Implement a custom java class for the guest information

Assignment Help Computer Engineering
Reference no: EM133618457

Question: Develop a Java program that meets the following requirements:

1. Assume that you will be implementing Java software to track attendees for a conference: if the guest's identifying information is found, they are allowed to enter. A guest's identifier includes their full name and then an integer to represent their guest category number.

Based on your experience with the hash set and hash map data structures, decide whether to use a hash map or hash set for step 2 for this task for most effective programming.

Briefly explain in code comments on your class your reasoning for the choice.
For example, a guest identifier could be: FrankSmith3992

2. Implement a main method in your class that includes code to meet the following requirements:
(a) Develop a MyhashMap or MyHashSet data structure object based on your choice in step 1 that allows to simulate checking whether the
guest's identifier (a String) is in the conference records.

For example, the guest presents the identifier FrankSmith3992, and a volunteer checks to see if the identifer is on the list of approved guests.

HINT: review the TestMyHashMap and TestMyHashSet example code carefully

(b) Insert data for at least four guests into your data structure, ensuring that some but not all guests share the same category

For example, the two guest identifiers FrankSmith3992 and
BillJones3992 share the same category

HINT: check for the methods defined in your chosen data structure Java class to see which could be used for this step and the following.

OPTIONAL ADVANCED: you could even implement a custom Java class for the guest information, so that various information is stored in
one guest object.

(c) Print out every guest's name and category information from the datastructure, and simulate checking whether one guest identifier is in therecords using data structure operations.

(d) Using the same guest data, develop vertex data for an unweighted graph object in which the vertex data are guest names and an
edge exists between two guests if the two guests have the same category.

Make an unweighted graph object using your data

HINT: Review TestGraph.java. carefully, including the constructor methods. It is NOT required that you automate the creation of vertex
data: it can be done manually

(e) Using graph data structure operations, print out basic information about your graph including its size

(f) Run either a depth first or breadth first traversal in your graph, starting at a particular guest id (vertex) of your choice, and print out
the order of vertices visited

Review the TestBFS and TestDFS examples. Note that an internal SearchTree type is used to hold the result of the traversal. Did the traversal reach all of the guests? If not, think about why.

Reference no: EM133618457

Questions Cloud

Album appetite for destruction : Guns and Roses became the most popular heavy metal band in the World in the late 80s due to their album Appetite for Destruction
Determine which approach is best to assess it risk : Compare/contrast qualitative and quantitative assessments. Based on your experience provide example of each. Determine which approach is best to assess IT risk.
Explanation of your modifications to the code : Starting with the Python code for the time to failure ex- ample (TTF) posted on Quercus, make the necessary changes so that we can have any number of spare
Why are they considered bad : Discuss insertion, deletion, and modification anomalies. Why are they considered bad? Illustrate with examples
Implement a custom java class for the guest information : Develop a MyhashMap or MyHashSet data structure object based on your choice in step 1 that allows to simulate checking whether the guest's identifier
What are the consequences of having elections : What are the consequences of having elections where voter turnout tends to be relatively low?
What was the united states marshall plan : What was the United States' Marshall plan? What was the United States' Marshall plan? It was a United Stated Evacuation plan.
Discuss the difference between coding and programming : We are living in an age where coding and programming is starting to become popular. Discuss the difference between coding and programming.
Women began to join the industrial workforce : Women began to join the industrial workforce, primarily in textile mills, but they earned wages amounting to half or less than what men earned.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What drives customer demand in the cybersecurity market

Failure to understand what drives customer demand in the cybersecurity market can result in a quick trip to bankruptcy court or a forced sale of a company.

  Analyze software monopolies give your personal opinion

Analyze software monopolies. Give your personal opinion. Do you agree with Plato's Glaucon? Either way, explain why. Do all of them, not just one of them. Are these positive rights? Explain your personal opinion, according to one or more ethica..

  Use the internet to locate one incident of disaster recovery

Use the Internet to locate one incident of disaster recovery that was successful and one incident that was not successful. Compare and contrast

  What steps might have been taken to prevent his perpetrating

David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions.

  What are some analytics pwc could use to measure

what are some analytics PwC could use to measure the effectiveness of this client relationship training? For your initial posts, focus primarily on the Behavior

  Study the zachman framework for enterprise data architecture

describe in specific terms how you would apply that framework to your case study. my case study topic is Clinical Effectiveness of Data Management

  Discuss law enforcement training and resources

Discuss law enforcement training and resources that are now available to local law enforcement agencies through Homeland Security.

  How does the operating system know how to open a file

How does the operating system know how to open a file when a user wants to access it? the setup wizard tells the computer where to open it the user must tell

  Write down c program that has declaration in main() to store

Modify this display() function to alter the address in channels. Always use the expression *channels rather than *(channels + i) to retrieve the right elements.

  What is the purpose of diffie-hellman protocol

What is the purpose of Diffie-Hellman (DF) protocol? How does DF work by describing the Diffie-Hellman (DH) function and the discrete logarithm problem?

  What changes would you make to the existing security policy

What changes would you make to the existing security policy so that security is improved after employees are terminated?

  What happens if an architecture compliance review identifies

What happens if an Architecture Compliance review identifies a failure to conform to the Enterprise Architecture?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd