Implement a custom java class for the guest information

Assignment Help Computer Engineering
Reference no: EM133618457

Question: Develop a Java program that meets the following requirements:

1. Assume that you will be implementing Java software to track attendees for a conference: if the guest's identifying information is found, they are allowed to enter. A guest's identifier includes their full name and then an integer to represent their guest category number.

Based on your experience with the hash set and hash map data structures, decide whether to use a hash map or hash set for step 2 for this task for most effective programming.

Briefly explain in code comments on your class your reasoning for the choice.
For example, a guest identifier could be: FrankSmith3992

2. Implement a main method in your class that includes code to meet the following requirements:
(a) Develop a MyhashMap or MyHashSet data structure object based on your choice in step 1 that allows to simulate checking whether the
guest's identifier (a String) is in the conference records.

For example, the guest presents the identifier FrankSmith3992, and a volunteer checks to see if the identifer is on the list of approved guests.

HINT: review the TestMyHashMap and TestMyHashSet example code carefully

(b) Insert data for at least four guests into your data structure, ensuring that some but not all guests share the same category

For example, the two guest identifiers FrankSmith3992 and
BillJones3992 share the same category

HINT: check for the methods defined in your chosen data structure Java class to see which could be used for this step and the following.

OPTIONAL ADVANCED: you could even implement a custom Java class for the guest information, so that various information is stored in
one guest object.

(c) Print out every guest's name and category information from the datastructure, and simulate checking whether one guest identifier is in therecords using data structure operations.

(d) Using the same guest data, develop vertex data for an unweighted graph object in which the vertex data are guest names and an
edge exists between two guests if the two guests have the same category.

Make an unweighted graph object using your data

HINT: Review TestGraph.java. carefully, including the constructor methods. It is NOT required that you automate the creation of vertex
data: it can be done manually

(e) Using graph data structure operations, print out basic information about your graph including its size

(f) Run either a depth first or breadth first traversal in your graph, starting at a particular guest id (vertex) of your choice, and print out
the order of vertices visited

Review the TestBFS and TestDFS examples. Note that an internal SearchTree type is used to hold the result of the traversal. Did the traversal reach all of the guests? If not, think about why.

Reference no: EM133618457

Questions Cloud

Album appetite for destruction : Guns and Roses became the most popular heavy metal band in the World in the late 80s due to their album Appetite for Destruction
Determine which approach is best to assess it risk : Compare/contrast qualitative and quantitative assessments. Based on your experience provide example of each. Determine which approach is best to assess IT risk.
Explanation of your modifications to the code : Starting with the Python code for the time to failure ex- ample (TTF) posted on Quercus, make the necessary changes so that we can have any number of spare
Why are they considered bad : Discuss insertion, deletion, and modification anomalies. Why are they considered bad? Illustrate with examples
Implement a custom java class for the guest information : Develop a MyhashMap or MyHashSet data structure object based on your choice in step 1 that allows to simulate checking whether the guest's identifier
What are the consequences of having elections : What are the consequences of having elections where voter turnout tends to be relatively low?
What was the united states marshall plan : What was the United States' Marshall plan? What was the United States' Marshall plan? It was a United Stated Evacuation plan.
Discuss the difference between coding and programming : We are living in an age where coding and programming is starting to become popular. Discuss the difference between coding and programming.
Women began to join the industrial workforce : Women began to join the industrial workforce, primarily in textile mills, but they earned wages amounting to half or less than what men earned.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd