Enter a name the application will display messages

Assignment Help Computer Engineering
Reference no: EM132211366

Question :

Write a program that reads the contents of the two files into two separate arrays. The user should be able to enter a name the application will display messages indicating whether the names were among the most popular.

1. GirlNames.txt and BoyNames.txt contain a list of the 200 most popular names given to girls/boys born in the United States for the years 2000 through 2009.

2. Your application should use an array to hold the names.

3. The program should continue interacting with the user indefinitely unless the user chooses to quit by entering "QUIT" (should be case insensitive).

4. The user should enter a single name and the program will search the name in both lists. The user SHOULD NOT specify whether the search is for girls name or boys name. The program is responsible for finding either or both and telling the user where it found it.

5. The program should display one of the following four results (examples):

* The name 'Annabelle' was not found in either list.

* The name 'Xavier' was found in popular boy names list (line 81).

* The name 'Amanda' was found in popular girl names list (line 63).

* The name 'Jordan' was found in both lists: boy names (line 38) and girl names (line 75).

6. The search should be case insensitive, but the resulting message should always display names in properly capitalized format (the first letter uppercase all others lowercase).

7. The files should only be opened/loaded and closed once per program session (at the beginning of the program execution). During the search the files should be closed.

8. If any or both of the files are missing, display a message to the user informing which file is missing or if both files are missing and exit the program.

9. Your program should contain properly defined and used methods. For example, your program should have a method that loads a file into an array. This method should take one parameter for the file name to be loaded and return an array of Strings. Another method should take a name and an array reference and perform a search and return results to the calling method.

10. Do not upload input text files.

Reference no: EM132211366

Questions Cloud

How did hitech act law impact ehr adoption : How did HITECH ACT law impact EHR Adoption and meaningful use?
Describe macra and how quality payment program : Describe MACRA and how the quality payment program gives providers financial incentives
How does the strategic positioning differ for two companies : Adriana Alvarado has decided to purchase a laptop computer. She has narrowed the choices to two: Drantex and Confiar. Both brands have the same processing.
Describe how market economy functions : Describe how a market economy functions and the relationships of its major subdivisions or aggregates, such as the government, households, and business sectors.
Enter a name the application will display messages : The user should be able to enter a name the application will display messages indicating whether the names were among the most popular.
Calculate the fbt payable : Advise Yan's employer as to the FBT and income tax consequences of the above loan arrangement (including any deductions the employer might be entitled to)
Create new marketing plan in its acquisition of whole foods : You are the marketing firm hired by amazon to create a new marketing plan in its acquisition of whole foods.
Calculate the cost base of the property : Calculate the cost base of the property. What type of CGT event is the sale of this property? Calculate the capital gain Louisa made that's liable to capital.
What is the goal of establishing rapport with the audience : What is the goal of establishing rapport with the audience

Reviews

Write a Review

Computer Engineering Questions & Answers

  Describe an efficient algorithm that can use rustbucket

Describe an efficient algorithm that can use Rustbucket to sort n music files correctly and show that your algorithm has expected running time that is 0.

  Consider database security from a variety of perspectives

Share experiences have you had in terms of user security in past jobs or as a student? Do you feel the user security was effective in those situations? What will you have done differently in light of what you've learned about data security.

  Write a function which takes as inputs two vectors

Write a function which takes as inputs two vectors x and y of arbitrary, but equal, size and outputs a vector which contains all of the elements.

  Why was an adaptable network solution so critical to rmh

Why was an adaptable network solution so critical to RMH and What were the main components of the hospital's network?

  Simulate a random number generator for mega millions numbers

Write Java code to simulate a Random Number Generator for Mega Millions Numbers.

  What kind of wsus infrastructure should you implement

You have been tasked to set up a WSUS infrastructure. What kind of WSUS infrastructure should you implement and why?

  Show that number of dag with n vertices and indegree bounded

Show that the number of DAGs with n vertices and indegree bounded by d that are consistent with a given order is 2T(dn log n).

  Create a pipe and forks a child process

The child writes back to its parent through its side of the pipe stating "Daddy, my name is ".The parent then writes the message received from the child to its.

  Oe of the needs that your client has is a databaseto

one of the needs that your client has is a database.to design a database a database planner should spend a

  Write a java expression that results in the significant byte

Write a Java expression that results in the least significant byte of an integer x being preserved, but all other bits set to 1.

  Compute the average speed and mips rating

An application uses the following ASC instruction mix: ADD (20%), SHR (15%), LDA* (20%), STA (15%), TDX (15%), and LDX (15%).

  Which piece of software is the most important to you

Will you be purchasing a desktop or laptop? If your computer will be staying in one place, and perhaps used by several other people.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd