Complete java program named textfileshoppinglist

Assignment Help Basic Computer Science
Reference no: EM131168378

1. Build a complete Java program named TextFileShoppingLIst. From its main method, call a method named writeShoppingList. This method takes an ArrayList of five strings provided by the user at the command line. Use a loop for repeated prompting and receiving of the five strings. Each string is written as a line in a text file named names.txt . Make sure to handle the exception that might be thrown and print the error message to the command line.

2. Build a complete Java program named NamesEvaluation. From its main method, call a method named obtainNames. This method should declare an array of three first names as strings. In the method, prompt the user for each name as a string. Each string should be a first name of at least five characters (e.g. "Charles") and the first character must be received as an uppercase letter. Keep in mind a first name may be more than one word (e.g. "Mary Lou"). If a data validation isn't passed, throw an error of the Exception class. Handle the exception in a method named handleError. This method should accept a string containing a suitable message about the type of error that occurred (e.g. "The name wasn't at least five characters."). The handleError method simply prints the string it received as an argument. Keep prompting the user, if necessary, until all data validations are passed.

3. Continuing from the previous exercise, now that data validations have been enforced, pass the array of five first names to a method named searchNames. This method does not return a value. It should prompt the user for which first name they wish to display in the array as an integer (e.g. "Enter the position number of the name you wish to see: "). Use a try...catch block to prompt the user and obtain the integer. Display the matching name at that array index position as a string. Handle three potential errors via the catch block. The first should take care of a non-integer index entry. The second should take care of an index entry that is out of bounds for the array size. The third should be of an Exception type. Each raised exception should include a suitable custom message for that exception type along with the result of its .getMessage() string.

Reference no: EM131168378

Questions Cloud

Determine the average number of comparisons : Determine the average number of comparisons used over all m permutations.
Difference between applications and application protocols : What is the difference between applications and application protocols? And, what do you think are the top 5 application protocols that account for most of the network traffic for the average business?
Find three print examples of the kind of promotional methods : Find three print examples of the kind of promotional methods that constitute ambush or experiential marketing. Evaluate each example in terms of effectiveness of the sensory input provided.
Describe a case that would benefit from saas : Questions: 1. In cloud computing describe a case that would benefit from SaaS. (I am looking for as specific an answer as possible) 2. Based on what you read describe a case that would benefit from PaaS. (I am looking for as specific an answer as pos..
Complete java program named textfileshoppinglist : 1. Build a complete Java program named TextFileShoppingLIst. From its main method, call a method named writeShoppingList. This method takes an ArrayList of five strings provided by the user at the command line. Use a loop for repeated prompting..
Determine whether there is at least one collision : Given positive integers m and n, simulate the placement of n keys, where a record with key k is placed at location h(k) = k mod m and determine whether there is at least one collision.
How would you go about addressing it : Reflecting on the focus and content of this course, what is an important challenge facing management of health care organizations today? How would you go about addressing it? Explain.
Techniques to store and retrieve data using an sql database : Develop an understanding of strengths and limitations of various data storage, retrieval methods and models. The assessment requires students to conduct a survey and report on data storage and retrieval techniques and data models.
Formal use policy for securing networks and databases : Formal Use Policy for securing networks and databases You will create a formal acceptable Use Policy for an organization of your choice. You will use your textbook as a guide to provide detailed information security expectations of the employees i..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd