Directory search using a binary search tree

Assignment Help Basic Computer Science
Reference no: EM131043688

1) Write a java program that is able to apply ahash function to a first and last name (key) ofa person, and lookup the appropriate index in ahash table modeling a telephone directory. Thetelephone number (value) should be returned ondoing a lookup (you can prepopulate the tablewith 20 entries for this purpose). You can useexisting Java code (or libraries) to model thehash table, however, your program should becustomized to use the hash table structureappropriately.Demonstrate that your program works by providingmeaningful console messages that walk the testerthrough the search function in the directory.

2) Implement the same telephone directory search using a Binary Search Tree.You can use existing Java code (or libraries) to model the BST, however, your program should be customized to use the BST structure appropriately.Demonstrate that your program works by providingmeaningful console messages that walk the testerthrough the search function in the directory.

Reference no: EM131043688

Questions Cloud

Length of the array or arraylist : Write a short Java application that stores words in an Array or ArrayList. You get to pick the number of words to store. Generate a random number between 0 (inclusive) and the length of the Array or ArrayList (exclusive).
Requires a portfolio with an expected return : In order to fund her retirement, Michele requires a portfolio with an expected return of 0.10 per year over the next 30 years. She has decided to invest in Stocks 1, 2, and 3, with 25 percent in Stock 1, 50 percent in Stock 2, and 25 percent in Stock..
Design a half adder circuit using only nand gates : Convert 0010001010000110 (BCD) into its binary equivalent and then divide it by 100102. Express your result in octal equivalent.
Remaining until maturity on bonds and yield to maturity : Large Industries annual bonds are selling at 95.70 (i.e., the price is $957 for the $1,000 bond). There are 8 years remaining until maturity on the bonds and the yield to maturity is 6.25%. Find the coupon rate.
Directory search using a binary search tree : Implement the same telephone directory search using a Binary Search Tree.You can use existing Java code (or libraries) to model the BST, however, your program should be customized to use the BST structure appropriately.Demonstrate that your progra..
Describe the qualities of valuable information : Describe the qualities of valuable information. Describe the different data types used in the fields of a database. Describe and explain how the different methods of validating data are used in a database.
When are two sets of functional dependencies equivalent : When are two sets of functional dependencies equivalent
Describe closure activities that must take place : Describe five closure activities that must take place to effectively close out a project.
Which of the following deals with transitive dependencies : Which of the following deals with transitive dependencies in normalization?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Methods for program compilation and execution

Write a two-page report that compares static, dynamic, and interpretive methods for program compilation and execution. Your report should discuss the advantages and disadvantages of each method

  Discuss economic theory related to the quote

Question/Prompt: "In 2014, "the United States exported $2.34 trillion worth of goods and services-an all-time record. Exports from the United States in 2014 equaled the entire gross domestic product of Brazil and exceeded all commercial output in Ind..

  Assignment on polymorphism

Assignment on Polymorphism, How to design and define interface, How to implement methods declared in interface

  Find parity of binary number stored in accumulator

Use an algorithm similar to one in Question 1 to find the parity (odd/even) of a binary number stored in the accumulator.

  Determine the magnitude of the horizontal force p

The single square-threaded screw has a mean diameter of 25 mm and a lead of 7.5 mm. The coefficient of static friction is µs = 0.25

  A large geographic region

A company that has 5,000+ users across a large geographic region

  What strategic advantage can continental derive

What strategic advantage can Continental derive from the real-time system as opposed to a traditional information system?

  How would you go about implementing these technologies

How would you go about implementing these technologies in this high-risk environment? What precautions or approaches would you take to minimize risks?

  Find the error in the following pseudocode

Find the error in the following pseudocode. Constant Real GRAVITY = 9.81 Display "Rates of acceleration of an object in free fall:"

  Address-based authentication works

Explain how address-based authentication works. Is this a secure authentication technique? Why or why not?

  What will be the date in the opening of the letter

If /home/zach/draft and /home/max/letter are links to the same file and the following sequence of events occurs, what will be the date in the opening of the letter?

  Call and write methods with parameters and return values

Call and write methods with parameters and return values.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd