![subject](/tpl/images/cats/informatica.png)
Computers and Technology, 17.12.2019 22:31 khynia11
Note: creating multiple scanner objects for the same input stream yields unexpected behavior. thus, good practice is to use a single scanner object for reading input from system. in. that scanner object can be passed as an argument to any methods that read input.
this program extends the earlier "online shopping cart" program. (consider first saving your earlier program).
(1) extend the itemtopurchase class per the following specifications:
private fields
string itemdescription - initialized in default constructor to "none"
parameterized constructor to assign item name, item description, item price, and item quantity (default values of 0). (1 pt)
public member methods
setdescription() mutator & getdescription() accessor (2 pts)
printitemcost() - outputs the item name followed by the quantity, price, and subtotal
printitemdescription() - outputs the item name and description
ex. of printitemcost() output:
bottled water 10 @ $1 = $10
ex. of printitemdescription() output:
bottled water: deer park, 12 oz.
![ansver](/tpl/images/cats/User.png)
Answers: 3
![](/tpl/images/ask_question.png)
![](/tpl/images/ask_question_mob.png)
Another question on Computers and Technology
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 23.06.2019 12:00
If you embed a word table into powerpoint, what happens when you make edits to the embedded data? a. edits made to embedded data change the data in the source file; however, edits made to the source file will not be reflected in the embedded data. b. edits made to embedded data will change the data in the source file, and edits made to the source file will be reflected in the embedded data. c. edits made to embedded data don't change the data in the source file, nor will edits made to the source file be reflected in the embedded data. d. edits made to embedded data don't change the data in the source file; however, edits made to the source file will be reflected in the embedded data.
Answers: 1
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 23.06.2019 14:30
Select the correct answer. andy received a potentially infected email that was advertising products. andy is at risk of which type of security threat? a. spoofing b. sniffing c. spamming d. phishing e. typo-squatting
Answers: 2
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 25.06.2019 01:30
The study of how to design software, solve problems such as computer security threats, or come up with better ways of handling data storage
Answers: 1
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 25.06.2019 12:00
If you fear you have been abusive to a partner, what can you do?
Answers: 2
You know the right answer?
Note: creating multiple scanner objects for the same input stream yields unexpected behavior. thus,...
Questions
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 03.02.2021 03:30
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 03.02.2021 03:30
![question](/tpl/images/cats/mat.png)
Mathematics, 03.02.2021 03:30
![question](/tpl/images/cats/mat.png)
Mathematics, 03.02.2021 03:30
![question](/tpl/images/cats/fizika.png)
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/en.png)
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 03.02.2021 03:30
![question](/tpl/images/cats/mat.png)
Mathematics, 03.02.2021 03:30
![question](/tpl/images/cats/en.png)
![question](/tpl/images/cats/obshestvoznanie.png)
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/en.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 03.02.2021 03:30
![question](/tpl/images/cats/mat.png)
Mathematics, 03.02.2021 03:30