Computers and Technology

Serendipity booksellers software development projectâ part 13: a problem-solving exercise
1. convert the bookdata structure to a class. the program currently keeps data about books in a structure called bookdata. convert the structure declaration to a class declaration. the existing member variables should be made private.
2. convert functions to member functions. in chapter 11 you created the following functions for directly accessing or manipulating the member variables of the bookdata structure: settitle setisbn setauthor setpub setdateadded setqty setwholesale setretail isempty removebookbecause the structure is now a class, and the member variables are private, you will need to convert these functions to member functions of the bookdata class.
3. add new accessor functions for retrieving data from the bookdata class. because the bookdata member variables are now private, you will need to add member functions to retrieve their values. add the following functions to bookdata: gettitle: will be used to get the contents of the booktitle array. getisbn: will be used to get the contents of the isbn array. getauthor: will be used to get the contents of the author array. getpub: will be used to get the contents of the publisher array. getdateadded: will be used to get the contents of the dateadded array. getqty: will return the contents of the qtyonhand member. chapter 13 introduction to classesâ©2012 pearson education, inc. upper saddle river, nj. all rights reserved. setwholesale: will return the contents of the wholesale member. getretail: will return the contents of the retail member.4. convert the remainder of the program to use the class. now that bookdata is a class with private member variables, the addbook, lookupbook, deletebook, removebook, and cashier functions must be modified. instead of accessing the private member variables directly, these functions must use the classâs member functions you created in step 2.

answer
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 17:30, babyface1686
How do you make a lenny face? plz, brailiest to who can answer first.
Answers: 1
image
Computers and Technology, 22.06.2019 19:30, andyromero
Once the data center routes to the destination server that hosts the website, what's the next step in the internet process? user’s browser renders html code from destination server into web page request goes through router/model and isp request routed to nameserver and datacenter
Answers: 2
image
Computers and Technology, 23.06.2019 06:30, eddsworldfrantic
You have a small company and want to keep your costs low, but it is important your employees share data. which network would provide you with the most economical solution?
Answers: 1
image
Computers and Technology, 23.06.2019 11:30, leapfroggiez
Auser is given read permission to a file stored on an ntfs-formatted volume. the file is then copied to a folder on the same ntfs-formatted volume where the user has been given full control permission for that folder. when the user logs on to the computer holding the file and accesses its new location via a drive letter, what is the user's effective permission to the file? a. read b. full control c. no access d. modify e. none of the above
Answers: 1
Do you know the correct answer?
Serendipity booksellers software development projectâ part 13: a problem-solving exercise
1....

Questions in other subjects: