Give appropriate accessor methods to set and get the data

Assignment Help Computer Engineering
Reference no: EM1331523

Design an address book application to keep track of the names, addresses, phone numbers, and birthdays of family, friends, and colleagues. You may implement your own linked list library, but it is recommended that you make use of the linked list API in the C++ standard template library.

At a minimum, your program should implement at least one object called AddressRecord and should hold the following data:

* recordId (must be an int. This field uniquely identifies a record in your address book)
* firstName
* lastName
* contactType (i.e. friend, family, etc.)
* streetAddress
* city
* state
* zipCode

Provide the appropriate accessor methods to set and get the data. The main program must provide the following functionality.

1. When the program is first started, it should read a data file "address.dat", if it exists, and load the data from this file in the address book’s linked list.

2. When the program exits, it should save all of the entries in the address book linked list into the "address.dat" data file. At this point, if this file does not exist, the program should create it.

3. Provide a text-based user interface to allow the user to operate on the address book data. The program should allow the user to:
(a) view all entries in the address book;
(b) search for an entry in the address book by last name (if the entry exists, print the record);
(c) add an entry to the address book;
(d) delete an entry from the address book; and
(e) modify any of the data (except the recordId) for given address book entry selected by the user. These operations should work on a linked list that holds all of the entries of the address book.

Reference no: EM1331523

Questions Cloud

Determine the appropriate rewards : If you were a leader in this organization, determine the appropriate rewards that would best motivate employees toward achieving the desired strategy.
What is your opinion : At the end of 2008 the number was already 42 1 and in the year 2010 the WTO expects a total number close to 350 of additional Free Trade Agreements implementations, nearly doubling the existing amount (World Trade Organization, 2010).
How does stage affect the hr function : What are the stages a firm typically goes through as it grows internationally and how does each stage affect the HR function?
Explain ebusiness concepts : This discuses the scalability of an e-Business IT infrastructure, internet-based technologies to automate the supply chain, strategic opportunities for e-Commerce enabled supply chains.
Give appropriate accessor methods to set and get the data : create an address book application to keep track of the names, addresses, phone numbers, and birthdays of family, friends, and colleagues. You may implement your own linked list library, but it is recommended that you make use of the linked list A..
Depicting strategic groups : Which of the following are strategic factors often used in depicting strategic groups?
Human resources methods for proficie : Staffing Strategies and Human Resources Methods for Proficie - What are your preliminary recommendations with regard to centralizing the staffing function under the Human Resources umbrella
Explain restricted information on the internet : Should information on the Internet be unrestricted? Why or why not? Provide examples.
Make binary search tree that will accept integers in order : modify a C++ Binary Search Tree that will accept integers in this order: 35, 18, 48, 72, 60, 25. Ask user for input and search tree utilizing integer input. Return "True" if input integer is found or "False" if it is not found in tree.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Create a compensation structure

Evaluates both approaches (job-based and person-based) and creates a compensation structure based on both approaches. In considering both approaches, what would the compensation structure look like for each position? Justify your recommendations w..

  Investigating a social engineering attack

Investigate a social engineering attack describing what has made this attack more successful and the information which was observed from this attack is sure to involve how could this attack be avoided.

  Implementing the code

Write down a complete program which declares an integer variable, reads a value from the keyboard into that variable. Write down a program which determines the mileage reimbursement for the salesperson at a rate of $.35 per mile.

  How java programing benefits to nonprogrammers

How does knowledge of programming concepts benefit individuals working in any IT position.

  Recognizing the threats in the code

State two recent virus threats; whether they are minor or the major threats?

  How important is the internet to most companies

How significent is the Internet to most companies? How have companies improved the sales / service / performance process utilizing the Internet.

  Simulating the turing machine

Describe how to simulate the Turing machine along with singly infinite tape on the Turing machine with the doubly infinite tape. (Be sure to handle the can't move left" special case.) Describe how to simulate the Turing machine with the doubly inf..

  Generating an array for a particular structure

You should generate a structure student_t in order to store the student name and three exam scores. You will generate an array of this structure in the main function.

  How can we use foreign key constraints

How can we use Foreign Key constraints. How may we create new View on one or more tables ?

  System analysis and design

In the System Analysis and Design: Design Patterns – How widely used are design patterns in today’s development environments.

  Avoiding breaches in health care information system

Analyze the financial and privacy impacts of the breaches to health care information systems and make at least two recommendations in order to prevent such breaches in future.

  Make functionwill add one to each element in array of size

Write down the following C++ routines using pointers only. Do not use any [] 's in your code.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd