Complete java program named textfileshoppinglist

Assignment Help Basic Computer Science
Reference no: EM131168378

1. Build a complete Java program named TextFileShoppingLIst. From its main method, call a method named writeShoppingList. This method takes an ArrayList of five strings provided by the user at the command line. Use a loop for repeated prompting and receiving of the five strings. Each string is written as a line in a text file named names.txt . Make sure to handle the exception that might be thrown and print the error message to the command line.

2. Build a complete Java program named NamesEvaluation. From its main method, call a method named obtainNames. This method should declare an array of three first names as strings. In the method, prompt the user for each name as a string. Each string should be a first name of at least five characters (e.g. "Charles") and the first character must be received as an uppercase letter. Keep in mind a first name may be more than one word (e.g. "Mary Lou"). If a data validation isn't passed, throw an error of the Exception class. Handle the exception in a method named handleError. This method should accept a string containing a suitable message about the type of error that occurred (e.g. "The name wasn't at least five characters."). The handleError method simply prints the string it received as an argument. Keep prompting the user, if necessary, until all data validations are passed.

3. Continuing from the previous exercise, now that data validations have been enforced, pass the array of five first names to a method named searchNames. This method does not return a value. It should prompt the user for which first name they wish to display in the array as an integer (e.g. "Enter the position number of the name you wish to see: "). Use a try...catch block to prompt the user and obtain the integer. Display the matching name at that array index position as a string. Handle three potential errors via the catch block. The first should take care of a non-integer index entry. The second should take care of an index entry that is out of bounds for the array size. The third should be of an Exception type. Each raised exception should include a suitable custom message for that exception type along with the result of its .getMessage() string.

Reference no: EM131168378

Questions Cloud

Determine the average number of comparisons : Determine the average number of comparisons used over all m permutations.
Difference between applications and application protocols : What is the difference between applications and application protocols? And, what do you think are the top 5 application protocols that account for most of the network traffic for the average business?
Find three print examples of the kind of promotional methods : Find three print examples of the kind of promotional methods that constitute ambush or experiential marketing. Evaluate each example in terms of effectiveness of the sensory input provided.
Describe a case that would benefit from saas : Questions: 1. In cloud computing describe a case that would benefit from SaaS. (I am looking for as specific an answer as possible) 2. Based on what you read describe a case that would benefit from PaaS. (I am looking for as specific an answer as pos..
Complete java program named textfileshoppinglist : 1. Build a complete Java program named TextFileShoppingLIst. From its main method, call a method named writeShoppingList. This method takes an ArrayList of five strings provided by the user at the command line. Use a loop for repeated prompting..
Determine whether there is at least one collision : Given positive integers m and n, simulate the placement of n keys, where a record with key k is placed at location h(k) = k mod m and determine whether there is at least one collision.
How would you go about addressing it : Reflecting on the focus and content of this course, what is an important challenge facing management of health care organizations today? How would you go about addressing it? Explain.
Techniques to store and retrieve data using an sql database : Develop an understanding of strengths and limitations of various data storage, retrieval methods and models. The assessment requires students to conduct a survey and report on data storage and retrieval techniques and data models.
Formal use policy for securing networks and databases : Formal Use Policy for securing networks and databases You will create a formal acceptable Use Policy for an organization of your choice. You will use your textbook as a guide to provide detailed information security expectations of the employees i..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find the node at the beginning of the loop

Given a circular linked list, find the node at the beginning of the loop. Example: A-->B-->C --> D-->E -->C, C is the node that begins the loop

  Displays the amount of pay for the pay period

1. Non-numeric values should not be accepted. 2. Negative values should not be accepted. 3. The minimum number of days for the pay period is 19 days for the new employees and 16 days for the experienced employees. The maximum number of days in a p..

  Town has two burger restaurants located across the street

A small midwest town has two burger restaurants located across the street from each other: 'Burgerama' and 'The Burger Brothers'. As both restaurants compete for the same customers, they are both considering offering a larger burger with more topping..

  Did delta know that the nervous system was a success

6. did Delta know that the Nervous System was a success? Give How measurements of success (Critical Success Factors) of the new system.7. As a project manager, what would by your biggest concern during implementation?

  Difference between the reported size of directories

What is the difference between the reported size of directories when using the command ls versus the command du? Explain.

  Create an applet to draw a digit using the method fillrect

Create an applet to draw a digit using the method fillRect of the class Graphics. For instance, if the input is 4, the applet will display the digit 4. In java language please

  Can you think of ways to overcome this problem

Do you think this implies that geographical separation is something to avoid? Can you think of ways to overcome this problem?

  Critical to the system forensics industry

Explain in your own words the importance of report writing and why you believe it is critical to the system forensics industry. Discuss the need for forensic reports when testifying as an expert witness.

  Explaining pros and cons of coralcdn

Provide a summary of CoralCDN. Contrast its operation with that of Akamai. What the pros and cons of CoralCDN (as compared to Akamai)?

  Prepare user requirements document on feasibility analysis

Using below Monash Video Library Case Study, you are to prepare User Requirements Document. It is suggested that a framework for the document could be based on the following structure:

  Why the sdlc is adequate to develop any system

Why the SDLC is adequate to develop any system. Explain by giving at least two examples of systems, such as client-management systems and decision-support systems.

  Does warm weather climate affect eating disorder pathology

Does warm weather climate affect eating disorder pathology? International Journal of Eating Disorders, 32, 240-244.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd