Reference no: EM13858421 , Length: 8
New concepts tested by this program Hash Tables You will be creating a program that holds a simple Address Book and then lets you do a reverse phone number look up. You will be storing the address book in a hash table implemented with buckets/chaining.
You will be creating a program that holds a simple Address Book and then lets you do a reverse phone number look up. You will be storing the address book ina hash table implemented with buckets/chaining.
Data Element - Person
Create a class Person which implements PersonInterface. The hashCode method should return an integer based on the following hash function:
hashcode = (p1 * (areaCode + p2 * exchangeCode) + extensionCode)
the key is the phone number as a string in the form: (XXX)XXX-XXXX
p1 is the prime 23 and p2 is the prime 31
In the phone number (555)123-4567
areaCode = 555
exchangeCode = 123
extensionCode = 4567
if the hashcode is negative - use the absolute value
Data Structure - HashTable
Create a class HashTable which implements HashTableInterface with buckets. You can use an array of linked lists(of Person objects).You may add any other methods you think are necessary.
Data Managers - AddressBookUtility
Createa class AddressBookUtility that implements the AddressBookUtilityInterface. This class will use an object of yourHashTableclass to hold the Person objects for the address book. The format of the file to be read from or written to is as follows:
Firstname<space>Lastname<space>PhoneNum<space>address<newline>
Example:
John Smith (222)555-2345 2310 Oak St., Willmington, VA 24488
You can assume all first names and last names will only be one word (no spaces)
Exception Classes - KeyInUseException, InvalidKeyException
The phone numbers in this address book must be unique because we are using them as the key to place them in the hash table (I know it's not ideal, but it simplifies the program). If a Person object being added to the hash table has the same phone number as an object in the hash table, the KeyInUseException will be raised.
If the key is not in the format (XXX)XXX-XXXX where the X is a digit, the InvalidKeyException will be raised.
GUI Driver
If the user selects the Read Text File button, use the FileChooser to ask the user for the location of the text file to be read. If the user selects Add, retrieve the information from the textbox fields and add to the address book. When the user selects Reverse Look Up, retrieve all the phone numbers in the left text area and print the corresponding lastname and firstname for that phone number. When the user selects Write Text File, use the FileChooser to ask the user for the location of the text file to be written to. When the user selects Exit, the program terminates.
Attachment:- Assign.zip
Building information modelling for infrastructure delivery
: Building Information Modelling for infrastructure delivery in the kingdom of Saudi Arabia.
|
How many mesh cells are necessary in the matrix
: Present a finite difference discretisation on the equidistant square mesh. How many mesh cells (as minimum) are necessary so that the matrix is diagonally dominant
|
Are you pleased with your result why or why not
: Are you pleased with your result? Why or why not? What listening problems did you have with the video clip? (accent, speed, vocabulary, content depth, background, etc.) List and rank (1=most, 2= next most, etc.) them. If the problem was vocabulary..
|
Describe the software types
: Reflect on how the software types and computer languages have evolved over time, and what this has meant for the use of these operating systems
|
Create a program that holds a simple address book
: Create a class HashTable which implements HashTableInterface with buckets. You can use an array of linked lists(of Person objects).You may add any other methods you think are necessary.
|
Identify the point group for the complete set of operations
: (a) {C2(z), C2(x)}, determine the other operations that must be present to form a complete point group. [Hint: Consider all of the products of the given elements with themselves and each other.] (b) Identify the point group for the complete set of op..
|
Write a response to the following problems
: In a sample of 12 bank tellers at a local branch office, the 7 tellers who have completed the advanced training program offered by the bank have a lower average error rate in the processing of transactions than the remaining 5 tellers
|
What is the character of matrix
: Using its x, y, and z coordinates, construct a 15 × 15 matrix that describes the application of the S4 symmetry operation to [PtCl4]^2-. (b) What is the character of this matrix?
|
Distribution of law enforcement personnel and resources
: In law enforcement crime data is used for many different purposes: distribution of law enforcement personnel and resources, funding of initiatives, and on a personal level, even when deciding where to live
|