Creating an application for an ice cream shop. Create an interface named Flavor. Create three subclasses Lemon, Mint, and Chocolate. Create a class named Cone that has a single member variable named scoops of type List with a generic argument of Flavor. Initialize the scoops member variable to an object of one of the two list classes discussed during the lecture. Add a method named add with a single parameter of type Flavor named scoop. This will add the scoop object to the scoops list.

Create a class named IceCreamShop. The class has a single member variable of type Map named orders. Initialize this map to an instance of type HashMap. This map is used to track customer orders. It maps a customer name of type String to an instance of Cone. The map is modified by the following methods:

Add a method orderScoop(String customer, Flavor flavor). This method first checks if thereâs already an order for the given customer in the map. If the map does not have an entry with the customer name, a new entry is put into the map with a new Cone object. If the map already contains an entry, it gets the cone value from the map. Then it adds a new flavor to the cone. Note: Thereâs no need to put the cone back into the map because the map uses a reference to the cone object.

Add a method completeOrder(String customer). This method will return the cone for the given customer and remove the entry from the map.

Answers

Answer 1

Answer:

I don't know for sure what the answer is but I hope you can find someone that can give you the answer sorry!

Explanation:


Related Questions

computer Graphics:
B. Arbitrary reference point:
1) Apply a rotation by 60° on the Pivot Point (-10, 10) and display it.
2) Apply a rotation by 270° on the Pivot Point (10, 0) and then translate it by tx
= -20 and ty = 5. Display the final result.

Answers

Thanks hope it helps

The system tray contains _____.
A. the battery life
B. the computer's hard drive
C. the operating system
D. Quick Launch

Answers

[tex]⇒[/tex]

the operating system

The notification area (also called the "system tray") is located in the Windows Taskbar, usually at the bottom right corner. It contains miniature icons for easy access to system functions such as antivirus settings, printer, modem, sound volume, battery status, and more.

Answer:

A BATTERY LIFEExplanation: The person said it and it was right I believed them, and they made me get a 100% thank you sir/madam and as you can see, I have proof so your welcome and thank you.

I Wouldn't just say the letter like A or C because everyone's quiz is different, and it changes but either way whatever your welcome and again thank you.

In your own words, explain the process undertaken while testing the significance of a multiple linear regression model parameter Indicating clearly the hypothesis considered, test statistics used rejection criteria and conclusion.​

Answers

Multiple Linear Regression Analysis consists of more than just fitting a linear line through a cloud of data points. It consists of three stages: 1) analyzing the correlation and directionality of the data, 2) estimating the model, i.e., fitting the line, and 3) evaluating the validity and usefulness of the model.

The ______ Works on a single variable or constant. *​

Answers

Answer:

man

Explanation:

Do you have any concerns or worries about how you will manage your course assignments or expectations? Your journal entry will only be seen by you and your instructor, so feel free to share any questions and worries you have.

Answers

Answer:

no worries at all.

yeah-ya..... right?

. Question 2 Fill in the blank: R Markdown notebooks can be converted into HTML, PDF, and Word documents, slide presentations, and _____.

Answers

R markdown notebook describes a notebook format in R programming which supports R programmers to run codes while also writing documents or explanation alongside. Hence, the missing option is Dashboard.

R markdown may be compared to jupyter notebooks which also supports writing in markdown language.

The R markdown notebooks can be created using the R studio, which allows the conversion notebooks of these notebooks into several different formats including the creation of dashboards.

Hence, R markdown notebooks can be converted to HTML PDF, word document, slide presentation and dashboards.

Learn more :https://brainly.com/question/25575402

A notebook for R Markdown is required to document, discuss, and justify each stage of your investigation.

R markdown notebook presents a R programming notebook style that enables R programmers to run codes while simultaneously producing papers or explanations. A R Notebook, which is a document written in R Markdown, allows the software components to be run separately and in real-time. Additionally, it does away with the necessity of weaving all of your R Markdown text in order to test the results as you build your website.

Every R Notebook has the ability to be converted into any other R Markdown document type, and every R Markdown document has the ability to be used as a notebook. R Notebooks are thus a special operating option.

learn more about R Markdown here:

brainly.com/question/25575402

#SPJ4

True or False. When FTP users authenticate with an FTP server, the sign-in process can be decoded by a protocol analyzer or network sniffer software.

Answers

The File Transfer Protocol is commonly called FTP. FTP users authenticate with an FTP server, the sign-in process can be decoded by a protocol analyzer or network sniffer software is a true statement.

There are some element that often specifies the authentication settings for FTP sites. The authentication settings are known to be wired or configured at only the site-level. They can also be configured per URL.

The File Transfer Protocol (FTP) is known simply as a standard communication protocol that is often employed for the movement of computer files from a server to a client using a computer network.

It uses the client–server model architecture via different control and data connections between the client and the server.

Learn more from

https://brainly.com/question/20602197

What is the grooming process as it relates to online predators

Answers

the process by which online predators lure in minors to get close enough to hurt them.

Queries are questions true or false?

Answers

Answer:

true

Explanation:

in the dictionary they mean the same thing

Write a function named partfthat takes inas parameterstwo parallel lists: a list of times (in increasing order), and a list of distance traveled by that point in time. The function should return a new list giving the average velocity between consecutive time measurements. The new list should have a length of one less than the original lists.

Answers

The program calculates the velocity between points in a list is written below. The program is written in python 3 thus ;

t = input("Enter time values : ")

#Enter the time values of the data

p = input("Enter distance values : ")

#Enter the distance values

dist = [float(x) for x in p.split()]

time = [float(x) for x in t.split()]

#pyt then values in a list

def partfthat(dist, time):

#initialize function that takes in two parameters

vel = []

#empty list to hold the calculated velocity values

i = 0

#indexer

while i <= len(dist)-2:

#while loop to iterate

v = (dist[i+1] - dist[i]) / (time[i+1] -time[i])

#Use the velocity formula

vel.append(v)

#append values to the empty list created

i+=1

return vel

print(avg_vel(dist, time))

A sample run of the program is attached.

Learn more : https://brainly.com/question/25681441

Name a type of malware designed to provide unauthorized, remote access to a user's computer​

Answers

Answer:

spyware

Explanation:

your welcome;)

Answer:

trojan horse

Explanation:

or just trojan

For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists

Answers

Answer:

ICMP

Explanation:

Leon wants an output from his tablet. What should he look at? A. the memory chip B. the processor C. the screen D. the power button

Answers

Answer:

he should look at the screen

Answer:

C. The screen

Explanation:

got it on edge

What's computer hardware ​

Answers

the physical components that a computer system requires to function

hope it helps

Computer hardware includes the physical parts of a computer, such as the case, central processing unit, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. By contrast, software is the set of instructions that can be stored and run by hardware.

Imagine that you have an image that is too dark or too bright. Describe how you would alter the RGB settings to brighten or darken it. Give an example.

Answers

turn the brightness up

Assume that the speed of new computers costing a certain amount of money grows exponentially over time, with the speed doubling every 18 months. Suppose you need to run a very time consuming program and are allowed to buy a new computer costing a fixed amount on which to run the program. If you start now, the program will take 7 years to finish. How long should you delay buying the computer and starting the program so that it will finish in the shortest amount of time from now

Answers

Therefore, in order to run the program in the shortest time, you should delay for 3 years

Given that the speed of new computers costing a certain amount of money grows exponentially over time, with the speed doubling every 18 months.

Exponential equation as a function of time can be expressed as

P(t) = [tex]P_{0}[/tex][tex]R^{t/T}[/tex]

Quantity P will be increasing exponentially when R > 1. And it will decrease exponentially when R < 1.

Suppose you need to run a very time consuming program and are allowed to buy a new computer costing a fixed amount on which to run the program. If you start now, the program will take 7 years to finish.

Let the time required to run and complete a program for time t years be P(t).

If the speed doubling every 18 months, which is 3/2 years. This will eventually cause the running time to decrease by half (0.5)

P(t) = 7[tex](1/2)^{3t/2}[/tex] = 7[tex](2)^{-3t/2}[/tex]

The total time T will be sum of the delay time t and the time of running the program. That is

T(t) = t + P(t)

T(t) = t + 7[tex](2)^{-3t/2}[/tex]   .......... (2)

We can calculate the minimum time t by differentiating the above equation and make it equal to zero.

dT/dt = 1 + 14/3[tex](2)^{-3t/2}[/tex](ln0.5) = 0

14/3[tex](2)^{-3t/2}[/tex](ln0.5) = -1

[tex](2)^{-3t/2}[/tex](ln0.5) = -3/14

[tex](2)^{-3t/2}[/tex] = -3/14ln0.5

Log (natural logarithm) both sides

-3t/2ln2 = ln(3/14ln2)

make t the subject of formula

t = - 3ln(3/14ln2) ÷ 2ln2

t = 2.5 approximately

To know how long you should delay buying the computer and starting the program so that it will finish in the shortest amount of time from now, substitute t into equation 2

T(2.5) = 2.5 + (7)[tex]2^{-3(2.5)/2}[/tex]

T(2.5) = 2.5 + 0.5202

T(2.5) = 3.02 years

T (2.5) = 3 years approximately

Therefore, in order to run the program in the shortest time, you should delay for 3 years

Learn more here: https://brainly.com/question/6497099

True or False? Voice recognition is the process of determining the meaning of the words spoken by a human.

Answers

Answer:

The answer is False.

explain how you activate window explore​

Answers

Answer:

Win+R -> Type "explorer.exe" -> Press enter

Fill in the blank: _____ data are statistical and numerical facts about a project.
Subjective



Quantitative



Mathematical



Qualitative

Answers

Quantitative data are statistical and numerical facts about a project that can be counted, measured or expressed using numbers.

Quantitative data is statistical and its nature is usually structured, it uses numbers and values that are most suitable for the analysis of a project.

The collection of quantitative data offers the possibility of statistical analysis.

This type of data allows you to easily measure and quantify facts in an organized and accessible way within relational databases.

Therefore, we can conclude that quantitative data is data that comes from numerical information, quantities, percentages, proportions and statistics.

Learn more about quantitative data here: https://brainly.com/question/96076

what don't you like about creating a new document using Microsoft office button​

Answers

It takes too long to load sometimes.

What type of rules specify user privileges to select, insert, update, and delete data for different tables and views

Answers

Based on SQL analysis, the type of rules that specify user privileges to select, insert, update, and delete data for different tables and views is called DML.

What is DML Command in MySql?

DML is an acronym for Data Manipulation Language.

DML commands are typically applied to make all changes in the SQL database.

Different types of DML Commands

InsertDeleteUpdate

Hence, in this case, it is concluded that the correct answer is "DML (Data Manipulation Language)."

Learn more about SQL commands here: https://brainly.com/question/25694408

A good algorithm should have which three components?
O A. Commands, inputs, and outputs
B. Clarity, readability, and sequencing
C. Steps, order, and outcomes
O D. Clarity, simplicity, and brevity

Answers

Answer:

a good algorithm must be able to accept a set of defined input. Output: a good algorithm should be able to produce results as output, preferably solutions. Finiteness: the algorithm should have a stop after a certain number of instructions. Generality: the algorithm must apply to a set of defined inputs.Explanation:

A good algorithm should have Steps, order, and outcomes. The correct option is C.

What is algorithm?

An algorithm is a set of instructions that solves a particular problem or performs a specific task.

An algorithm must be well-defined and organised in order to be effective, with clear steps or procedures, a logical order of operations, and a clear understanding of the expected outcomes or results.

As a result, the steps, the order in which those steps are executed, and the expected outcomes or results of following those steps are three essential components of a good algorithm.

Option A describes the fundamental components of a programme, but it is not always a good algorithm.

Option B emphasises some important characteristics of good code, but not specifically related to algorithm design.

Option D addresses important aspects of any type of technical writing, but is not specifically related to algorithm design.

Thus, the correct option is C.

For more details regarding algorithm, visit:

https://brainly.com/question/22984934

#SPJ7

Write a function predict_wait that takes a duration and returns the predicted wait time using the appropriate regression line, depending on whether the duration is below 3 or greater than (or equal to) 3.

Answers

The appropriate function which could be used to model the scenario can be written thus ; The program is written in python 3 ;

y = 3x + 3.5

#since no data is given ; using an hypothetical regression equation expressed in slope - intercept format ; where, x = duration and y = Predicted wait time.

def predict_wait(x) :

#initialize a function named predict_wait and takes in a certain duration value, x

y = 3*x + 3.5

#input the x - value into the regression equation to calculate y

return y

#return y

Learn more : https://brainly.com/question/25556810

What are two drawbacks of using netbook ?

Answers

Answer: They are becoming obsolete and they are usually low-performance. Also a 32-bit system.

Would appreciate brainly <3

Answer:

Laptop computers are difficult to repair, upgrade or modify due to their closed and integrated design. While storage drives and RAM are usually accessible because these are the things you will most likely upgrade, it is often difficult to modify or replace your CPU, graphics chip or motherboard. These jobs will usually require professional equipment and tools–or a hired professional technician. Additionally, while in a desktop computer the possible configurations are almost unlimited, laptop configurations are limited to those provided by laptop manufacturers. Some software may also be incompatible with laptop hardware, and installations of different operating systems than those bundled with the laptop may result in hardware failures.

What is the difference between a computer’s RAM and its hard disk?
A. RAM is not volatile, which means that it is more reliable than a hard disk. A hard disk is volatile, which means that it is vulnerable to electronic interference.

B. RAM is volatile, which means that it does not retain information in memory after powering down. A hard is not volatile, which means that it retains information in memory after powering down.

C. RAM is not volatile, which means that it retains information in memory after powering down. A hard disk is also not volatile, which means that it retains information in memory after powering down.

D. RAM is volatile, which means that it must be handheld with care when removed or replaced. A hard disk is not volatile, which means that it is much more resistant to movement during removal or replacement.

Answers

Answer:

D. RAM is volatile, which means that it must be handheld with care when removed or replaced. A hard disk is not volatile, which means that it is much more resistant to movement during removal or replacement.

Explanation:

Most RAM (random access memory) used for primary storage in personal computers is volatile memory. Volatile memory contrasts with non-volatile memory, which does not lose content when power is lost. Non-volatile memory has a continuous source of power and does not need to have its memory content periodically refreshed.

Answer:

Explanation:

RAM can be accessed faster than hard drive. – Any changes made to the file will be present in RAM while once the changes are saved it is copied to the hard drive permanently. – RAM needs power to store data, hard drives do not.

ARAT ML MGA LODS
ID:426667817 ​

Answers

What? If this is an online video ch at thing, then count me out lol sorry I just think that this is dangerous I dk
Nooo stop posting these they aren’t safe

Imagine you were going to use a dedicated workstation for an animation job rather than a personal PC. What differences would you expect to see between a dedicated 3D animation workstation and a typical PC

Answers

I'm no expert here, as I don't own a workstation but rather a gaming pc. But hey, I did tons of research on pc components and I think I can answer your question.

A dedicated workstation would be FAR more capable of running 3d applications, given how demanding they can get than a personal PC. You'd instantly regret using a typical pc for 3d rendering, even a top of the line gaming pc. Point is, gpus created by nvidia are far more capable of running graphic intensive programs specifically made for work than any other gpu. If you want to be satisfied, i'd advise you go for a workstation (Plus they're so much easier to get your hands on than a gaming rig).

discuss the communicatin process giving detailed explanation on each process​

Answers

Communications is fundamental to the existence and survival of humans as well as to an organization. It is a process of creating and sharing ideas, information, views, facts, feelings, etc. among the people to reach a common understanding. Communication is the key to the Directing function of management.

A manager may be highly qualified and skilled but if he does not possess good communication skills, all his ability becomes irrelevant. A manager must communicate his directions effectively to the subordinates to get the work done from them properly.

Communications Process

Communications is a continuous process which mainly involves three elements viz. sender, message, and receiver. The elements involved in the communication process are explained below in detail:

1. Sender

The sender or the communicator generates the message and conveys it to the receiver. He is the source and the one who starts the communication

2. Message

It is the idea, information, view, fact, feeling, etc. that is generated by the sender and is then intended to be communicated further.

Browse more Topics under Directing

Introduction, Meaning, Importance & Principles of DirectingElements of DirectionIncentivesLeadership

3. Encoding

The message generated by the sender is encoded symbolically such as in the form of words, pictures, gestures, etc. before it is being conveyed.

4. Media

It is the manner in which the encoded message is transmitted. The message may be transmitted orally or in writing. The medium of communication includes telephone, internet, post, fax, e-mail, etc. The choice of medium is decided by the sender.

5. Decoding

It is the process of converting the symbols encoded by the sender. After decoding the message is received by the receiver.

6. Receiver

He is the person who is last in the chain and for whom the message was sent by the sender. Once the receiver receives the message and understands it in proper perspective and acts according to the message, only then the purpose of communication is successful.

7. Feedback

Once the receiver confirms to the sender that he has received the message and understood it, the process of communication is complete.

8. Noise

It refers to any obstruction that is caused by the sender, message or receiver during the process of communication. For example, bad telephone connection, faulty encoding, faulty decoding, inattentive receiver, poor understanding of message due to prejudice or inappropriate gestures, etc.

1. Where did the Industrial Revolution start and why did it begin there?​

Answers

Answer:

The first Industrial Revolution began in Great Britain in the mid-to-late 1700s, when innovation led to goods being produced in large quantities due to machine manufacturing.

This process began in Britain in the 18th century and from there spread to other parts of the world. Although used earlier by French writers, the term Industrial Revolution was first popularized by the English economic historian Arnold Toynbee (1852–83) to describe Britain's economic development from 1760 to 1840.

Answer:

This process began in Britain in the 18th century and from there spread to other parts of the world. Although used earlier by French writers, the term Industrial Revolution was first popularized by the English economic historian Arnold Toynbee (1852–83) to describe Britain’s economic development from 1760 to 1840  

Historians have identified several reasons for why the Industrial Revolution began first in Britain, including: the effects of the Agricultural Revolution, large supplies of coal, geography of the country, a positive political climate, and a vast colonial empire.

Explanation:

Which of the following is NOT a function of a Web Browser?
O Provide a platform that users can use to access web pages and sites
O Access a Web server and request a page on the Internet so the right information shows up
O Crawl through the World Wide Web searching for words and terms to index in Web Databases
O Interpret Web page's HTML tags and display the Web page's information in a way that is intended/easily readable for you

Answers

A web browser is used to gain access to the contents of a website, displaying the information in a readable and easily understandable format. Hence, an option which isn't a function of a web browser is Crawl through the World Wide Web searching for words and terms to index in Web Databases

A web browsers allows users to access web pages and sites, by accessing web servers and requesting access to display the contents.

Web pages are written in Hypertext Markup Language (HTML). Browsers interpret these document format and tags so that it is displayed in an understandable format.

Learn more : https://brainly.com/question/17130932

Other Questions
grace read 4 days a this week. She reads 10 minutes each day. if her teacher wants her to read a total of 60 minutes, how many more minutes does grace need to still read? i need help fast please Solve this and show steps 4.58-(0.4+9.6-(3.6-1.8)) How to set encapsulation angular component. Today Montral is a sprawling urban metropolis with little green space or historic architecture.TrueO False Imagine you are working as an insurance broker, and a company comes to you wanting to insure one of its production factories. Identify at least two distinct risks you would analyze as you decide what kind of coverage and premiums this client can expect to pay in order to be fairly and sufficiently insured.30 POINTS IF YOU KNOW THE ANSWER ASAP!!!!!!EXPLAIN REASONING what is the difference between family and a nation? The Picture is attached below help me please......... Shays's Rebellion convinced many Americans that the Articles ofConfederation:A. modeled the national government too closely on Europeangovernments.- B. created a national government that was too focused on militaryissues.O C. gave the national government too much control over the states.D. made the national government too weak to solve importantproblems. Help please match them if you just put a link or say I dont know but thanks for the points Ill report your answer and you wont get the brainliest What three factors describe themovement of surface water in streams andrivers? Find the area of the figure below, formed from a triangle and a parallelogram Read this piece of evidence from the article "School Violence: Why Prevention Must Be a Priority.Violence costs the United States an estimated $425 billion in direct and indirect costs each year. Of these costs, approximately $90 billion is spent on the criminal justice system, $65 billion on security, $5 billion on the treatment of victims, and $170 billion on lost productivity and quality of life.What would be the most reliable way to verify these numbers?Find other articles that cite the same primary source of information.Try to find the information in an encyclopedia or a dictionary.Check the information in the source that the author has cited.Write to the author to request more detailed references to the source. 2. Identify a universal theme of this canto from the Ramayana and analyze its development throughout thetext. Use textual evidence to support your response. Alex and Maria went out for dinner. The bill was $25.80. They leave a 20% tip. How much of a tip will they leave? Scott makes $12 per hour babysitting and $8 per hour working at the grocery store. He will need to makeat least $600 to buy a new computer In a standard card deck, there are 52 different cards, which are divided into 4 suits (spades, diamonds, clubs, and hearts), with each suit containing 13 cards. What is the probability that in a randomly selected rearrangement of the card deck, the 3 of spades is after all the hearts help me please question in picture Solve this. c+5.96=6.76 All of the following are benefits of stretching except