1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavlova-9 [17]
2 years ago
6

Creating an application for an ice cream shop. Create an interface named Flavor. Create three subclasses Lemon, Mint, and Chocol

ate. Create a class named Cone that has a single member variable named scoops of type List with a generic argument of Flavor. Initialize the scoops member variable to an object of one of the two list classes discussed during the lecture. Add a method named add with a single parameter of type Flavor named scoop. This will add the scoop object to the scoops list.
Create a class named IceCreamShop. The class has a single member variable of type Map named orders. Initialize this map to an instance of type HashMap. This map is used to track customer orders. It maps a customer name of type String to an instance of Cone. The map is modified by the following methods:

Add a method orderScoop(String customer, Flavor flavor). This method first checks if thereâs already an order for the given customer in the map. If the map does not have an entry with the customer name, a new entry is put into the map with a new Cone object. If the map already contains an entry, it gets the cone value from the map. Then it adds a new flavor to the cone. Note: Thereâs no need to put the cone back into the map because the map uses a reference to the cone object.

Add a method completeOrder(String customer). This method will return the cone for the given customer and remove the entry from the map.
Computers and Technology
1 answer:
Tpy6a [65]2 years ago
6 0

Answer:

I don't know for sure what the answer is but I hope you can find someone that can give you the answer sorry!

Explanation:

You might be interested in
2 Consider the sequence of keys (5,16,22,45,2,10,18,30,50,12,1). Draw the result of inserting entries with these keys (in the gi
Juliette [100K]

Answer:

A) (2,4) tree

  • Insertion of  key 45 makes key unbalanced and this is because it violates the 2,4 tree so we split the node
  • insertion of key 10 makes key unbalanced and this is because it violates the 2,4 tree so we split the node

B) Red-black tree

Explanation:

The diagrams for the solutions are attached showing the results of inserting entries

6 0
3 years ago
कम्प्यूटर में एक समस्या को ठीक करने के लिए एक कार्यक्रम या कोनफीगरेशन परिवर्तन के बाद किए जाते हैं
VARVARA [1.3K]

restart.is done after the computer is passed through configuration

3 0
3 years ago
Everyone’s favorite speedy blue hedgehog recently returned to his 2D origins in a critically acclaimed side-scrolling game. What
forsale [732]
It was called sonic mania
3 0
3 years ago
Read 2 more answers
(100 points ASAP PLease) Type the correct answer in the box. Spell all words correctly.
Katena32 [7]

Answer:

Maria can ensure that the video is recording correctly by checking the _____. 1. See answer.

8 0
2 years ago
Necesito 7 innovaciones tecnológicas de la informática para 2021
Sonja [21]

‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍  ‍

3 0
3 years ago
Other questions:
  • A ______________ is a document created when planning resource management to help promote teamwork and clarify team communication
    13·1 answer
  • What is the local portion of the e-mail address below? <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="
    14·1 answer
  • The term load is often used to describe opening a page in a ____. Answer
    11·1 answer
  • Which one of the following rules for selecting a password is the best?
    5·2 answers
  • What's the difference between intranet and extranet ​
    9·1 answer
  • . If you have written the following source code:
    9·1 answer
  • Write a Java program called Decision that includes a while loop to prompt the user to enter 5 marks using the
    12·1 answer
  • Using complete sentences post a detailed response to the following.
    13·1 answer
  • 1. Create an optimized function "print s(n,s)" that prints the given argument s (representing a string) k times. k represents th
    7·1 answer
  • Five uses of the operating system​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!