Create a new movie like the makeSunsetMovie method that turns the beach black after the blue and green is reduced by a passed amount.

What will be an ideal response?


```
*
¤ Method to s l owl y c r e a t e a suns e t and a f t e r
¤ a c e r t a i n amount of r e duc t i on make the p i c t u r e fade
¤ to b l a c k
¤ @param d i r e c t o r y the d i r e c t o r y to wr i t e to
¤/
public void makeSunsetMovie2 ( St r ing di r e c t o r y , double thr e sho ld )
{
// load the p i c t u r e o f the beach
St r ing fName = Fi l eChoos e r . getMediaPath ( "beach¡sma l l e r . jpg " ) ;
Pi c tur e beachP = new Pi c tur e ( fName ) ;
double amountReduction = 1 ;
Pi c tur e blackP = new Pi c tur e ( beachP . getWidth ( ) , beachP . ge tHe ight ( ) ,
Color .BLACK) ;
// d e c l a r e o the r v a r i a b l e s
Pi c tur e temp = nul l ;
FrameSequencer f rameSequencer =
new FrameSequencer ( d i r e c t o r y ) ;
int f ramesPerSec = 3 0 ;
// loop c r e a t i n g the frames
for ( int i = 0 ; i < f ramesPerSec ; i++)
{
temp = new Pi c tur e ( beachP ) ;
amountReduction = amountReduction ¤ 0 . 9 5 ;
i f ( amountReduction < thr e sho ld )
{
temp . modifyTowards ( blackP , i , f ramesPerSec ) ;
}
el se
{
temp . makeSunset ( amountReduction ) ;
}
f rameSequencer . addFrame ( temp ) ;
}
// p lay the movie
f rameSequencer . play ( f ramesPerSec ) ;
}
```

Computer Science & Information Technology

You might also like to view...

The use of two or more criteria on the same row, it is known as a(n):

A) wildcard criteria. B) simple criteria. C) advanced query criteria. D) compound criteria.

Computer Science & Information Technology

After you select the settings you want, to print a document, click the Print button in the center pane on the ____ tab in Backstage view.

A. View B. Preview C. Print D. File

Computer Science & Information Technology

Which of the following statements best describes the HIPAA breach notification rules?

A. Covered entities are required to notify individuals for any ePHI breach within 60 days after the discovery of the breach. B. Covered entities are required to notify individuals for breach of unsecured ePHI within 60 days after the discovery of the breach. C. Covered entities are required to notify individuals for any ePHI breach within 30 days after the discovery of the breach. D. Covered entities are required to notify individuals for breach of unsecured ePHI within 30 days after the discovery of the breach.

Computer Science & Information Technology

A server with a large amount of storage but not necessarily a very fast CPU would be BEST suited for which of the following applications?

A. DNS server B. File server C. DHCP server D. Proxy server

Computer Science & Information Technology