subject

Note: creating multiple scanner objects for the same input stream yields unexpected behavior. thus, good practice is to use a single scanner object for reading input from system. in. that scanner object can be passed as an argument to any methods that read input.

this program extends the earlier "online shopping cart" program. (consider first saving your earlier program).

(1) extend the itemtopurchase class per the following specifications:

private fields

string itemdescription - initialized in default constructor to "none"

parameterized constructor to assign item name, item description, item price, and item quantity (default values of 0). (1 pt)

public member methods

setdescription() mutator & getdescription() accessor (2 pts)

printitemcost() - outputs the item name followed by the quantity, price, and subtotal

printitemdescription() - outputs the item name and description

ex. of printitemcost() output:

bottled water 10 @ $1 = $10

ex. of printitemdescription() output:

bottled water: deer park, 12 oz.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 12:00
If you embed a word table into powerpoint, what happens when you make edits to the embedded data? a. edits made to embedded data change the data in the source file; however, edits made to the source file will not be reflected in the embedded data. b. edits made to embedded data will change the data in the source file, and edits made to the source file will be reflected in the embedded data. c. edits made to embedded data don't change the data in the source file, nor will edits made to the source file be reflected in the embedded data. d. edits made to embedded data don't change the data in the source file; however, edits made to the source file will be reflected in the embedded data.
Answers: 1
question
Computers and Technology, 23.06.2019 14:30
Select the correct answer. andy received a potentially infected email that was advertising products. andy is at risk of which type of security threat? a. spoofing b. sniffing c. spamming d. phishing e. typo-squatting
Answers: 2
question
Computers and Technology, 25.06.2019 01:30
The study of how to design software, solve problems such as computer security threats, or come up with better ways of handling data storage
Answers: 1
question
Computers and Technology, 25.06.2019 12:00
If you fear you have been abusive to a partner, what can you do?
Answers: 2
You know the right answer?
Note: creating multiple scanner objects for the same input stream yields unexpected behavior. thus,...
Questions
question
Mathematics, 03.02.2021 03:30
question
Mathematics, 03.02.2021 03:30
question
Mathematics, 03.02.2021 03:30
question
Mathematics, 03.02.2021 03:30
Questions on the website: 13722367