1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavlova-9 [17]
2 years ago
6

Creating an application for an ice cream shop. Create an interface named Flavor. Create three subclasses Lemon, Mint, and Chocol

ate. Create a class named Cone that has a single member variable named scoops of type List with a generic argument of Flavor. Initialize the scoops member variable to an object of one of the two list classes discussed during the lecture. Add a method named add with a single parameter of type Flavor named scoop. This will add the scoop object to the scoops list.
Create a class named IceCreamShop. The class has a single member variable of type Map named orders. Initialize this map to an instance of type HashMap. This map is used to track customer orders. It maps a customer name of type String to an instance of Cone. The map is modified by the following methods:

Add a method orderScoop(String customer, Flavor flavor). This method first checks if thereâs already an order for the given customer in the map. If the map does not have an entry with the customer name, a new entry is put into the map with a new Cone object. If the map already contains an entry, it gets the cone value from the map. Then it adds a new flavor to the cone. Note: Thereâs no need to put the cone back into the map because the map uses a reference to the cone object.

Add a method completeOrder(String customer). This method will return the cone for the given customer and remove the entry from the map.
Computers and Technology
1 answer:
Tpy6a [65]2 years ago
6 0

Answer:

I don't know for sure what the answer is but I hope you can find someone that can give you the answer sorry!

Explanation:

You might be interested in
During the Cold War, defense contractors were required to shield sensitive computing systems and prevent electronic eavesdroppin
mart [117]

Answer:

Tempest

Explanation:

3 0
3 years ago
Which of the following is an advantage of using variables?
GaryK [48]

Answer:

D. It makes it less likely that an error will be introduced into the code.

Explanation:

7 0
3 years ago
56- What is the term used when you press and hold the left mouse key and more the mouse
elena55 [62]

Answer:

i'd say it's dragging, but i'm not 100% sure

Explanation:

8 0
2 years ago
You ping a host on the internet to check for connectivity. Your ping times out, and you get no response. What is most likely the
Reptile [31]

Answer:

It could be because you where hack. Or there was something wrong with the site that stopped it from saying why it stopped.

8 0
2 years ago
which of the following types of software is for organizing analyzing and storing data in a table A spreadsheet software B databa
Komok [63]

Answer:

B) Database Software

Explanation:

Desktop Publishing software and Multimedia software is not used for storing data, so it can't be that. Spreadsheet software stores data in cells, while Database software stores data in tables.

6 0
2 years ago
Other questions:
  • blank affect your vision because your eye muscles are tired along with the rest of your body and is difficult to focus
    11·2 answers
  • PLEASE HELP!!!!! MUCH OBLIGED!!!!
    15·1 answer
  • What is the smallest unit of data on the hard drive?
    5·1 answer
  • Each processor core on a multi core processor generally runs faster than a single core processor
    14·2 answers
  • All of the following are examples of being computer literate, EXCEPT ________. Group of answer choices knowing how to build and
    7·1 answer
  • A computer consists of both software and hardware. a)Define the term software​
    5·1 answer
  • What is the purpose of the new window command
    6·1 answer
  • What is computer generation.<br>name that generations ​
    9·2 answers
  • Convert the decimal integer, 353.87510 to each of these forms:
    9·1 answer
  • The best way to safeguard your document is to save it
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!