From time to time words become obsolete

Assignment Help Basic Computer Science
Reference no: EM13165811

Write a menu driven program that either accepts words and their meanings, or displays the list of words in lexicographical order (i.e. as in a dictionary). When an entry is to be added to the dictionary you must first enter the word as one string, and then enter the meaning as separate string. A word may have more than one meaning, and may be entered at separate times. When this occurs, place each successive meaning on a separate line. This new meaning must be preceded by a dash. For example, if you enter the following words and with their meanings in the following order: Library, School, Cup, and School, then your output should be a display as shown in the Figure 1 below.

________________________________________
Cup - a container from which we drink.

Library - a collection of books.

School - a place of learning

   - any group of fish
________________________________________

Figure 1.

One more requirement, from time to time words become obsolete. When this happens, such word must be removed from the dictionary. Your program must account for this also.

Use the JOptionPane class to enter the information.

Use the concept of linked list to carryout this exercise. You will need at minimum the following classes:
• A WordMeaning class that hold the name of a word and its meaning.
• A WordMeaningNode class that creates the node of information and its link field.
• A WordList class that creates and maintain a linked list of words and their meanings.

  • A Dictionary class that test your classes.

For the output, the program should produce two scrollable lists:

  • The current list of words and their meanings, and

• The list of the deleted words. You need not list the meanings, just the words.

Reference no: EM13165811

Questions Cloud

If ptr is a pointer to a character : If ptr is a pointer to a character and has been initialized to point to the first element of arr, write a statement using ptr that is equivalent to the statement array[4] = 12.
Various search trees and numerous sorting techniques : This week we were introduced to various search trees and numerous sorting techniques. Taking into consideration what you have learned this week, discuss how you can help Bob with his problem.
Test a program that prompts for the user : Write and test a program that prompts for the user to input a file name and uses two functions head() and tail() - head() displays the first 10 lines of a file
Program to input the length of the side from the keyboard : write a program to input the length of the side from the keyboard ,use the class to obtain the areas of all shapes and display the results on the screen
From time to time words become obsolete : One more requirement, from time to time words become obsolete. When this happens, such word must be removed from the dictionary. Your program must account for this also.
Generate an array of 20 random integers from 0 to 9 : generate an array of 20 random integers from 0 to 9. Search for the first occurrence, if any, of the number 7, and report its position in the array.
Create 4 order class fields : Create 4 Order class fields: order number, customer name, quantity ordered, and total price. Create public accessors for each field except total price.
The recommended entry strategy into international markets : An expert system is used to determine whether the recommended entry strategy into international markets should be Investment (I), Contractual (C), or Export (E).
Optimization is to add a sorting algorithm : The second optimization is to add a sorting algorithm. Each time you add an item to the array (from disk or from keyboard), you call a function called SortMyArray(), which use the bubble sorting algorithm to sort the array in the ascending order, ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Eu directive on the protection of personal data

How does the EU directive on the protection of personal data impose requirements on organizations in non-EU countries?"

  Variety of tools that use to prepare project

In this course, you looked at a variety of tools that you would use to prepare a project. Some areas you looked at included, but were not limited to?

  Why are you normally required to bind a service

What steps need to be taken by a network service to be ready to receive TCP/IP connections? Why are you normally required to bind a service to a specific port?

  Why is it important to educate users about risks

what is a primary security risk that users should acknowledge when using macros? Why is it important to educate users of these risks once their dilemma is resolved?

  Write a xml schema for the validation of the document notes

write a XML schema for the validation of the document notes.xml

  Wi-fi used to support mobile computing and m-commerce

Explain ways in which Wi-Fi is being used to support mobile computing and m-commerce. Also explain ways in which Wi-Fi is affecting the use of cellular phones for m-commerce.

  Find default amount of time that entry remains in arp cache

Determine the default amount of time that the entry remains in ARP cache before being removed. You can find this empirically (by monitoring the cache contents).

  Why computer literacy has become fourth fundamental skill

Explain whether today, computer literacy (knowledge of how to properly use computer and its software applications) has become fourth basic skill.

  Steps to diagnose application changed from original state

Write down steps would you take in diagnosing the application which has been changed from its original state? Describe the answer.

  Create circuit at gate level to calculate function

Create the circuit at gate level to calculate the following function: if (a=b)y=a; else y=0;.let a,b and y be 16 bit buses. Suppose input and output capacitances are each 10 units.

  Support desktop computers in small company

Static IP address of server is 192.168.45.200. Employees will open their Web browser and enter personnel.mycompany.com in URL address box to browse Web site.

  What is achievable steady-state throughput

The receiver uses a conservative flow control policy and updates its credit allocation at every opportunity. What is the achievable steady-state throughput?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd