Questions
Does anyone know how to find if a certain String is available in an ArrayList? I...

Does anyone know how to find if a certain String is available in an ArrayList?

I was asked by my instructor to make a certain program about Student Record

In the area where I need to add some student in the ArrayList it won't add if there is the same name in the ArrayList

at first I used the equals method and contains method but later I found it was prohibited to use such method.

Is there a way to find if a String is Available in the ArrayList without using the method

Please check on else if(response==2)

import java.util.*;
public class performanceTask {

   public static void main(String[] args) {
       int response;
       ArrayList<String> listOfStudent = new ArrayList<String>();

       Scanner aScanner = new Scanner(System.in);
       do {
           System.out.println("[Selection Bar]");
           System.out.println("[1] List of Students.");
           System.out.println("[2] Add Student.");
           System.out.println("[3] Edit Student.");
           System.out.println("[4] Delete Student.");
           System.out.println("[5] Clear list of Students.");
           System.out.println("[6] Exit Program.");
           System.out.println("--------------------------");
           System.out.println("Select an option: ");
           response = aScanner.nextInt();
          
           if(response == 1) {
               int size = listOfStudent.size();
               if(size == 0) {
                   System.out.println("No Records Found!\n");
               } else {
                   Collections.sort(listOfStudent);
                   for(int i = 0; i<listOfStudent.size(); i++) {
                       System.out.println(i + ". " + "[" + listOfStudent.get(i) + "]");
                      
                   }
                   System.out.println("\n");
              
               }
           }else if (response == 2) {
               System.out.println("Enter Name of a Student: ");
               String addStudent = aScanner.next();
              
               if (listOfStudent.contains(addStudent)) {
                   System.out.println(addStudent +" already existed! \n");
                  
               } else {
                   System.out.println("Do you want to save " + addStudent + "? [y/n]: ");
                   String saveIt = aScanner.next();
                       if(saveIt.equals("y") || saveIt.equals("Y") ) {
                           listOfStudent.add(addStudent);
                           System.out.println(addStudent +" has been successfully added! \n ");
                       }else if (saveIt.equals("n") || saveIt.equals("n")) {
                           System.out.println("\n");
                           continue;
                       }else {
                           System.out.println("It must be y or n only!");
                       }
                   }
              

In: Computer Science

1) Convert negative fractional decimal number to 8-bit binary number: – 16.625 (use 2's complement binary...

1) Convert negative fractional decimal number to 8-bit binary number: – 16.625 (use 2's complement binary format)

Hint: –17 + 0.375

Given the hint above, the fractional number will be divided into two parts,
- Whole number,
- Fractional part, must be positive

(2) Proof to check that your calculation above is correct

In: Computer Science

Spatial indexing with quadtrees in python The quadtrees data structure is a special type of tree...

Spatial indexing with quadtrees in python

The quadtrees data structure is a special type of tree structure, which can recursively divide a flat 2-D space into four quadrants. Each hierarchical node in this tree structure has either zero or four children. It can be used for various purposes like sparse data storage, image processing, and spatial indexing. Spatial indexing is all about the efficient execution of select geometric queries, forming an essential part of geo-spatial application design. For example, ridesharing applications like Ola and Uber process geo-queries to track the location of cabs and provide updates to users. Facebook’s Nearby Friends feature also has similar functionality. Here, the associated meta-data is stored in the form of tables, and a spatial index is created separately with the object coordinates. The problem objective is to find the nearest point to a given one. You can pursue quadtree data structure projects in a wide range of fields, from mapping, urban planning, and transportation planning to disaster management and mitigation. We have provided a brief outline to fuel your problem-solving and analytical skills. Objective: Creating a data structure that enables the following operations

 Insert a location or geometric space

 Search for the coordinates of a specific location

 Count the number of locations in the data structure in a particular contiguous area

In: Computer Science

SYSTEM RECOVERY It is highly probable that eventually something bad will happen to your data or...

SYSTEM RECOVERY

It is highly probable that eventually something bad will happen to your data or your hardware. What can you do to lessen the impact of these problems? You can look at both hardware and software solutions. What is fault tolerance?

In: Computer Science

a) Why is it essential to distinguish between and specify both user requirements and system requirements...

a) Why is it essential to distinguish between and specify both user requirements and system requirements in the software specification process? Using one of the systems presented in Section 1.3, present one user requirement and the system requirements derived from it. b) How do you validate the user requirements and system requirements? Explain your validation procedure (~ step by step)for the above requirements.c) How do you do the software validation for the same requirements you selected above?Hint: ReviewSections 1.3 Case Studies,2.2.1Software Specification, and 2.2.3 Software Validation.

In: Computer Science

In C++                                          &n

In C++

                                                        Circle

-int x //x coord of the center

-int y // y coord of the center

-int radius

-static int count // static variable to keep count of number of circles created

+ Circle()                     //default constructor that sets origin to (0,0) and radius to 1

+Circle(int x, int y, int radius)   // regular constructor

+getX(): int

+getY(): int

+getRadius(): int

+setX(int newX: void

+setY(int newY): void

+setRadius(int newRadius):void

+getArea(): double // returns the area using formula pi*r^2

+getCircumference // returns the circumference using the formula 2*pi*r

+toString(): String   // return the circle as a string in the form (x,y) : radius

+getDistance(Circle other): double // * returns the distance between the center of this circle and the other circle

+moveTo(int newX,int newY):void // * move the center of the circle to the new coordinates

+intersects(Circle other): bool //* returns true if the center of the other circle lies inside this circle else returns false

+resize(double scale):void// * multiply the radius by the scale

+resize(int scale):Circle // * returns a new Circle with the same center as this circle but radius multiplied by scale

+getCount():int //returns the number of circles created

//note that the resize function is an overloaded function. The definitions have different signatures

  1. Extend the driver class to do the following:
    1. Declare a vector of circles
    2. Call a function with signature inputData(vector<Circle> &, string filename) that reads data from a file called dataLab4.txt into the vector. The following c-e are done in this function
    3. Use istringstream to create an input string stream called instream. Initialize it with each string that is read from the data file using the getline method.
    4. Read the coordinates for the center and the radius from instream to create the circles
    5. Include a try catch statement to take care of the exception that would occur if there was a file open error. Display the message “File Open Error” and exit if the exception occurs
    6. Display all the circles in this vector using the toString method
    7. Use an iterator to iterate through the vector to display these circles
    8. Display the count of all the circles in the vector using the getCount method
    9. Display the count of all the circles in the vector using the vector size method
    10. Clear the vector
    11. Display the current count of all the circles using the getCount method
    12. Display the current count of all the circles using the vector size method
    13. Use the cout statements and other helper statements given to you in the template in Zylabs

Create "Circle.h"

Create "Circle.cpp"

Complete Main.cpp

#include<iostream>
#include "Circle.h"
#include <fstream>
#include <vector>
#include<cstdlib>

#include <fstream>
#include <sstream>
void inputData(vector<Circle> &circleVector, string filename){
//create the input string stream called instream

//open file
//if there is a problem opening the file, throw an exception and exit - use a try catch statement
//otherwise
//use getline to read data line feed to the instream
//create a circle using the data in the instream
//add the circles to the vector
//keep doing this until all the data in the file is read

}

int main(){


cout<<"The number of circles, using getCount method is "<<//<<endl;
cout<<"The numher of circles, using vetor size method is "<<//<<endl;
//clear vector
cout<<"The number of circles, using getCount method is "<<//<endl;
cout<<"The number of circles remaining is ";

return 0;
}

file "dataLab4.txt" contains:

0 0 4
0 0 6
-2 -9 6
4 5 7
7 8 9

In: Computer Science

I'm trying to convert between different number representations in C++ , I have the prototype but...

I'm trying to convert between different number representations in C++ , I have the prototype but im not sure what do do from here

bool convertF(double & x, const string & bits);

bits is supposed to be an 8-bit (not 5-bit) value, each char being '0' or '1'; if not, return

false. The first bit of bits represents the sign bit, the next 3 bits represent the exponent,

and the next 4 bits represent the significand.

convertF may assume without checking that the 3 exponent bits are not all the same.

convertF's job is to set x to the floating-point number that bits represents and return

true.

For example, convertF(x, "101011000") should set x to -7/8 == -0.875

In: Computer Science

# ArrayStack # TODO: push and pop using array stack with doubling technique. import numpy as...

# ArrayStack
# TODO: 
push and pop using array stack with doubling technique.

import numpy as np
from future import print_function

# Definisi class ArrayStack
class ArrayStack(object):
        def __init__(self):
                self.data = np.zeros(20, dtype=np.int)
                self.count = 0
                
        def isEmpty(self):
                pass # ubah saya
                
        def size(self):
                pass # ubah saya
                
        def push(self, obj):
                pass # ubah saya
                
        def pop(self):
                pass # ubah saya
                
#--------------------------
# End of class

if __name__ == "__main__":
        stack = ArrayStack()
        randn = np.random.permutation(1000)
        for i in range(1000):
                stack.push(randn[i])
        ####
        for i in range(100):
                print(stack.pop())
        ####

In: Computer Science

Java Create an abstract Product Class Add the following private attributes: name sku (int) price (double)...

Java

Create an abstract Product Class

Add the following private attributes:

  • name

  • sku (int)

  • price (double)

Create getter/setter methods for all attributes

Create a constructor that takes in all attributes and sets them

Remove the default constructor
Override the toString() method and return a String that represents the building object that is formatted

nicely and contains all information (attributes)

Create a FoodProduct Class that extends Product

Add the following private attributes:

  • expDate (java.util.Date) for expiration date

  • refrigerationTemp (int) if 70 or above, none necessary, otherwise it will be a lower number

  • servingSize (int) in grams

  • caloriesPerServing (int)

  • allergens (ArrayList<String>)

    Create getter/setter methods for all attributes

    Create a constructor that takes in all attributes for product and food product. Call the super constructor and then set the expDate, refrigerationTemp, servingSize, caloriesPerServing and allergens.

  • Remove the default constructor

    Override the toString() method and return a String that represents the food product object that is formatted nicely and contains all information (super toString and the private attributes)

Create a CleaningProduct Class that extends Product

Add the following private attributes:

  • String chemicalName

  • String hazards

  • String precautions

  • String firstAid

  • ArrayList<String> uses (e.g. kitchen, bath, laundry, etc)

Create getter/setter methods for all attributes

Create a constructor that takes in all attributes for product and food product. Call the super constructor and then set the chemical name, hazard, precautions, firstAid and uses. TIP: try generating the constructor, it will add the super stuff for you. (Also, see Lynda inheritance videos.)

Remove the default constructor

Override the toString() method and return a String that represents the cleaning product object that is formatted nicely and contains all information (super toString() and the private attributes)

Create the interface Edible which contains the following method signatures:

  • public Date getExpDate();

  • public void setRefrigerationTemp(Int refrigerationTemp)

  • public int getRefrigerationTemp();

  • public void setExpDate(Date expDate) ;

  • public int getServingSize() ;

  • public void setServingSize(int servingSize) ;

  • public int getCaloriesPerServing() ;

  • public void setCaloriesPerServing(int caloriesPerServing);

  • public String getAllergens() ;

  • public void setAllergens(ArrayList<String> allergens) ;

Create the interface Chemical which contains the following method signatures

  • public String getChemicalName();

  • public void setChemicalName(String chemicalName) ;

  • public String getHazards() ;

  • public void setHazards(String hazards);

  • public String getPrecautions() ;

  • public void setPrecautions(String precautions) ;

  • public ArrayList<String> getUses() ;

  • public void setUses(ArrayList<String> uses) ;

  • public String getFirstAid() ;

  • public void setFirstAid(String firstAid) ;

Modify the FoodProduct Class to implement Edible, be sure to add the @Override before any methods that were there (get/set methods) that are also in the Edible interface.

Modify the CleaningProduct Class to implement Chemical, be sure to add the @Override before any methods that were there (get/set methods) that are also in the Chemical interface.

Create your main/test class to read products from a file, instantiate them, load them into an ArrayList and then print them nicely to the console at the end of your program. See instructor note about reading the file as the lengths of the lines may be different depending on the list of allergens. It is also comma delimited rather than by spaces. You will have to read an entire line, split its contents and then store the information into variables. The last element(s) are the allergens that you will have to store to an ArrayList.

2 note files:

Frosted Mini Wheats,233345667,4.99,10/2020,70,54,190,Wheat Ingredients Activa YoCrunch Yogurt,33445654,2.50,10/2018,35,113,90,Dairy,Peanuts

Lysol,2344454,4.99,Alkyl (50%C14 40%C12 10%C16) dimethyl benzyl ammonium saccharinate,Hazard to humans and domestic animals. Contents under pressure,Causes eye irritation,In case of eye contact immediately flush eyes thoroughly with water, kitchen, bath
Windex,4456765,3.99,Sodium citrate (Trisodium citrate),To avoid electrical shock do not spray at or near electric lines,Undiluted product is an eye irritant, if contact with eye occurs flush immediately with plenty of water for at least 15 to 20 minutes, glass, upholstery, clothing

In: Computer Science

#define _CRT_SECURE_NO_WARNINGS // Put your code below: #include <stdio.h> int main(void) { int day, hightemp[10], lowtemp[10],...

#define _CRT_SECURE_NO_WARNINGS

// Put your code below:

#include <stdio.h>


int main(void)
{
int day, hightemp[10], lowtemp[10], numbers, highesttemp, highestday, lowesttemp, lowestday, numbers2 = 0, hightotal = 0, lowtotal = 0, averageday = 0, numbers3;
double averagetemp;

printf("---=== IPC Temperature Calculator V2.0 ===---");

printf("\nPlease enter the number of days, between 3 and 10, inclusive: ");
scanf("%d", &numbers);


if (numbers < 3 || numbers > 10)

{
printf("\nInvalid entry, please enter a number between 3 and 10, inclusive: ");
scanf("%d", &numbers);
printf("\n");
}
while (numbers < 3 || numbers > 10);

for (day = 1; day <= numbers; day++)
{
printf("Day %d - High: ", day);
scanf("%d", &hightemp[day - 1]);

printf("Day %d - Low: ", day);
scanf("%d", &lowtemp[day - 1]);

if(highesttemp <= highesttemp[day - 1])
{
highesttemp = highesttemp[day - 1];
highesttemp = day;
}

if (lowesttemp >= lowesttemp[day - 1])
{
lowesttemp = lowesttemp[day - 1];
lowesttemp = day;
}
}
printf("\nDay Hi Low\n");
for (day = 1; day <= numbers; day++)
{
printf("%d %d %d\n", day, hightemp[day - 1], lowtemp[day - 1]);

}

printf("\nThe highest temperature was %d, on day %d\n", highesttemp, highestday);

printf("The lowest temperature was %d, on day %d\n", lowesttemp, lowestday);

while (numbers2 == 0)
{
printf("\nEnter a number between 1 and 5 to see average temperature for the entered number of days, enter a negative number to exit: ", numbers);
scanf("%d", &numbers3);

if (numbers3 < 0)
{
numbers2 = 1;
}
else
{

while (numbers3 <= 0 || numbers3 > numbers)
{
printf("\nInvalid entry, please enter a number between 1 and %dm inclusive: ", numbers);
scanf("%d", &numbers3);
}
hightotal = 0;
lowtotal = 0;

for (averageday = 1; averageday <= numbers3; averageday++)
{
hightotal += hightemp[averageday - 1];
lowtotal += lowtemp[averageday - 1];
}

averagetemp = (double) (hightotal + lowtotal) / (numbers3 * 2);

printf("\nThe average temperature up to day %d is: %.2lf", numbers3, averagetemp);
}
}
printf("\nGoodbye!");
return 0;
}

/////////////////////////////////////////////////////////////////////////

why is it not working?

In: Computer Science

In-line comments denote your changes and briefly describe the functionality of each method or element of...

  • In-line comments denote your changes and briefly describe the functionality of each method or element of the class
  • Appropriate variable and method naming conventions are used throughout your code
  • To start, modify the RescueAnimal.java class file by adding accessor and mutator methods for each class variable.

SYSTEM REQUIREMENTS-

Each dog goes through a six- to ninemonth training regimen before they are put into service. Part of our process is to record and track several data points about the rescue animals.

Dogs are given the status of "intake" before training starts. Once in training, they move through a set of five rigorous phases: Phase I, Phase II, Phase III, Phase IV, and Phase V. While in training, a dog is given the status of its current training phase (e.g., "Phase I"). When a dog graduates from training, it is given the status of "in service" and is eligible for use by clients. If a dog does not successfully make it through training, it is given the status of "farm," indicating that it will live a life of leisure on a Grazioso Salvare farm.

The Animals Through years of experience, we have narrowed the list of dog breeds eligible for rescue training to the following:

• American pit bull terrier • Beagle • Belgian Malinois • Border collie • Bloodhound • Coonhound • English springer spaniel • German shepherd • German shorthaired pointer • Golden retriever • Labrador retriever • Nova Scotia duck tolling retriever • Rough collie • Smooth collie

When we acquire a dog, we record the breed, gender, age, weight, date, and the location where we obtained them. There is usually a short lag time between when we acquire a dog and when they start training, which we document as well. Additionally, we track graduation dates, dates dogs are placed into "service," and details about the dogs' in-service placement (agency, city, country, and name, email address, phone number, and mailing address for the agency's point of contact).

RESCUE ANIMAL CODE

import java.text.SimpleDateFormat;

public class RescueAnimal {

// Class variables

private String name;

private String type;

private String gender;

private int age;

private float weight;

private SimpleDateFormat acquisitionDate;

private SimpleDateFormat statusDate;

private String acquisitionSource;

private Boolean reserved;

private String trainingLocation;

private SimpleDateFormat trainingStart;

private SimpleDateFormat trainingEnd;

private String trainingStatus;

private String inServiceCountry;

private String inServiceCity;

private String inServiceAgency;

private String inServicePOC;

private String inServiceEmail;

private String inServicePhone;

private String inServicePostalAddress;

// Constructor

public RescueAnimal() {

}

// Add Accessor Methods here

// Add Mutator Methods here

}

In: Computer Science

Write a function sublist that takes two lists as arguments, and returns true if the first...

Write a function sublist that takes two lists as arguments, and returns true if the first list appears as a contiguous sublist somewhere within the second list, and false otherwise.

> (sublist ’(c d e) ’(a b c d e f g))

#t

> (sublist ’(a c e) ’(a b c d e f g))

#f

Write a function lgrep that returns the “lines” within a list that contain a given sublist. Use the sublist function implemented in previous exercise to build lgrep.

> (lgrep ’(c d e) ’((a b c d e f g)

(c d c d e)

(a b c d)

(h i c d e k)

(x y z)))

((a b c d e f g) (c d c d e) (h i c d e k))

You may assume that all elements of (all lines of) all argument lists are atoms.

using the programming language scheme

i need the question to be answered using the programming language Scheme

In: Computer Science

Project Part 2: Gap Analysis Plan and Risk Assessment Methodology   Scenario After the productive team meeting,...

Project Part 2: Gap Analysis Plan and Risk Assessment Methodology  

Scenario

After the productive team meeting, Fullsoft’s chief technology officer (CTO) wants further analysis performed and a high-level plan created to mitigate future risks, threats, and vulnerabilities. As part of this request, you and your team members will create a plan for performing a gap analysis, and then research and select an appropriate risk assessment methodology to be used for future reviews of the Fullsoft IT environment.

An IT gap analysis may be a formal investigation or an informal survey of an organization's overall IT security. The first step of a gap analysis is to compose clear objectives and goals concerning an organization's IT security. For each objective or goal, the person performing the analysis must gather information about the environment, determine the present status, and identify what must be changed to achieve goals. The analysis most often reveals gaps in security between "where you are" and "where you want to be."

Tasks:

  1. Create a high-level plan to perform a gap analysis.
  2. Review the following two risk assessment methodologies:
    1. NIST SP 800-30 rev. 1, Guide for Conducting Risk Assessments (formerly titled " Risk Management Guide for Information Technology Systems")
    2. Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE), Allegro version
  3. Create a report that includes the gap analysis plan, a brief description of each risk assessment methodology, a recommendation for which methodology Fullsoft should follow, and justification for your choice

In: Computer Science

Linux Fundamentals part 3 Below are questions related to the command line use of Linux. You...

Linux Fundamentals part 3

Below are questions related to the command line use of Linux.  You can use the videos, man pages, and notes to answer these questions. 

Remember that Linux is CASE SENSITIVE.  Rm and rm are NOT the same command.  I will count off totally for a question if you do not take this into account.

For each command give me the ENTIRE COMMAND SEQUENCE.  If I ask you  'What command would I use to move the file one.txt to the parent directory and rename it to two.txt?", the answer is NOT 'mv'. That is only part of the command. I want the entire command sequence.

10. Find all files under the current directory with an accessed time was more than 2 days ago.


11. I have a file called 'BackupLogs.tar.bz2' in my home directory (because you made it from Questions 4 and 8, right? Right!). I want to uncompress and unarchive the files in it. What single command would I use?


12. I have a file called BackupLogs.tar.bz2 and I want to uncompress and ONLY uncompress the file (NOT uncompress and unarchive). What command would I use?


13. I want to search for all files in the directory ~/Documents which contain the keyword "add", case sensitive, and as the whole word only. Words like addendum, addition, etc, should not be found in the results; just 'add'. Additionally, I only want to see the name(s) of the file(s) that have matches as a result of running the command. This means your result should show not the keyword hit AND surrounding text, but rather suppress that output and instead display just the file name. What command would I use? This may sound complicated, but break down each step and use the man page.


14. I have a large file named walloftext.txt and I want to view only the first 5 lines of the file. What command would I use?


15. Same as file as Question 14, but I want to view only the last 7 lines.

In: Computer Science

Add a CountGroups method to the linked list class below (OurList). It returns the number of...

Add a CountGroups method to the linked list class below (OurList). It returns the number of groups of a value from the list. The value is passed into the method. A group is one or more values.

Examples using strings:
A list contains the following strings: one, one, dog, dog, one, one, one, dog, dog, dog, dog, one, one, dog, one
   CountGroup(“one”) prints 4 groups of one's
   CountGroup(“dog”) prints 3 groups of dog's

Do not turn in the code below. Turn in only your method.

using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;

namespace LinkListExample
{
    public class OurList<T>
    {
        private class Node
        {
            public T Data { get; set; }
            public Node Next { get; set; }
            public Node(T paramData = default(T), Node paramNext = null)
            {
                this.Data = paramData;
                this.Next = paramNext;
            }
        }

        private Node first;

        public OurList()
        {
            first = null;
        }

        public void Clear()     // shown in class notes
        {
            first = null;
        }

        public void AddFirst(T data)     // shown in class notes
        {
            this.first = new Node(data, this.first);
        }

        public void RemoveFirst()     // shown in class notes
        {
            if (first != null)
                first = first.Next;
        }

        public void AddLast(T data)     // shown in class notes
        {
            if (first == null)
                AddFirst(data);
            else
            {
                Node pTmp = first;
                while (pTmp.Next != null)
                    pTmp = pTmp.Next;

                pTmp.Next = new Node(data, null);
            }
        }

        public void RemoveLast()     // shown in class notes
        {
            if (first == null)
                return;
            else if (first.Next == null)
                RemoveFirst();
            else
            {
                Node pTmp = first;
                while (pTmp.Next != null && pTmp.Next.Next != null)
                    pTmp = pTmp.Next;

                pTmp.Next = null;
            }
        }

        public void Display()     // shown in class notes
        {
            Node pTmp = first;
            while (pTmp != null)
            {
                Console.Write("{0}, ", pTmp.Data);
                pTmp = pTmp.Next;
            }
            Console.WriteLine();
        }

        public bool IsEmpty()     // shown in class notes
        {
            if (first == null)
                return true;
            else
                return false;
        }
     }
}

In: Computer Science