subject

The system should load a catalog of books, journals, and magazines at the start of the program. (at least five of each)

2. a user can search the catalog: the user of the system can search the library’s catalog by using the name of the item. also, a user can list books by category (book, journal, or magazine).if you are looking specifically for a book, you can search by the name of the author.

3. a user can check out books, journals, or magazines: the user needs to find the item first, then they can check it out. a user cannot check out an item that is already checked out.

4. a user can return books, journals, or magazines: a user can return an item. the user needs to findthe item first, then they can return it.

5. add new books, journals, or magazines to the catalog. a librarian can add a new item to the catalog. each item should have the following data members: id, name, and status. books have the "author_name" as an additional data member. journals have the "volume" as an additional data member. magazines have the "issue_number" as an additional data member.

the program must have the following properties:

-you should do error handling(ex: a librarian cannot add a book that already exists)-you should use c++ concepts that we covered in class like inheritance, and polymorphism.

example: (inheritance) you can design a generic library item, then design derived classes for different kinds of items that a user can check out.

-your program should use a suitable data structure to store the items.

also, design a menu(should still appear until the exit option is chosen) in the main program that has the following options implemented to test your classes’ functionality:

1.search catalog

2.check out

3.return

4.add a new item

5.exit

expert answer

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 16:30
Corey set up his presentation for delivery to his team.the information he had to convey was critical to their job performance.he knew he would need a lot of time to explain each point
Answers: 3
question
Computers and Technology, 23.06.2019 11:30
Auser is given read permission to a file stored on an ntfs-formatted volume. the file is then copied to a folder on the same ntfs-formatted volume where the user has been given full control permission for that folder. when the user logs on to the computer holding the file and accesses its new location via a drive letter, what is the user's effective permission to the file? a. read b. full control c. no access d. modify e. none of the above
Answers: 1
question
Computers and Technology, 23.06.2019 15:10
What role did women fill during world war ii?
Answers: 1
question
Computers and Technology, 24.06.2019 15:30
During the software planning process, rick, a project manager, finds that his team has made an incorrect estimation of funds. what kind of risk has rick identified? rick has identified a risk.
Answers: 1
You know the right answer?
The system should load a catalog of books, journals, and magazines at the start of the program. (at...
Questions
question
Advanced Placement (AP), 21.10.2020 01:01
question
Arts, 21.10.2020 01:01
question
Mathematics, 21.10.2020 01:01
Questions on the website: 13722363