Download the text file names.txt attached below. It contains a list of 65 female first name pper case letters. In Eclipse, insert this file into your Java project folder. mplement two static methods: • stringSort: It will sort the String array provided as an argument using one of the sor algorithms presented in class (selection or insertion). • stringSearch: It will search the String array provided as its first argument for the Stri value provided as its second argument using the binary search algorithm presented class.
Q: Simplify the following Boolean functions. F(w, x. y, 2) - !w!xly!z + !w!xy!z + !wx!y!z + !wxy!z + wx...
A: Here is the answer:-
Q: Explain why it is important that software products are developed and delivered quickly ?
A: The answer is given below
Q: 1. Write an algorithm and flowchart to add the following sequences: a. 1,3,5,7,9. . . N (series of ...
A: Algorithm and flowchart of the above questions are as follows:
Q: C language Make a text adventure game that asks 4 questions, every question is related. A response ...
A: A text adventure game can be created by simply using standard input and output, where the program as...
Q: For video services, what interrupt number is used?
A: The driver must supply an interrupt number when registering an interrupt. That is the interrupt numb...
Q: Consider the adjacency matrix below. Upload a picture (it can be hand drawn) of the adjacency list o...
A: Given adjacency matrix for a graph with 5 vertices A,B,C,D and E is an undirected graph since the ma...
Q: Write a C program containing a recursive function that will get the whole number quotient result of ...
A: The code is given below
Q: Assign a name to the graphics processing unit.
A: Introduction: A graphics processing unit -GPU is a computer processor specifically designed to handl...
Q: Build a high-level ETL pipeline with source as an API service covering all the below-listed conditio...
A: Build a high-level ETL pipeline with source as an API service covering all the below-listed conditio...
Q: 14. Write a JAVASCRIPT program to create a new string formed after removing all the letters present ...
A: Write a JAVASCRIPT program to create a new string formed after removing all the letters present in t...
Q: What is the IEEE-754 single precision real number after encodingt the real decimal number -76.0625? ...
A: Here in this question we have given a decimal numbers and we have asked to convert it into IEEE 754 ...
Q: Which field in the FPU control word allows you to modify the rounding mode of the processor?
A: INTRODUCTION: The FPU control word governs the accuracy of the FPU and the rounding mechanism used. ...
Q: MATLAB write a function that takes in n array of x, y cordinates on a plane and calculates the eu...
A: The code is given below
Q: What technological innovations in the fields of software engineering and computing have occurred bey...
A: Introduction: Software engineering refers to creating computer programs by using engineering princip...
Q: Where did Charles Babbage come up with
A: given - Where did Charles Babbage come up with the computer?
Q: Is there a way to conceal the cursor?
A: Here is the explanation:
Q: Consider the adjacency matrix below. Upload a picture (it can be hand drawn) of the adjacency list o...
A:
Q: Question 5 What is the adress of ptrs[1] O No answer text provided. O No answer text provided. O No ...
A: Lets see the solution in the next steps
Q: What technological innovations in the fields of software engineering and computing have occurred bey...
A: Introduction: Software engineering refers to creating computer programs by using engineering princip...
Q: Describe various employment legal documents including: non-disclosure agreements, non-compete clause...
A: Introduction: Describe various employment legal documents including: non-disclosure agreements, non-...
Q: show your work text not a picture -35 (base 10) = ____________________________ (8-bit Excess-M bi...
A: Converting -35 to base 10. -*102=0 3*101=30 5*100=5 Adding all to get Ans=3510
Q: PROGRAM IN C++ Odette's typhoon-related casualties. Create an array-based program that accepts t...
A: THE groups of three additional sailors who disappeared after the attack of Typhoon Odette were recup...
Q: Simplify the following Boolean expressions to a minimumnumber of literals: a. xyz + x ′ y + xyz ′ ...
A: Simplified the given Boolean expressions to a minimum number of literals
Q: Explain why it is important that sof products are developed and deliver quickly ?
A: Explain why it is important that software products are developed and delivered quickly ?
Q: What are some of the benefits of paging?
A: Virtual memory can be configured using non-contiguous memory allocation method known as Paging. In p...
Q: This requirement has a clarity problem; rewrite it to be better. "The communication app will verify...
A: Below i have written the statement clearly.
Q: You are called to consult with an organization that has well over 100 servers including virtual serv...
A: Windows Server 2016 features: Nano Server Containers Resilient File System Nested virtualization Hy...
Q: When applied to an array of long integers, what is the result produced by the SIZE operator?
A: SIZE operator returns the size of a variable. The size of long integer is 4 or 8 bytes depending on ...
Q: Consider the figure below, which draws the analogy between store-and-forward link transmission and ...
A: 1) When a car enter service at the tollbooth, it takes 1 second service time. 2) It takes 10 second ...
Q: Help me with the coding. 1.find the sum of elements for the array named number which contains data {...
A: According to the Question below the Solution: Output:
Q: Portfolio management addresses tactical goals
A: Answer: False
Q: Buffers are used to minimise access latency between various levels of the memory hierarchy. List the...
A: Introduction: A portion of memory within a programme dedicated to holding the data being processed. ...
Q: Consider the adjacency matrix below. Upload a picture (it can be hand drawn) of the adjacency list o...
A: Adjancency matrix:The adjacency matrix are also called as connection matrix.It is in the form of row...
Q: Write a function that receives a string consisting of several lines of text (paragraph) and returns ...
A: Write a function that receives a string consisting of several lines of text (paragraph) andreturns a...
Q: Assume the boot record on your disc volume was corrupted. Which file system(s) would allow a backup ...
A: A master boot record (MBR) is a special type of boot sector at the very beginning of partitioned com...
Q: What technological innovations in the fields of software engineering and computing have occurred bey...
A: Introduction: Software engineering refers to creating computer programs by using engineering princip...
Q: Why would a problem cause the current command to be retried?
A: Page fault is a phrase that refers to the pages that are kept in memory. When a user requests access...
Q: When invoking external assembly language processes from C++, why is it vital to use name decoration?
A: Introduction: Every programming language has its naming convention, which may or may not be compatib...
Q: Buffers are used to minimise access latency between various levels of the memory hierarchy. List the...
A: Introduction: A designated memory section within a program for storing the data being processed. Eve...
Q: In the following example, what lookup_ value should be used to return the value of 24.53 contained i...
A: what lookup_value should be used to return the value of 24.3 contained in cell G9
Q: Explains the number of methods from which we can take the string input from the user.
A: There are some methods that are used to take the string input from user. Let's discuss it. Method1. ...
Q: When did the mechanical computer first come out?
A: The answer is as follows.
Q: Transparent bridging refers to The learning process that hubs use The learning process that routers ...
A: A Mac address is unique address assigned to NIC during communication process.
Q: Question 8 Find value x such that the address of buf[x] equals to the address of p. Both buf and p a...
A: Q8)
Q: y(0] A + rand () % B; A = -23 , B 95 A -24, B = 95 %3D c.A = -22 ,B 94 d.A = -23 , B 96 %3D %3D
A: Here ,The question is to find the values of A and B.:---- Given :- Array[0] = A + rand() % B
Q: What is the average seek time of a driver?
A: what is the average seek time of a driver
Q: You have a graph G = , |V| = n and |E| = m (represented using adjacency matrix you can). Given such ...
A: Java code for the brute- force algorithm for the given graph import java.util.*; public class Graph...
Q: Is it likely that wholeworldband will use SQL, NOSQL, or a combination of the two? Your response sho...
A: The database technology is used by the whole globe and derived from SQL NoSQL. SQL is a query langua...
Q: Which MS-Windows file system(s) supports disc mirroring, the process by which the same data is writt...
A: Introduction: Disk mirroring is a simple approach used mainly to protect the computer system from th...
Q: Who came up with the motherboard?
A: Who came up with the motherboard?
Trending now
This is a popular solution!
Step by step
Solved in 3 steps with 3 images
- 2. Write a class ArrayClass, where the main method asks the user to enter the four num bers. Create a method printArray that prints the array whenever required (use Acrav.toString method). Make the program run as shown in the Sample Run below. Green is user input. Use Attax.sort, Attach.bianrySearch. Attaveauals Sample Run List1, Enter four num bers: 2 33 2 List2, Enter four num bers: 6 25 4 List3, Enter four num bers: 52 46 Your original Listi: [2, 3, 3, 2] Your original List2: [6, 2, 5, 4] Your original List3: [5, 2, 4, 6] Sorted Listi is: [2, 2, 3, 3] Enter a number from the sorted List1 to search for: 3 Value 3 is in index 2 (or position 3) List that are the same when sorted: [2, 4, 5, 6]Create a class called StudentBirthYear. It should only have two members, both of them arrays. One of type string called Names. The second of type int called BirthYears. Now in your main class create a StudentBirthYear object. Make sure both arrays are of the size 13. Add thirteen different names and thirteen different birth years. Then display each name with its birth year using only 1 for loop. Only use a for loop, no other kind of loop.3. Create an ArrayList of strings to store the names of celebrities or athletes. Add five names to the list. Process the list with a for loop and the get() method to display the names, one name per line. Pass the list to avoid method. Inside the method, Insert another name at index 2 and remove the name at index 4. Use a foreach loop to display the arraylist again, all names on one line separated by asterisks. After the method call in main, create an iterator for the arraylist and use it to display the list one more time. See Sample Output. SAMPLE OUTPUT Here is the list Lionel Messi Drake Adele Dwayne Johnson Beyonce Here is the new list * Lionel Messi * Drake * Taylor Swift * Adele * Beyonce Using an iterator, here is the list Lionel Messi Drake Taylor Swift Adele Beyonce
- In this programming challenge, you will create a simple trivia game for two players. The program will work like this: • Read the contents of the trivia.txt file into an ArrayList . • Starting with player 1, each player gets a turn at answering one trivia question. (For instance, if there are 10 questions, 5 for each player.) When a question is displayed, four possible answers are also displayed. Only one of the answers is correct, and if the player selects the correct answer, he or she earns a point. • After answers have been selected for all of the questions, the program displays the number of points earned by each player and declares the player with the highest number of points the winner, same as the sample execution. You are to design a Question class to hold the data for a trivia question. The Question class should have String fields for the following data: • A trivia question • Possible answer 1 • Possible answer 2 • Possible answer 3 • Possible answer 4 • The number of the…A personal phone directory contains room for first names and phone numbers for 30 people. Assign names and phone numbers for the first 10 people. Prompt the user for a name, and if the name is found in the list, display the corresponding phone number. If the name is not found in the list, prompt the user for a phone number, and add the new name and phone number to the list. Continue to prompt the user for names until the user enters quit. After the arrays are full (containing 30 names), do not allow the user to add new entries. Using Scanner.input to prompt user, Use the following names and phone numbers: Gina (847) 341-0912 Marcia (847) 341-2392 Rita (847) 354-0654 Jennifer (414) 234-0912 Fred (414) 435-6567 Neil (608) 123-0904 Judy (608) 435-0434 Arlene (608) 123-0312 LaWanda (920) 787-9813 Deepak (930) 412-0991A personal phone directory contains room for first names and phone numbers for 30 people. Assign names and phone numbers for the first 10 people. Prompt the user for a name, and if the name is found in the list, display the corresponding phone number. If the name is not found in the list, prompt the user for a phone number, and add the new name and phone number to the list. Continue to prompt the user for names until the user enters quit. After the arrays are full (containing 30 names), do not allow the user to add new entries.
- A personal phone directory contains room for first names and phone numbers for 30 people. Assign names and phone numbers for the first 10 people. Prompt the user for a name, and if the name is found in the list, display the corresponding phone number. If the name is not found in the list, prompt the user for a phone number, and add the new name and phone number to the list. Continue to prompt the user for names until the user enters quit. After the arrays are full (containing 30 names), do not allow the user to add new entries. Use the following names and phone numbers:A personal phone directory contains room for first names and phone numbers for 30 people. Assign names and phone numbers for the first 10 people. Prompt the user for a name, and if the name is found in the list, display the corresponding phone number. If the name is not found in the list, prompt the user for a phone number, and add the new name and phone number to the list. Continue to prompt the user for names until the user enters quit. After the arrays are full (containing 30 names), do not allow the user to add new entries. Use the following names and phone numbers: Name Phone # Gina (847) 341-0912 Marcia (847) 341-2392 Rita (847) 354-0654 Jennifer (414) 234-0912 Fred (414) 435-6567 Neil (608) 123-0904 Judy (608) 435-0434 Arlene (608) 123-0312 LaWanda (920) 787-9813 Deepak (930) 412-0991A personal phone directory contains room for first names and phone numbers for 30 people. Assign names and phone numbers for the first 10 people. Prompt the user for a name, and if the name is found in the list, display the corresponding phone number. If the name is not found in the list, prompt the user for a phone number, and add the new name and phone number to the list. Continue to prompt the user for names until the user enters quit. After the arrays are full (containing 30 names), do not allow the user to add new entries. Use the following names and phone numbers: Name Phone # Gina (847) 341-0912 Marcia (847) 341-2392 Rita (847) 354-0654 Jennifer (414) 234-0912 Fred (414) 435-6567 Neil (608) 123-0904 Judy (608) 435-0434 Arlene (608) 123-0312 LaWanda (920) 787-9813 Deepak (930) 412-0991 This is code that was given to us; import java.util.*; class PhoneNumbers { public static void main(String[] args) { // Write your code here } }
- A personal phone directory contains room for first names and phone numbers for 30 people. Assign names and phone numbers for the first 10 people. Prompt the user for a name, and if the name is found in the list, display the corresponding phone number. If the name is not found in the list, prompt the user for a phone number, and add the new name and phone number to the list. Continue to prompt the user for names until the user enters quit. After the arrays are full (containing 30 names), do not allow the user to add new entries. Use the following names and phone numbers: Name Phone # Gina (847) 341-0912 Marcia (847) 341-2392 Rita (847) 354-0654 Jennifer (414) 234-0912 Fred (414) 435-6567 Neil (608) 123-0904 Judy (608) 435-0434 Arlene (608) 123-0312 LaWanda (920) 787-9813 Deepak (930) 412-0991 import java.util.*; class PhoneNumbers { public static void main(String[] args) { // Write your code here } }Java Create an ArrayList of strings to store the names of celebrities or athletes. Add five names to the list. Process the list with a for loop and the get() method to display the names, one name per line. Pass the list to a void method. Inside the method, Insert another name at index 2 and remove the name at index 4. Use a foreach loop to display the arraylist again, all names on one line separated by asterisks. After the method call in main, create an iterator for the arraylist and use it to display the list one more time. See Sample Output. SAMPLE OUTPUT Here is the list Lionel Messi Drake Adele Dwayne Johnson Beyonce Here is the new list * Lionel Messi * Drake * Taylor Swift * Adele * Beyonce Using an iterator, here is the list Lionel Messi Drake Taylor Swift Adele BeyonceRename the show method to people Override the show method in student and in the other class you created (this will be the polymorphic method) In main program, create an array of 3 objects of class people Instantiate each array position with a different object (people, student, other) With a loop, display all the objects in the array.