the information from the table is called query

<h2>hey friend </h2><h2>your answer is here </h2><h2>I hope it will be helpful you </h2><h2>please mark as brainiest answer </h2><h2>thank you </h2>
7 0
3 years ago
What is the difference between DWT and CWT?
Alexeev081 [22]

Answer:

raspuns:

Explanation:

amandoua sunt cam la fel dar si diferite pe alte parti

4 0
2 years ago
_____ includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, analys
Alla [95]

Answer:

The answer is "Option a".

Explanation:

The B.I. is a method, methodology, software, and development set that makes raw data usable and relevant, which facilitates improved decision-making and competitive opportunities, and certain choices were wrong, which can be described as follows:

  • In option b, The A.I is uses in the machines, that's why it is not correct.
  • In option c, It is used to analyze the data, which used in business. that's why it is not correct.
  • In option d, It is wrong, because it a part of A.I.
6 0
3 years ago
What is destination email address​
Ronch [10]

Answer:

Explanation:

The E-mail Destination allows you to send data from your forms in text format to various different email addresses.

8 0
2 years ago
1
g100num [7]
Have a look at the man page for printf:

man 3 printf
4 0
3 years ago
Read 2 more answers
Other questions:
  • Does technology get in the way of learning ?<br> Help Meh ! ♥ Some ideas :D
    14·2 answers
  • Decisions 1 and 3 are both ____________ decisions because ____________________.
    9·1 answer
  • The HR department of a company wants to send out an email informing its employees about an upcoming social event. Which email ap
    11·2 answers
  • If the pc­doctor software is installed on a computer's hard drive, what two different ways can the program be started?
    7·1 answer
  • What is the best anime that you like the most (give me 3 plz)
    7·2 answers
  • A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
    7·1 answer
  • Who plays xbox one offline and knows some multiplayer games that can be played offline.
    15·2 answers
  • A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations.
    12·1 answer
  • Complete the sentence.<br> Python is a_____<br> level language compared to bytecode.
    7·2 answers
  • A Product Manager has been given responsibility for overseeing the development of a new software application that will be deploy
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!