Write a Java program that creates an Account object with an account ID of 1122, a balance of $20,000, and an annual interest rate of 4.5%. Use the withdraw method to withdraw $2,500, use the deposit method to deposit $3,000, and print the balance, the monthly interest, and the date when this account was created.
Demonstration and Viva will be carried out in week 13 during your respective seminar session.
You will be assessed on the working of the code as well as on your ability to explain the code.
Design a class named Account that contains:
A private int data field named id for the account (default 0).
A private double data field named balance for the account (default 0).
A private double data field named annualInterestRate that stores the current
interest rate (default 0). Assume all accounts have the same interest rate.
A private Date data field named dateCreated that stores the date when the account was created.
A no-arg constructor that creates a default account.
A constructor that creates an account with the specified id and initial balance.
The accessor and mutator methods for id, balance, and annualInterestRate.
The accessor method for dateCreated.
A method named getMonthlyInterestRate() that returns the monthly interest rate.
A method named withdraw that withdraws a specified amount from the account.
A method named deposit that deposits a specified amount to the account.
Draw the UML diagram for the class.
Implement the class.
Write and run an algorithm for a TCP client and a TCP server with the
following specifications:
(i) The server should be able to handle at least 5 clients concurrently
(ii) A client program sends a string to a server.
(iii) The server program converts lower case latters to upper case
letters and vice versa.
(iv) The converted string is returned to the client.
(v) The client program prints the result.
Call your function from example 1 three timesWith deferent kind of argument:a value,a variableAnd an expression. identify which kind of argument is which?
output this in the console:
n=no. of items to sort
Sorting Algorithm | 1000 | 3000 | 5000 | 7000 | 9000 | 11000 |
BubbleSort |
SelectionSort | sorting time in
InsertionSort | millisecond
NOTE: do not display sorted items.
Write an algorithm to convert the input inch(es) into its equivalent centimeters. One inch is equivalent to 2.54cms. Then display the result.
Write an algorithm that will ask for a price. If the price is greater than 1000, compute a 10% discount from the original price and 5% discount for 1000 and below. Display the computed discount.
Create a structure called employee that contains two members: an employee number (type int) and
the employee’s salary (in dollars; type float). Ask the user to fill in this data for three employees,
store it in three variables of type struct employee, and then display the information for each
employee.
A point on the two-dimensional plane can be represented by two numbers: an x coordinate and a y
coordinate. For example, (4,5) represents a point 4 units to the right of the vertical axis, and 5 units
up from the horizontal axis. The sum of two points can be defined as a new point whose x
coordinate is the sum of the x coordinates of the two points, and whose y coordinate is the sum of
the y coordinates. Write a program that uses a structure called point to model a point. Define three
points, and have the user input values to two of them. Then set the third point equal to the sum of the
other two, and display the value of the new point. Interaction with the program might look like this:
Enter coordinates for p1: 3 4
Enter coordinates for p2: 5 7
Coordinates of p1+p2 are: 8, 11
Department Number of Users
Customer Care 10
Sales and Marketing 20
Finance 25
Legal 5
HR 10
Developers 55
Network Team 5
Server Room
Servers +ISP connections
· High level of redundancy is expected in network design to eliminate single point of failures and traffic bottle necks.
· Sales and Marketing Team need to access Network resources using WIFI connectivity.
· Proper methods for networking monitoring and troubleshooting need to be established.
· All possible network security mechanisms should be implemented.
Recommend suitable network topologies and network protocol suites for above scenario and justify your answer with valid points.