Worst-case time complexity for sorting an array of stock

Assignment Help Basic Computer Science
Reference no: EM132812121

1. Create a Stock class containing two data fields: stockName (a string), and stockPrice (a double). and implementing the Comparable interface (check Java API). Write the appropriate accessor and mutator methods, as well as the toString, equals, and compareTo methods. The equals methods returns true if two Stock objects have the same name and price, otherwise false. The compareTo method takes a Stock object as argument and returns an positive integer if the calling object's price is greater than the argument object's stock price, 0 if the two stocks have the same price, otherwise a negative integer.

2. Demonstrate the Stock class in a program to:

Create an array of 20 elements. Each element is a Stock object sort the array in ascending order based on the stock price using any sorting algorithm. You need to rewrite the sorting algorithm to make it work on object sorting.

Ask the user to enter a stock name and price.

Search the array (using sequential search or binary search) for that stock

3. Analyze the worst-case time complexity for sorting an array of Stock objects and searching a stock in the array. Suppose the problem size (the array size is n).

Reference no: EM132812121

Questions Cloud

Information about passengers of the titanic : Consider this dataset which includes information about passengers of the Titanic. Create a Jupyter notebook file that contains
Experienced issue with technology : Think about a time in your life when you experienced an issue with technology. What lessons did you learn to avoid the issue from happening again?
Evaluate preparedness for virtualization : Describe the organization's environment, and evaluate its preparedness for virtualization.
Administrator can harden system on network : Describe some ways that an administrator can harden a system on a network. how it works and what type of information it extracts
Worst-case time complexity for sorting an array of stock : Analyze the worst-case time complexity for sorting an array of Stock objects and searching a stock in the array.
Difference between phishing and spear phishing attack : The Computer Fraud and Abuse Act (CFAA), which was enacted by congress in 1986 criminalizes, What is the difference between Phishing and Spear Phishing attack?
Explanation of operating systems fundamentals : Brief explanation of operating systems (OS) fundamentals and information systems architectures.
Describe the organization environment : Describe the organization's environment, and evaluate its preparedness for virtualization.
Digital media and society : Hopefully, you enjoyed class on Digital Media and Society. What is the most important thing you have learned from this class? What is your Number One Takeaway?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Formulate a pseudocode algorithm

Obtain two numbers from the keyboard, compute their sum and display the result.

  Significant vulnerabilities present in applications today

In a recent study by Verizon and others, it was found that cross-site scripting and SQL injections are prevalent in many Internet-facing applications.

  Requirements of the employer under the americans

What are the requirements of the employer under the Americans with Disabilities Act of 1990 when making selection decisions?

  Assess the relationship between heavy alcohol use

1. A case-control study is conducted to assess the relationship between heavy alcohol use during the first trimester of pregnancy and miscarriage.

  Determine high-level logical system characteristics

Identify security concerns and other nonfunctional requirements. Determine high-level logical system characteristics for information technology-based solution.

  Design an algorithm that reads in a set of n single digits

For example, the algorithm should convert the set of 5 digits {2, 7, 4, 9, 3} to the integer 27493.

  Assessment of leadership skills and competencies

In the Northouse text, complete the "Skills Inventory: Leadership Instrument: LMX 7 Questionnaire," on pages 154â156 (at the end of Chapter 7).

  Differences between a page file and a swap file

Explain the differences between a page file and a swap file. Give an example of both, how they are used and what are the conditions in which they are used.

  Design a plan for email content which was leaked

Suppose that you feel that your (or your boss's) email content was always leaked (e.g., some confidential information in your email was known to many others). Design a plan for this investigation.

  Equipment depreciation amount per year

What is the equipment's depreciation amount per year during the life of the contract, using the straight line basis?

  Build a program to delete the element at index k

Delete an array element at index 'K'Given an array of integers, build a program to delete the element at index K. Use C programming

  Describe 3 secure systems

a. Describe 3 secure systems that a bank would have and state why they need to be secure. b. Describe how banks can try to keep the systems you mentioned.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd