Create a comma separated values text file

Assignment Help Computer Engineering
Reference no: EM132234017

Question: Data Structures

The Software Development Company now requests you add final elements to the C# program.

For this week's assignment, build on the Week Four Individual Assignment, "Error Handling," by reading the software developers' C# data structure records data from a file (data.txt), implement an array data structure containing the data, and display on the console all the software developers' data, monthly pay, monthly taxes, annual gross pay, annual taxes, and net pay.
Program Input File:

Create a Comma Separated Values (CSV) text file and named "data.txt." The data.txt file shall include information on at least five developers put into rows and including software developer name, addresses, and monthly gross pay separated by a comma.

Using Visual Studio and C# programming concepts, write a program to meet the specifications of the company's request. The program should have the following characteristics:

1. Compile and Execute without errors

2. Meets specifications by demonstrating file handling, array data structure manipulation, and console output mastery by accomplishing the following:

• Read software developers' data from a file

• Input the data into an array data structure

• Display the software developers' data on the console

3. Logic flow is clear, concise, and effective

4. User inputs and outputs should be clear on screen

5. Validation for input types and data format

6. Appropriate indentation to logically illustrate program structure

7. Identifiers logically describe use

8. Naming conventions are consistent

9. Comments and headers to explain processing that is not obvious

Zip your Visual Studio solution project folder so it can be submitted for grading. In Visual Studio, you can locate the folder with your solution by left clicking on the solution node in the Solution Explorer. Look at the Properties window to find the folder name in the Path property. Locate this folder in File Explorer and zip the folder.

Reference no: EM132234017

Questions Cloud

Write summary of fair use as the court decision says it : On April 18, 2016, The United States Supreme Court denied a petition for certiorari (refused to review the lower court's ruling) in the case of Authors Guild.
Difference in applied research and basic or pure research : Explain the difference between applied research and basic or pure research?
Define how that attack was conducted : Note how that attack was conducted. Write a brief explanation of how you might have defended against that specific attack.
Ethics officer who revised firm business conduct guidelines : The aerospace corporation recently hired a new ethics officer who revised the firm’s Business Conduct Guidelines.
Create a comma separated values text file : Create a Comma Separated Values (CSV) text file and named "data.txt." The data.txt file shall include information on at least five developers put into rows.
Advantage of using newspaper medium for advertising : Which of the following is an advantage of using the newspaper medium for advertising? Which of following is advantage of using radio medium for advertising?
Describe the deadlock avoidance approach : Write a short paper that recommends a deadlock avoidance approach most suitable for the TSI web server application that is not using an ordered acquisition.
Create specific strategic group map for the pizza industry : Create a specific strategic group map for the pizza industry (not the products, the industry) and document all of the steps you used to complete the SGM.
Describe the concept of an event-driven architecture : In your initial post, briefly describe the concept of an event-driven architecture and explain two benefits that modern organizations can realize.

Reviews

Write a Review

Computer Engineering Questions & Answers

  How algorithm could be implemented to search data structure

For 1 of the selected search algorithms, write pseudocode, and create flowchart to show how algorithm could be implemented to search data in the data structure.

  Perform normalization process to convert un-normalized table

Perform the normalization process to convert the above un-normalized table to First normal form (1NF) Second normal form (2NF) and Third normal form (3NF).

  Describe the disjunctive normal form

Express each of the different Boolean expressions in disjunctive normal form in four variables using just the NOR operator, with as few NOR operators.

  Define the first two parameters so that they are modifiable

Stop reading when either the input number is the sentinel value -99 or when 20 (valid) numbers have been read into the array.

  Design in detail with the architectural design

Design in detail with the architectural design as well as use cases, sequences diagrams, class structural models, and behavior models.

  Determine the number of clusters in the data

COSC2110 - Data Mining - RMIT University - What is the effect of lowering the number of examples in the training set? Include your runs in your table

  Questionsstudy any two multicore processor architecture and

questionsstudy any two multicore processor architecture and discuss the following features briefly.a bus architectureb

  Write a html files function that computes a taxi fare

Write a HTML and JavaScript files function that computes a taxi fare.

  Write a report suggesting appropriate metrics

Assume you work for an organisation that develops database products for individuals and small businesses.

  How many assembly fixtures do we need

Utilization of the sub-assembly stations and the inspection station. Which one is the bottleneck of the process - What is the production rate of auto assemblies per hour and Make a time plot of the work-in-process inventory and comment on whether th..

  Create an adt that contains a fixed-size array

Create an ADT that contains a fixed-size array that holds 20 integers (i.e., int array[20]; ) .

  Define how risk assessment methodology process can be used

Research how a risk assessment methodology process can be used to assess risk at a maximum security facility. Write a minimum of 1 page.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd