Writing java program which can develop anagrams

Assignment Help Basic Computer Science
Reference no: EM13829608

Problem:

Anagrams: 

An anagram is a rearrangement of the letters of a word or phrase into a new word or phrase. Some of them can be quite amusing or apt. For example:

  • ok state cowboy = wacky toe boots 
  • live orange = regain love 
  • video games = gives a demo 
  • dr dave cline = devil dancer, evil cad nerd 

Instructions: 

1. Write a console application that prints out a list of all the anagrams from a phrase, with one anagram on each line.

2. Two pieces of input are required, (1) the dictionary file, and (2) the word or phrase to be rearranged. Your program needs to be able to use different dictionary files and query phrases based on keyboard input, either as command line arguments or as prompted by the program.

3. Create all of the anagrams from the input phrase, and print them out, one per line. Only generate each anagram once.

4. Generate the anagrams in order in terms of number of words. That is, generate all anagrams with 1 word, then all with 2 words, then all with 3, and so forth.

5. Test out your program on a number of phrases to find some good anagrams.

6. Optional: be able to exclude certain words, or demand that some words be part of the anagram.

Question checklist: 

  • Write a console program to generate anagrams. 
  • Let the user input both the dictionary file name, as well as a phrase. 
  • Generate anagrams in order from smallest to largest number of words. 
  • Come up with some good anagrams and write them down to share with the class. 
  • Make sure the programs compile and run from the command line without modification. 

Summary

This question is from Computer Science and it explains about writing Java program which can develop anagrams by using dictionary file attached.

Reference no: EM13829608

Questions Cloud

Developing an application for internet : Your company developed an Order Entry Intranet application for its sales personnel to enter orders for processing on behalf of their customers.
What is the net present value of each of the projects : Calculate the IRR for each of the projects. If the discount rate for all three projects is 10 percent, which project or projects would you want to undertake? What is the net present value of each of the projects where the appropriate discount rate is..
Clarify idea of marriage between close family members : The problem is belongs to Sociology and the problem clarify the idea of marriage between close family members should be encouraged or discouraged.
Statement review makes it lawful for a man to kill a thief : Statement Review makes it lawful for a man to kill a thief
Writing java program which can develop anagrams : An anagram is a rearrangement of the letters of a word or phrase into a new word or phrase. Some of them can be quite amusing or apt. For example:
Class hierarchy to represent geometric figures : Design, build and test a class hierarchy to represent geometric figures including circles, triangles, squares, rectangles, polygons, and hexagons. Implement just minimum number of methods per each class to reflect a distinctive characteristic of a..
Statement review the dictum that truth always triumphs : Statement review the dictum that truth always triumphs
Java game development jump it : The game "Jump It" consists of a board with n positive integers in a row, except for the first column, which always contains zero. These numbers represent the cost to enter each column. Here is a sample game board with n set to 6:
Write an essay on copying of computer software : The problem is belongs to Sociology and the problem is describe about writing an essay on copying of computer software and its de-criminalization.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create logic circuit which will decode dtmf-like keypad

Create the logic circuit which will decode the DTMF-like keypad. The keypad comprises of 16 keys, numbered 0 to 9, *, #, A, B, C, and D.

  Can you explain what is throw try and catch

Can you explain what is throw, try and catch

  Write a brief paragraph describing the application

4. Research an application of Fuzzy Sets/Fuzzy Logic. Write a brief paragraph describing the application (what is the problem it addresses; why was a Fuzzy System chosen as a solution; pros and cons of the Fuzzy solution; etc.). (and you must ..

  Keeping the focus on national security concerns

How should government justify telling private industry how to set up or improve their cybersecurity?• Keeping the focus on national security concerns, clearly discuss the compelling sociopolitical reasons, motivations, or arguments for or against gov..

  A power plant contains a scada

A power plant contains a SCADA (supervisory control and data acquisition) system controlling the distribution of electric power for a large military installation. The SCADA system contains both real-time sensor data and routine administrative informa..

  How could a business use information technology

How could a business use information technology to increase switching costs and lock in its customers and suppliers? Use business examples to support your answers

  Find area and circumference of a circle

Write a MATLAB program that will allow the user to find area and circumference of a circle. Selections and data entry will be done by presenting the user with a menu (using menu function) and provide her/him with the following choices:  ? Enter the ..

  Obtain a usb thumb drive and format it as fat32

prepare one single submission with both team members' names on it. Obtain a USB thumb drive and format it as FAT32.

  Current design model of it

In the current design model of IT service provision at NSI, the service desk function is provided in-house by TAFE employees. Consider the option of outsourcing the service desk.

  Investigate project management body of knowledge

Investigate Project Management Body of Knowledge (PMBoK). Write a report on one of knowledge areas. Describe the task of understanding potential threats

  Additional web resources for telecommunication & network sec

You may search these questions or part of them on the web resource links available under "Additional Web Resources for Telecommunication & Network Security.pdf".

  Enter the decimal value of the binary number

computer generates a random sequence of 0s and 1s creating a binary number. In each round, the computer adds one more bit to the previous sequence, only displaying the added bit.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd