Design java application that will read file containing data

Assignment Help Basic Computer Science
Reference no: EM132385213

Final Project -

Design a Java application that will read a file containing data related to the US. Crime statistics from 1994-2013. The description of the file is at the end of this file. The application should provide statistical results on the data including:

a. Population growth in percentages from each consecutive year (e.g. 1994-1995 calculation is ((262803276 - 260327021)/260327021)*100 = 0.9512%, 1995-1996 would be ((265228572 - 262803276)/262803276)*100 = 0.9229%)

b. Years where the maximum and minimum Murder rates occurred.

c. Years where the maximum and minimum Robbery rates occurred.

The following are some design criteria and specific requirements that need to be addressed:

a. Use command line arguments to send in the name of the US Crime Data file.

b. You should also use Java classes to their full extent to include multiple methods and at least two classes.

c. You are not allowed to modify the Crime.csv Statistic data file included in this assignment.

d. Use arrays and Java classes to store the data. (Hint: You can and should create a USCrimeClass to store the fields. You can also have an Array of US Crime Objects.)

e. You should create separate methods for each of the required functionality. (e.g. getMaxMurderYear() will return the Year where the Murder rate was highest.)

f. A user-friendly and well-organized menu should be used for users to select which data to return. A sample menu is shown in run example. You are free to enhance your design and you should add additional menu items and functionality.

g. The menu system should be displayed at the command prompt, and continue to redisplay after results are returned or until Q is selected. If a user enters an invalid menu item, the system should redisplay the menu with a prompt asking them to enter a valid menu selection.

h. The application should keep track of the elapsed time (in seconds) between once the application starts and when the user quits the program. After the program is exited, the application should provide a prompt thanking the user for trying the US Crime Statistics program and providing the total time elapsed.

i. Hint: When reading the Crimes file, read one line at a time (See ReadEmail.java) and then within the loop parse each line into the USCrimeClass fields and then store that USCrimeClass Object into an array. Note you can use String.split(",") to split the CSV line into a the fields for setting the USCrimeClass Object.

Attachment:- Assignment Files.rar

Reference no: EM132385213

Questions Cloud

How the changing nature of work may affect training : Post a brief description about the future direction of needs analysis. Explain how the changing nature of work may affect training and needs analysis.
What kind of automatic behavioral responses are activated : Define classical conditioning and explain all the variables involved. What kind of automatic behavioral responses are "activated" by classical conditioning?
Develop a strategy and an organized method of the process : Submitting a request for proposal (RFP) is usually a requirement for human services administrators who wish to pursue government grants. For example.
Why event was central to developing i-o field of psychology : Select one event, research study, or individual and explain why you think this event, study, or individual was central to developing the I/O field of psychology
Design java application that will read file containing data : Final Project - Design a Java application that will read a file containing data related to the US. Crime statistics from 1994-2013
Identify the specific qualitative research design used : Once you have located an appropriate qualitative study, identify the specific qualitative research design used. Summarize the main points of the study.
Explain the attentional features involved in driving : Describe personal examples of both automatic and controlled processes of attention. Explain benefits and hindrances of your experiences.
Summarize the topic - Stem Cell Article : Summarize and give your opinion about the topic (it is very controversial politically and religiously) - Stem Cell Article
Compensation-benefits package is starting to develop issues : Imagine your human resource project of revamping the employee compensation and benefits package is starting to develop issues.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Exploratory modelling and analysis

Perhaps the most doubtless way to implement a policy is through informed decision making. Smart cities are being developed even as we speak.

  Arousal of motives is applied to the process

Describe the model of the motivation theory and explain how the arousal of motives is applied to the process.

  Group policies with active directory

Find three (3) popular sites explaining the advantages and disadvantages of using Group Policies with Active Directory.

  Determine the delays of the carry out bit c48

Determine the delays of the carry out bit c48 and the gate complexity, i.e, the numbers of AND, OR and XOR gates needed for implementing the following 48-bit adders.

  Advantages and disadvantages of selected input device

The Word document summary should discuss the advantages and disadvantages of the selected input device. Finally, the summary should list ways that the disadvantages could be minimized.

  What is the purpose of the boot loader

What is the purpose of the boot loader during the boot-up process

  Describe what policy changes you would implement to mitigate

The damaging scandals of Wikileaks/Bradley Manning and Edward Snowden demonstrate a series of critical failures of existing security policy.1. For both scandals describe the policy failures that you believe were responsible for the incidents. 2. Desc..

  Distributed computing applications

Distributed.net (www.distributed.net) is an organization that coordinates research on distributed computer applications. People and organizations can join Distributed.net and contribute idle computing power to ongoing research projects that requir..

  Any assistance would be appreciated

Any assistance would be appreciated. It can be anything as long as it meets the criteria.

  Disadvantages of each deployment approach

Briefly describe direct, parallel, and phased deployments. What are the advantages and disadvantages of each deployment approach.

  Explain the importance of key management in cryptography

Explain the importance of key management in cryptography. why it is important and one criticism of the regulation.

  Discovered by visiting their homes

Do they buy different things than you do? If so, why? How might a company distinguish you from them in terms of its targeting?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd