subject
Computers and Technology, 12.01.2021 18:00 rome58

In this exercise, you are going to be working with 4 classes, a Book superclass with TextBook and Novel subclasses, and a BookTester class to run your program. For the Book, TextBook, and Novel class, you will create a constructor and all getters and setters. Be sure to follow standard naming conventions for your getters and setters! Additional information for each class is below. Book Class
The Book class will have a title and author as instance variables and the constructor should follow this format:
public Book(String title, String author)
TextBook Class
The TextBook class will have a subject and edition as instance variables and the constructor should follow this format:
public TextBook(String title, String author,
String subject, String edition)
Novel Class
The Novel class will have a genre and pages as instance variables and the constructor should follow this format:
public Novel(String title, String author,
String genre, int pages)
BookTester
In the tester class, you should create an ArrayList that will store all the books in your library. Then create you library by adding at least 3 textbooks and 3 novels to the ArrayList.
After creating your library, use a loop to access the ArrayList and print out any information you have access to.
public class Novel extends Book
{
// Start here!
}
public class Book
{
// Start here!
}
public class TextBook extends Book
{
// Start here!
}
import java. util. ArrayList;
public class BookTester
{
public static void main(String[] args)
{
// Start here!
}
}

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 11:30
Auser is given read permission to a file stored on an ntfs-formatted volume. the file is then copied to a folder on the same ntfs-formatted volume where the user has been given full control permission for that folder. when the user logs on to the computer holding the file and accesses its new location via a drive letter, what is the user's effective permission to the file? a. read b. full control c. no access d. modify e. none of the above
Answers: 1
question
Computers and Technology, 23.06.2019 15:00
To check whether your writing is clear , you can
Answers: 2
question
Computers and Technology, 23.06.2019 18:40
Johnson enterprises uses a computer to handle its sales invoices. lately, business has been so good that it takes an extra 3 hours per night, plus every third saturday, to keep up with the volume of sales invoices. management is considering updating its computer with a faster model that would eliminate all of the overtime processing.
Answers: 2
question
Computers and Technology, 24.06.2019 00:00
Afashion designer wants to increase awareness about her brand. which network can she use and why she can use the blank to blank her products online. answers for the first blank: internet, extranet, or intranet answers for the second blank: market, design, and export
Answers: 1
You know the right answer?
In this exercise, you are going to be working with 4 classes, a Book superclass with TextBook and No...
Questions
question
Mathematics, 19.12.2021 16:50
question
Mathematics, 19.12.2021 16:50
question
Social Studies, 19.12.2021 16:50
Questions on the website: 13722367