Question: Prefix.Java The Prefix Enumeration The following UML describes the public interface of the Prefix class. The constructor is mentioned as a reminder that the constructor

Prefix.Java

The Prefix Enumeration

The following UML describes the public interface of the Prefix class. The constructor is mentioned as a reminder that the constructor of an enum class is normally private. You may implement this class using any additional private members as you require, but should not add to the public interface.

Prefix (enum)

+ CIS: Prefix + CIS: Prefix + CNG: Prefix + CSC: Prefix + CWB: Prefix - Prefix(prefixTitle: String) + getTitle(): String

Here are specific requirements for the Prefix enumeration:

Each Prefix value represents one FRCC department, and is named for the prefix for that department.

Each Prefix value has a three-letter name plus a corresponding String-type title.

The four required prefixes and their corresponding titles are:

CIS Computer Information Systems
CSC Computer Science
CNG Computer Networking
CWB Computer Web-based

The Prefix constructor accepts a String as the title of the enumerated value.

Prefix provides a getTitle method that returns the title as a String type value.

No validation is required for the values of Prefix or the course titles. You, as the programmer, are supplying this class as a given system resource, and there are no user interactions to validate and verify.

UML Specifications

Additional private methods and other private members may be added to the class and used as you find them advisable or necessary. However, no additional public methods should be added in your implementation.

The minus sign (-;) implies private internal values, the plus sign (+) indicates public members, and the tilde (~) indicates default access (i.e., the access indicated in Java that has no modifer keywordthe access called package-private) . Underlined names indicate static members. Remember that in an implementation, additional private members (fields or methods) may and should be defined as needed; however, no additional public members should be added to the defined application programming interface (API).

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!