Write three methods of the following text given below

Assignment Help Computer Engineering
Reference no: EM132081385

You need to write three methods of the following bullet points below. my professor attached a text file from a book and he asked us to rewrite that text using these three bullet points in methods. Since this is java 1 id like the methods to be as simple as possible.

You can pick any of your text file of choice since its a method; attaching that wouldn't be nessassary since i just want to see how its done.

But make sure the methods below work all throughout the given text.

1) If 'r' is at the end of a word and is preceded by "ee" or 'i' replace 'r' with "yah" instead of 'h'. For example, "deer" becomes "deeyah" instead of "deeh", but "veneers" still becomes "veneehs".

2) If 'r' is at the end of a word and is preceded by "oo", replace 'r' with "wah". For example, "door" becomes "doowah" instead of "dooh" (but "doors" still becomes "doohs").

3) If a word ends in 'a', append an 'r'. For example "tuna" becomes "tunar", "Cuba" becomes "Cubar", and "idea" becomes "idear". (Don't change this to an 'h' based on the previous rule; leave it as an 'r'.) Do not apply this rule to the word "a", so "a tuna" should become "a tunar", not "ar tunar".

Reference no: EM132081385

Questions Cloud

Why authors of the texas constit : Why authors of the Texas Constit. provided bankrupts such protection from creditors when most of the authors were wealthy creditors themselves?
Convicting kelley of unlawful entry in the case of kelley : Tutors, do you feel that the judge got it right by convicting Kelley of unlawful entry in the case of Kelley v. United States? If so, why. If not why?
Essential features of effective business communication : Describe the essential features of effective business communication addressed to persons from different cultures.
How could the contract for the sale of goods protect : How could the contract for the sale of goods protect a seller who wishes to sell goods to a buyer where there is a risk that the buyer might not be able to pay
Write three methods of the following text given below : Rewrite that text using these three bullet points in methods. Since this is java 1 id like the methods to be as simple as possible.
Plot the production possibility curve for joan : What would be happening if Joan's combination of her grades and hours of work per week Explain in your own words, using demand and supply curves, the concepts
Mixes and sells organic pesticides : Organic Garden, Inc. mixes and sells organic pesticides. What does Garden have to do in order to sell their products? Choose all that apply.
If the us congress enacts new environmental legislation : If the US Congress enacts new environmental legislation, upon whom will they rely on to implement the legislation?
Pro argument for legalization : Using the perspective of ethical egoism, what are the issues with legalizing marijuana, using a pro argument for legalization?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd