Add the numbers 3 through 10 to the hashtable

Assignment Help Software Engineering
Reference no: EM13948408

We are working on hashtables and I am trying to figure out a real life example that could be solved with hashtables to jtree as well as some type of array or jlist. I just need some opinions or examples of this part please.

Here is an exercise I do not understand in this chapter.

Observe the following code, which creates a simple hashtable.
// Demonstrate a Hashtable
import java.util.*;
class HTDemo
{
public static void main(String args[])
{
Hashtable<String,Integer> numbers = new
Hashtable<String,Integer>();

numbers.put("one", new Integer(1));
numbers.put("two", new Integer(2));

}
}

Starting with this provided code, add the following functionality:

1. Add the numbers 3 through 10 to the hashtable continuing in the same manner as shown.

2. Prompt the user for a string, and display the corresponding number. For example, if the user types "five", the program would output "5". This must be done using the hashtable as created in the previous step.

3. Using a loop and a single printlng statement, display all of the values (both strings and integers) in a table.

Reference no: EM13948408

Questions Cloud

Dornbusch model under perfect foresight : Consider the following Dornbusch model under perfect foresight
Compare an aspect of the systems : Compare an aspect of the systems or arrangements for the protection of children from maltreatment in TWO countries, legal jurisdictions or regions.
System into deviations from the fixed point : (i) Find the fixed point. (ii) Transform the system into deviations from the fixed point. What are the characteristic roots of this transformed system? (iii) Derive the equations for the stable and unstable arms.
Compute the roi for the coming year : Suppose that the average operating assets of the Components Division total $10 million. Compute the ROI for the coming year, assuming that the 50,000 units are transferred to the Goods Division for $21 each.
Add the numbers 3 through 10 to the hashtable : We are working on hashtables and I am trying to figure out a real life example that could be solved with hashtables to jtree as well as some type of array or jlist. I just need some opinions or examples of this part please.
What is intrapreneurship and how is it best enabled : Who Is The Entrepreneur? In your text, the top right-hand quadrant defines an entrepreneur as being one who has high creativity and innovativeness but not necessarily high management skills and business know-how, What is intrapreneurship and how i..
Problem regarding the saddle-point solutions : Verify that the following two systems have saddle-point solutions at the origin
Establish the fixed point : (i) Establish the fixed point. (ii) Derive the equations for the two isoclines and establish the vector of forces. (iii) Derive the equation for the stable and unstable arms.
Wireless solution for a sporting goods company : The objective of the project is to recommend a wireless solution for a sporting goods company. This is an individual project. You will be required to submit two assignments for the project. Because of this, you may need to spend additional time an..

Reviews

Write a Review

Software Engineering Questions & Answers

  Question about case tools

From your personal experiences explain how CASE tools have improved the system development cycle.

  Software system architecture

Develop an overall architecture for the system described in the assigned reading.

  Analyse the decision-making process of a common

How do you decide to buy a new house or a new piece of electronics or to go on a vacation? Though often invisible, there is a strategy in this everyday decision-making. You might ask for recommendations from friends, read reviews online or rely on..

  Explain understanding plan-do-check-act process flow

The project where risk and quality processes make obsolete portions of project plan, how is plan maintained (updates, corrections)? What is context for understanding plan-do-check-act process flow?

  List the names of all the business layer classes

Create the application class using an appropriate application name. This name must reflect the whole solution for software development 3.

  Describe the software types

Reflect on how the software types and computer languages have evolved over time, and what this has meant for the use of these operating systems

  Explain the syntax of programming languages

BNF is used extensively in the computing field to describe the syntax of programming languages. Give an example of where and how BNF might be used to solve real-world problems

  Embedded system development spring

Embedded System Development Spring, Multiply the Number 0x 00000DBF by Decimal 9 using shift instruction consider the result Minuend. Divide 0x00000CD8 by Decimal 4 by shift instruction and consider the result Subtrahend.

  Evaluate the intended audience

Question: In order for technical communication to be effective, the writer must evaluate the intended audience, its characteristics, knowledge base, expectations, and needs.

  What protocol game programmers would use udp or tcp

What protocol do you think video game programmers would use UDP or TCP. Why do you think the game uses one or the other protocols

  What is penetration testing

What is penetration testing? Why is it performed? When should it be performed and what is static analysis, and how does it fit into a penetration testing scenario?

  Prepare a data flow diagram for computing the volume

Prepare a data flow diagram for computing the volume and surface area of a cylinder. Inputs are height and radius of cylinder.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd