Java - Stack and Queue, Basic Computer Science

Assignment Help:
Consider a class called Configuration. This class “encapsulates” the configuration management
for any software system. For example, once created, the user can simply ask the configuration
object for value(s) to a certain configuration key. Let’s take a look at a few examples:
String filename = “config.txt”;
Configuration config = new Configuration( new File(filename) );
int numUser = config.getInteger( “num_users” );
String name = config.getString( “player1” );
In the above example, the config object is constructed and its contents are expressed in the file
config.txt. The format of the config.txt file is as followed.
key = value
key2 = value2
## lines with comments begins with the #
The complete Configuration class should implement the following methods:
Class Configuration {
// constructors
Configuration() { … }
Configuration( File file) { … }
Configuration(String filename) { … }
// accessors
int getSize() { … }
String getString( String key ) { … }
int getInteger( String key ) { … }
String[] getKeys() { … } // return all keys
// mutators
void push(String key, String value) { }
String[] pop() { } // returns String array[] = { key, value }
}
Your Configuration class will have two sub classes: (1) ConfigurationQueue and (2)
ConfigurationStack. The push and pop functions will behave differently depending on whether
your class is a Queue or a Stack.
Your App class is given and you should not change this class at all. Your homework will require
creating three files: Configuration.java ConfigurationQueue.java and ConfigurationStack.java.

Related Discussions:- Java - Stack and Queue

Foundation of computer system, Foundation of Computer System Q.No-1: W...

Foundation of Computer System Q.No-1: What do you understand by the Efficiency in term of Computers? and How will you measure it? Also define Speed and its factors which ca

Z80 CPU STATUS FLAGS, function of each status flags Z80 status flags

function of each status flags Z80 status flags

What are the three basic security provided by ssl, QUESTION (a) Can SSL...

QUESTION (a) Can SSL be used to encrypt email data? Justify your answer (b) What are the three basic security provided by SSL? (c) State the port number used by applicati

CS310, Ask question #Minimashdhdghfdgdfgdsgfdsgdsgdgdfgdgfdgdfgdfgdfsgfdsgd...

Ask question #Minimashdhdghfdgdfgdsgfdsgdsgdgdfgdgfdgdfgdfgdfsgfdsgdfsgum 100 words accepted#

HOMEWORK 9.., AsBased on Chapter Review Problems from the book. 1 #1. Wh...

AsBased on Chapter Review Problems from the book. 1 #1. What is meant by data independence? Explain your answer. #2. Identify two benefits of separating application software fr

CAI, what is CAI? explain its pit falls.

what is CAI? explain its pit falls.

Cai, what is cai

what is cai

Transmission media, TRANSMISSION MEDIA: When we speak of transmission ...

TRANSMISSION MEDIA: When we speak of transmission media, we usually mean a mix of physical lines ranging from wire pairs to cable, and over the air transmission media, such as

Data transmission, DATA TRANSMISSION: When we talk on the telephone we...

DATA TRANSMISSION: When we talk on the telephone we generally transmit a message to someone else. The message is made up of words that we speak into the telephone instrument.

Assignment 4, Briefly explain all the networking components and devices tha...

Briefly explain all the networking components and devices that are needed to set up a computer network. This is just a brief explanation of devices needed and their reason for usin

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd