Introduction to Java Programming and Data Structures, Comprehensive Version (11th Edition)
11th Edition
ISBN: 9780134670942
Author: Y. Daniel Liang
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 12, Problem 12.11PE
Program Plan Intro
Program plan:
- Import the required packages into the program.
- Create a class Exercise12_11 to remove the text from file.
- In the main() method,
- Check command line parameter. If yes, display the error message.
- Check whether the file exists or not. If yes, display the error message.
- Read text from the file and save it in a string builder.
- Declare the line separator.
- The while loop executes until the input from file. If yes,
- Declare and initialize the input from file.
- Check the firstLine is true. If yes,
- Append the space into the StringBuilder.
- Set the firstLine as false.
- Otherwise, append the space with space.
- Close the input file
- Write back into the file and then close the output file.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
JAVA
(Baby name popularity ranking) The popularity ranking of baby names from the years 1960s to 2010 are stored in files
named babynameranking_1960s.txt, babynameranking 1970s.txt,., babynameranking 2010s.txt (See the
attached zip file). Each file contains two hundred lines. Each line contains a ranking, a boy's name, a number for the
boy's name, a girl's name, and a number for the girl's name. For example, the first two lines in the
file babynameranking_2010s.txt are as follows:
1
Noah 182,896 Emma 194,667
2 Liam 173,636 Olivia 184, 192
So, the boy's name Noah and the girl's name Emma are ranked #1 and the boy's name Liam and the girl's name Olivia
are ranked #2. 182,896 boys are named Noah and 194,667 girls are named Emma in the 2010s. Write a program that
prompts the user to enter the year, gender, and followed by a name, and displays the ranking of the name for the year.
Example Run of it.
Enter the year: 2010
Enter the gender: M
Enter the name: John
Boy name John is ranked #26 in…
Lab 8.1 - Using Value and Reference Parameters
In Visual Studio Code under labactivity8_1 folder, create a new file main.cpp. Open the C++ source file main.cpp in the text editor and copy the source code below.
/** * @file WRITE FILE NAME * @author WRITE STUDENT NAME(S) * @brief Using value and reference parameters. This program * uses a function to swap the values in two variables. * @date WRITE DATE TODAY * */ #include <iostream> using namespace std; // Function prototype void swapNums(int number1, int number2); int main() { int num1 = 5, num2 = 7; // Print the two variable values cout << "In main the two numbers are " << num1 << " and " << num2 << endl; // Call a function to swap the values stored // in the two variables swapNums(num1, num2); // Print the same two variable values again cout << "Back in main again the two numbers are " << num1 << " and " << num2 << endl; return 0; } /** * @brief WRITE DESCRIPTION OF…
3) Implement the if __name__ == "__main__" : block at the bottom of this file to do the following:
3a) The if main block at the bottom should get the name of the highway graph file from the command line arguments. See the video in Python that explains how to get command line arguments.
3b) Call your parse_highway_graph_file function to parse that file, and to construct a WeightedGraph object from it.
3c) Write some code that outputs (with print statements) the degree of each vertex. You can have one vertex per line, indicating its id (just its 0-based index) followed by its degree. IMPORTANT: Your parse_highway_graph_file function should NOT produce any output. You will have code in your if main block that will have the print statements. The WeightedGraph class has a degree method, inherited from Graph that will return to you the degree of a vertex.
Chapter 12 Solutions
Introduction to Java Programming and Data Structures, Comprehensive Version (11th Edition)
Ch. 12.2 - Prob. 12.2.1CPCh. 12.2 - Prob. 12.2.2CPCh. 12.2 - Prob. 12.2.3CPCh. 12.2 - Prob. 12.2.4CPCh. 12.2 - Prob. 12.2.5CPCh. 12.2 - Show the output of the following code:Ch. 12.3 - Prob. 12.3.1CPCh. 12.3 - Prob. 12.3.2CPCh. 12.4 - Prob. 12.4.1CPCh. 12.4 - Prob. 12.4.2CP
Ch. 12.4 - Prob. 12.4.3CPCh. 12.4 - Prob. 12.4.4CPCh. 12.4 - Prob. 12.4.5CPCh. 12.4 - Prob. 12.4.6CPCh. 12.4 - What is displayed when running the following...Ch. 12.4 - Prob. 12.4.8CPCh. 12.4 - What does the method getMessage() do?Ch. 12.4 - What does the method printStackTrace() do?Ch. 12.4 - Prob. 12.4.11CPCh. 12.4 - Prob. 12.4.12CPCh. 12.5 - Prob. 12.5.1CPCh. 12.6 - Prob. 12.6.1CPCh. 12.7 - Prob. 12.7.1CPCh. 12.8 - Prob. 12.8.1CPCh. 12.9 - Prob. 12.9.1CPCh. 12.9 - Prob. 12.9.2CPCh. 12.10 - What is wrong about creating a File object using...Ch. 12.10 - How do you check whether a file already exists?...Ch. 12.10 - Can you use the File class for I/O? Does creating...Ch. 12.11 - Prob. 12.11.1CPCh. 12.11 - Prob. 12.11.2CPCh. 12.11 - Prob. 12.11.3CPCh. 12.11 - Prob. 12.11.4CPCh. 12.11 - What will happen if you attempt to create a...Ch. 12.11 - Prob. 12.11.6CPCh. 12.11 - Suppose you enter 45 57, 8 789, then press the...Ch. 12.11 - Prob. 12.11.8CPCh. 12.12 - How do you create a Scanner object for reading...Ch. 12.13 - Prob. 12.13.1CPCh. 12.13 - Simplify the code in lines 20-28 as follows: 1....Ch. 12 - Prob. 12.1PECh. 12 - (InputMismatchException) Write a program that...Ch. 12 - (ArrayIndexOutOfBoundsException) Write a program...Ch. 12 - (IllegalArgumentException) Modify the Loan class...Ch. 12 - (IllegalTriangleException) Programming Exercise...Ch. 12 - (NumberFormatException) Listing 6.8 implements the...Ch. 12 - Prob. 12.7PECh. 12 - Prob. 12.8PECh. 12 - Prob. 12.9PECh. 12 - Prob. 12.10PECh. 12 - Prob. 12.11PECh. 12 - (Reformat Java source code) Write a program that...Ch. 12 - (Count characters, words, and lines in a file)...Ch. 12 - (Process scores in a text file) Suppose a text...Ch. 12 - (Write/read data) Write a program to create a file...Ch. 12 - Prob. 12.16PECh. 12 - (Game: hangman) Rewrite Programming Exercise 7.35....Ch. 12 - Prob. 12.18PECh. 12 - (Count words) Write a program that counts the...Ch. 12 - Prob. 12.20PECh. 12 - (Data sorted?) Write a program that reads the...Ch. 12 - Prob. 12.22PECh. 12 - (Process scores in a text file on the Web) Suppose...Ch. 12 - (Create large dataset) Create a data file with...Ch. 12 - (Create a directory) Write a program that prompts...Ch. 12 - Prob. 12.26PECh. 12 - (Replace words) Suppose you have a lot of files in...Ch. 12 - (Rename files) Suppose you have a lot of files in...Ch. 12 - (Rename files) Suppose you have several files in a...Ch. 12 - (Occurrences of each letter) Write a program that...Ch. 12 - (Baby name popularity ranking) The popularity...Ch. 12 - (Ranking summary) Write a program that uses the...
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- 12.10 LAB: Working with Files This exercise is designed to give you experience looping over files and making decisions based on their contents. The program asks the user for three pieces of information. • A text file to open • A letter to search for • A position to look in The program counts how many words have the given character in the correct position. For example, the previous sentence contains 5 words with 'o' in position 1. Your program must check for errors. If an error is encountered, call sys.exit(0) after printing a message. If the file cannot be opened, then print an error. (Hint: Use a try/except with OSError) Welcome to Book Analyzer v0.1 Enter File Name to Read: fake_name.txt Error: Could Not Open File. Print an error if something other then a single letter is given to search for. Enter File Name to Read: modest.txt Letter to search for: A Bad Input Error: A single letter is required. Print an error if the third input is not a number. Welcome to Book Analyzer v0.1 Enter…arrow_forward8.7 LAB: File name change A photographer is organizing a photo collection about the national parks in the US and would like to annotate the information about each of the photos into a separate set of files. Write a program that reads the name of a text file containing a list of photo file names. The program then reads the photo file names from the text file, replaces the "_photo.jpg" portion of the file names with "_info.txt", and outputs the modified file names. Assume the unchanged portion of the photo file names contains only letters and numbers, and the text file stores one photo file name per line. If the text file is empty, the program produces no output. Ex: If the input of the program is: ParkPhotos.txt and the contents of ParkPhotos.txt are: Acadia2003_photo.jpg AmericanSamoa1989_photo.jpg BlackCanyonoftheGunnison1983_photo.jpg CarlsbadCaverns2010_photo.jpg CraterLake1996_photo.jpg GrandCanyon1996_photo.jpg IndianaDunes1987_photo.jpg LakeClark2009_photo.jpg…arrow_forward2. Reading Files (40%) Create a class with a method that, given a string representing a file name, returns an integer with the number of characters in the file. For example, if the file has 10 characters, your method must return the number 10.arrow_forward
- JAVA (Baby name popularity ranking) The popularity ranking of baby names from the years 1960s to 2010 are stored in files named babynameranking_1960s.txt, babynameranking_1970s.txt,…, babynameranking_2010s.txt (See the attached zip file). Each file contains two hundred lines. Each line contains a ranking, a boy’s name, a number for the boy’s name, a girl’s name, and a number for the girl’s name. For example, the first two lines in the file babynameranking_2010s.txt are as follows: 1 Noah 182,896 Emma 194,667 2 Liam 173,636 Olivia 184,192 · So, the boy’s name Noah and the girl’s name Emma are ranked #1 and the boy’s name Liam and the girl’s name Olivia are ranked #2. 182,896 boys are named Noah and 194,667 girls are named Emma in the 2010s. Write a program that prompts the user to enter the year, gender, and followed by a name, and displays the ranking of the name for the year.Example Run of it. Enter the year: 2010 Enter the gender: M Enter the…arrow_forwardIntroduction to Computer Systems Project 1 Due: February 09, 2023 by 5:00 PM Spring 2023 Introduction: xxd command in Linux creates a hex dump of a given file or standard input. It's simple. For example, suppose you have a text file 'test.txt' with contents as shown below: The isprint() function checks whether a character is a printable character or not. Check more information in: https://www.programiz.com/c-programming/library-function/ctype.h/isprint Here's how you can use xxd to convert the file contents into hex: $ xxd test.txt And here's the output: 00000000: 5468 6520 6973 7072 696e 7428 2920 6675 00000010: 6e63 7469 6f6e 2063 6865 636b 7320 7768 00000020: 6574 6865 7220 6120 6368 6172 6163 7465 00000030: 7220 6973 2061 2070 7269 6e74 6162 6c65 00000040: 2063 6861 7261 6374 6572 206f 7220 6e6f 00000050: 742e 0a43 6865 636b 206d 6f72 6520 696e 00000060: 666f 726d 6174 696f 6e20 696e 3a20 6874 00000070: 7470 733a 2f2f 7777 772e 7072 6f67 7261 00000080: 6d69 7a2e 636f 6d2f 632d 7072…arrow_forward<<Write in Java>> - Challenge 7 File encryption is the science of writing the contents of a file in a secret code. Your encryption program should work like a filter, reading the contents of one file, modifying the data into a code, and then writing the coded contents out to a second file. The second file will be a version of the first file, but written in a secret code. Although there are complex encryption techniques, you should come up with a simple one of your own. For example, you could read the first file one character at a time, and add 10 to the character code of each character before it is written to the second file. - Challenge 8 Write a program that decrypts the file produced by the program in Programming Challenge 7. The decryption program should read the contents of the coded file, restore the data to its original state, and write it to another filearrow_forward
- Please provide me java code for below problem: Assignment Guidelines: Text messaging is a popular means of communication. Many abbreviations are in common use but are not appropriate for formal communication. Suppose the abbreviations are stored, one to a line, in a text file named abbreviations.txt. For example, the file might contains these lines: lol :) free iirc 4 u ttfn Write a class AbreviationMarker that will read a message from another text file and surround each occurrence of an abbreviation(ignoring case) with <> brackets. Write the marked message to a new text file. For example, if the message to be scanned is: Ttfn, how are u today? Iirc, this is your first free day. Hope you are having fun! :) the new text file should contain: <Ttfn>, how are <u> today? <Iirc>, this is your first <free> day. Hope you are having fun! <:)> ----jGRASP exec: java AbreviationMarkerDemoWhat is the file to read from?in.txtWhat is the file to write to…arrow_forwardCan you please help solve this, please as fast as possible 6.20: Word Count (see attached screen print AND input file) Write a program that prompts the user to input the name of a text file and then outputs the number of words in the file. You can consider a "word" to be any text that is surrounded by whitespace (for example, a space, carriage return, newline) or borders the beginning or end of the file.Input Notes:There are two input sources in this program: the text file and standard input. The standard input consists of a single word, the name of the text file to be read. DO NOT USE A STRING VARIABLE.Output Notes (Prompts and Labels): The filename provided in standard input is prompted for with "Enter a file name: " and displayed so that the filename entered is on the same line as the prompt.The output of the program is a single line of the form: "The file contains N words." where N is the number of words determined by the program.arrow_forward*Code in Python Write a program that inputs a text file. The program should print the unique words in the file in alphabetical order. Uppercase words should take precedence over lowercase words. For example, 'Z' comes before 'a'. The input file can contain one or more sentences, or be a multiline list of words. An example input file is shown below: example.txt the quick brown fox jumps over the lazy dog An example of the program's output is shown below: Enter the input file name: example.txt brown dog fox jumps lazy over quick thearrow_forward
- 9.12 LAB: File name change PYTHON A photographer is organizing a photo collection about the national parks in the US and would like to annotate the information about each of the photos into a separate set of files. Write a program that reads the name of a text file containing a list of photo file names. The program then reads the photo file names from the text file, replaces the "_photo.jpg" portion of the file names with "_info.txt", and outputs the modified file names. Assume the unchanged portion of the photo file names contains only letters and numbers, and the text file stores one photo file name per line. If the text file is empty, the program produces no output. Ex: If the input of the program is: ParkPhotos.txt and the contents of ParkPhotos.txt are: Acadia2003_photo.jpg AmericanSamoa1989_photo.jpg BlackCanyonoftheGunnison1983_photo.jpg CarlsbadCaverns2010_photo.jpg CraterLake1996_photo.jpg GrandCanyon1996_photo.jpg IndianaDunes1987_photo.jpg LakeClark2009_photo.jpg…arrow_forwardFile Stream Problem: Implement a Caesar cipher that can encrypt and decrypt text and file. A Caesar cipher is a substitution cipher that shifts the letters in the original message x spaces ascending the alphabet where x is the key. Example if the key for the cipher is 3, and the message is “I will be there.” Then the coded message would be “L zloo eh wkhuh” Program requirements: Create a class call CCipher that has two member functions encrypt and decrypt. The program should be able to encrypt/decrypt a message from a file as well as a keyboard input. The default key should be 3. The user should be able to select between encrypting and decrypting and should be allowed to do so multiple times until s/he decides to end the program. The file format to be encrypted should be a “.txt” and the user should be able to provide the name of the file to be encrypted, after which the file should be deleted. The user should have the option to view…arrow_forward1) Write a Java program to read a CSV (Comma separated values) text file. The text file will contain comma separated values in each line. There will be multiple lines with each line containing the same number of values. Ask the user to enter the path for the CSV file for reading the file. After reading the data from the file output the data to the console (one line at a time) with the data in each line in properly aligned columns. Then write the data to a serialized file called "credit.ser" to the local project folder . 2) In the second program, read the serialized file and output the data in columns to the console (one line at a time) with the data in each line in properly aligned columns.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education