Create a class named safestack

Assignment Help Basic Computer Science
Reference no: EM13708280

Assignment:Create a class named SafeStack that implements a stack of strings. Use an instance of stack from <string> to hold string values and implement the same interface as the data type. However, your implementation (class) should throw an exception if an attempt is made to remove a value from an empty stack.
 

#include <stack>
#include <string>
#include <iostream>
#include <stdexcept>
using namespace std;
class FutureValueError
{
public:
    FutureValueError(const string& r);
    string& what();
private:
    string reason;
    
    };
    
    FutureValueError::FutureValueError(const string& r): reason(r) { }
   string& what()
   {
       return reason;
   }
class SafeStack
{
    
public:
   SafeStack();
   void push(string str);
   string top();
   void pop();
   int size();
   bool empty();  

private:
   stack<string> stk;
};

SafeStack::SafeStack()
{}

void SafeStack::push(string str)
{
   stk.push(str);
}

string SafeStack::top()
{
   if(stk.empty())
       throw  FutureValueError ("stack is empty!");
   else
       return stk.top();
}

void SafeStack::pop()
{
   if(stk.empty())
       throw  FutureValueError ("stack is empty!");
   else
       stk.pop();
}

int SafeStack::size()
{
   return stk.size();
}

bool SafeStack::empty()
{
   return stk.empty();
}

int main ()

{
     SafeStack mystack;
     try
            
     {
      mystack.pop();   
     }
     catch (FutureValueError& e)
     {
         cout << "Caught exception: " << e.what() << "n";
         
     }
    
    return 0;
}

Reference no: EM13708280

Questions Cloud

What new threats do computer systems and networks pose : What new threats do computer systems and networks pose to personal privacy? Conversely, what threats are enabled or enhanced by computer systems and networks? How does cryptography help or hinder protection of privacy and public safety? What po..
Write the query to display the employee number : Write the query to display the employee number,last name,first name,salary "from" date,salary end date, and salary amount for employees 83731,83745 , and 84039.Sort the output by employee number and salary "from"date
Develop the flow diagram of the information : Develop the flow diagram of the information and any control elements needed to ensure proper access for the information.  Submit a 700- to 1,050-word section of the paper with the following elements:  A diagram of the information flow and any element..
How many streetlights are socially optimal : What is likely to happen to the overall level of neighborhood beautification and how many streetlights are socially optimal - Explain the trade-offs involved in this decision.
Create a class named safestack : Assignment:Create a class named SafeStack that implements a stack of strings. Use an instance of stack from to hold string values and implement the same interface as the data type. However, your implementation (class) should throw an exceptio..
How many grams of copper nitrate would be produced : How many grams of copper (lll) nitrate would be produced from 4.30 g of copper metal reacting with excess nitric acid
An increase in the amount of h2o : In the following equilibrium, would you raise or lower the temperature to obtain these results? C2H2(g) + H2O(g) CH3CHO(g) delta H degrees= -151 kJ a. An increase in the amount of CH3CHO b. A decrease in the amount of C2H2 c. An incre..
Is effective leadership behavior universal : Is effective leadership behavior universal or does it vary from culture to culture? Please explain in some detail.
Reaction between aqueous mercury ion and complexing agent : Consider the following reaction between aqueous mercury ions and a complexing agent "RWW" also known as a chelating agent.Hg^2+ (aq) + 2RWW (aq) Hg(RWW)2^2+ (aq) Kf=7.91E10

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Manufacturer of fine cosmetic soap products

Handcrafted Soap is a manufacturer of fine cosmetic soap products. Sweet Treats' two main products are soap and cleanser. Each batch of soap consumes 50 pounds of glycerin and 30 pounds of oil. Each batch of cleanse consumes 20 pounds of glycerin and..

  Explain implications of copyrights on usage of web site

Study and explain copyright implications associated to Web site development. Write down minimum of 350 words explaining the implications of copyrights on usage of content on Web site.

  Describe the data normalization process

Describe the data normalization process including its specific steps. Why is it referred to as a "decomposition process?"

  Program for an automatic teller machine

Create a program for an automatic teller machine that dispenses money. The user should insert amount desired and the machine dispenses this amount using least number of bills.

  What do constructors do and when are they called

In C++, what do Constructors do and when are they called? What is a default constructor

  Sbh problem to reconstruct dna sequence from its l-mer

The SBH problem is to reconstruct a DNA sequence from its l-mer composition. Suppose that instead of a single target DNA fragment, we have two target DNA fragments

  Application of artificial intelligence in different fields

What are application of artificial intelligence in different fields and also explain it and what are application of artificial intelligence in computer science give an example?

  Tools used to avoid losing passphrase

Are there any tools which someone can utilize safely, other than key recovery, to avoid losing his or her passphrase?

  Identify the communication protocols

Identify the communication protocols used in a large hospital organization.

  What is the probability that he is actually guilty

And how can you explain this puzzling result? (First of all, you may need to explain why it is puzzling. Then explain why it really makes sense even though it seems to be puzzling.)

  Ieee 754 32-bit floating points numbers to decimal values

Convert the following IEEE 754 32-bit floating points numbers to decimal values

  Cloud storage carries potent security risk

See this article about "Cloud storage carries potent security risk", including reading the information and viewing the short video (on Financial Services).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd