Know how to process command line arguments

Assignment Help Basic Computer Science
Reference no: EM13861092

Through this programming assignment, the students will learn to do the following:

Know how to process command line arguments.

Perform basic file I/O.

Use structs, pointers, and strings.

Use dynamic memory.

This assignment asks you to sort the lines of an input file (or from standard input) and print the sorted lines to an output file (or standard output). Your program, called bstsort (binary search tree sort), will take the following command line arguments:

% bstsort [-c] [-o output_file_name] [input_file_name]

If -c is present, the program needs to compare the strings case sensitive; otherwise, it's case insensitive. If the output_file_name
is given with the -o option, the program will output the sorted lines to the given output file; otherwise, the output shall be the standard output. Similarly, if the input_file_name is given, the program will read from the input file; otherwise, the input will be from the standard input. You must use getopt() to parse the command line arguments to determine the cases.

In addition to parsing and processing the command line arguments, your program needs to do the following:

You need to construct a binary search tree as you read from input. A binary search tree is a binary tree. Each node can have at most two child nodes (one on the left and one on the right), both or either one can be empty. If a child node exists, it's the root of a binary search tree (we call subtree). Each node contains a key (in our case, it's a string). If the left subtree of a node exists, it contains only nodes with keys less than the node's key. If the right subtree of a node exists, it contains only nodes with keys greater than the node's key. In case of duplicate keys, you can use a counter scheme (i.e., using an integer to indicate the number of duplicate keys the node is currently representing). You can look up binary search tree on the web or in your Data Structure textbook. Note that you do not need to balance the binary search tree (that is, you can ignore all those rotation operations) in this assignment.

Initially the tree is empty (that is, the root is null). The program reads from the input file (or stdin) one line at a time; If the line is not an empty line, it should create a tree node that stores (a copy of) the string (you shall remove the trailing line feed) and then insert the tree node to the binary search tree. Pay attention to situations that a duplicate is found, in which case, you ought to simply increment the count and remove the new node, instead of inserting the duplicate node.

You must develop two string comparison functions, one for case sensitive and the other for case insensitive. You must not use strcmp() and strcasecmp() functions provided by the C library. You must implement your own version.

Once the program has read all the input (when EOF is returned), the program then performs an in-order traversal of the binary search tree to print out all the strings one line at a time to the output file or stdout.

Before the program ends, it must reclaim the tree! You can do this by performing a post-order traversal, i.e., reclaiming the children nodes before reclaiming the node itself. Make sure you also reclaim the memory occupied by the string as well.

It is required that you use getopt for processing command line and use malloc/free functions for dynamically allocating and deallocating nodes and the buffers for the strings. It is required that you implement your own string comparison functions instead of using the corresponding libc functions.

Here's an example:

bash$ cat myfile
bob is working.
david is a new hire.
alice is bob's boss.
charles doesn't like bob.
 
bash$ ./bstsort myfile
alice is bob's boss.
bob is working.
charles doesn't like bob.
david is a new hire.

One can also use './bstsort -o sortedfile < myfile' to take input from stdin (in this case, it's replaced by a file by the shell) and output the sorted lines in the output file (called sortedfile in the example).

Please submit your work through moodle as one zip file. Follow the instructions below carefully (to avoid unnecessary loss of grade):

To start, first create a directory for this homework and name it firstname-lastname-assignment1 (of course, you'd use your real name here). You should place the source code and the Makefile in the directory. One should be able to create the executable by simply 'make'. The Makefile should also contain a 'clean' target for cleaning up the directory (removing all temporary files, object files and executable files). Make sure you don't include intermediate files: *.o, executables, *~, etc., in your submission. (There'll be a penalty for including unnecessary intermediate files).

Please make sure you submit homework before the deadline. Late submission will incur penalties as specified in the syllabus.

Reference no: EM13861092

Questions Cloud

Prompts the user for a hexadecimal digit : Write a MIPS program that prompts the user for a hexadecimal digit and then displays the decimal equivalent multiplied by 2. For example, the program displays 10 for hex '5', 20 for 'A', etc. If the user enters an invalid value, the program should di..
A program that will prompt the user for a date and a time : It's to be written in C++. You will be writing a program that will prompt the user for a date and a time. For the date, the user will be asked to enter in three integers (month, day, year). There will be four functions related to the date:
Sample the dribbling to extract its frequency : Consider a basketball being dribbled. If the height of the basketball can be described by a sine wave of maximum height 2h, average height h and minimum height 0, and the ball hits the ground once per second, how fast would a video camera have to sam..
What are your thoughts about your results : What are your thoughts about your results?  What are you feelings towards this assignment?  How would you improve it? Submit this with your assignment.
Know how to process command line arguments : Through this programming assignment, the students will learn to do the following: Know how to process command line arguments. Perform basic file I/O.
Theater seating revenue with input validation : Theater Seating Revenue with Input Validation: A dramatic theater has three seating sections, and it charges the following prices for tickets in each section:  Section A seats cost $20 each
Discuss the differences between external and internal threat : Discuss the differences between external and internal threats as they relate to network security. Which threat is most difficult to defend against and why? What protections would be used specifically related to internal threats? Why is it important f..
Display to the screen the first 20 numbers : Design an algorithm that will display to the screen the first 20 numbers, with their squares and cubes, as follows: Number Square Cube
The ph of an aqueous solution is a measure : Microsoft Word - HW#9.docx In chemistry, the pH of an aqueous solution is a measure of its acidity. A solution with a pH of 7 is said to be neutral, a solution with a pH greater than 7 is basic, and a solution with a pH less than 7 is acidic.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create an new windows form application

Create an new windows form application. Add 2 controls that can display multi-line text. Use the application to enter data into an ArrayList (or you can initialize the arrayList via the application).

  What is bitmap indexing

What is bitmap indexing? Create a relation with two columns and sixteen

  Write a public method called handletwoarrays

Q3.  Write a public method called handleTwoArrays that accepts two integer arrays (assuming they are of same sizes) as parameters. The method invokes switchTwoArrays to perform switching if the sum of the values in the first array is smaller than the..

  Develop an action plan identifying key tasksand

Develop an action plan identifying key tasksand / or processes involved in changing from Windows 7 to Windows 10 and how they will change

  How are the business and the technology perspectives

Identify in which phase of the development process - How are the business perspectives and the technology perspectives of an informations system related.

  Risk assessment section

Risk Assessment Section

  Describe how technical goals can be coupled with information

Describe how technical goals can be coupled with information assurance and security considerations in a network design project.

  Design a shopping page with 5 products

Design a shopping page with 5 products on it. Each product has one image, product title, product description, and price.  You may add necessary buttons, page heading, and background.A. When the page first loaded, display exactly 5 product items with ..

  How about a costrich

Suppose you have a class CBird, as follows, that you want to use as a base class for deriving a hierarchy of bird classes

  What are control and what are containers

What are the various component use to build Graphic User Interface(GUI) screen? What are control and what are containers

  Generate a directory listing showing the structure

Explain what the script will do and who is the author in a comment area - Create the directory structure and create the files as defined in the previous Individual Project.

  Information on the vulnerabilities, threats, and exploits

To assist PVSS, your contract has been expanded to also create a risk assessment. In addition, PVSS management has asked for information on the vulnerabilities, threats, and exploits.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd