Implement a lightweight version of an arraylist class

Assignment Help Computer Engineering
Reference no: EM132122318

Requirements

In this assignment, you will implement a lightweight version of an ArrayList class.

You may refer to the Java code and documentation for guidance, but you must write the implementation yourself.

Additionally, you must write unit tests for the class's methods. The use of good style is now a requirement.

Furthermore, you must remain in lab for the entirety of the class period unless you can demonstrate that you have correctly completed the assignment and understand the topics involved.

Design Specifications

You must implement the MyArrayList class with the following public methods.

Constructors MyArrayList(int initialCapacity) MyArrayList() // Required public methods add(E e) add(int index, E element) get(int index) set(int index, E element) size() indexOf(Object o) isEmpty() remove(int index) remove(Object o) contains(Object o)

You must write a test class with test functions for the following public methods (except the constructors):

add(E e) get(int index) size() remove(int index)

Reference no: EM132122318

Questions Cloud

Do a decision matrix to choose the best solution : Choose two design areas from EWB challenge. Then needs to do a decision matrix to choose the best solution for each design area
Compare the management techniques with that field : Compare the management techniques with that field you chose to software project management.
What alternatives did the startup have : Research the Web for an example of a startup using a cloud infrastructure.
Research parallel computing and prepare an informal paper : Research parallel computing and prepare an informal paper 2 -3 pages in length, single spaced with a blank line beltween paragraphs.
Implement a lightweight version of an arraylist class : You may refer to the Java code and documentation for guidance, but you must write the implementation yourself.
Write a short explanation of each method to someone : Write a short explanation of each method to someone with little knowledge of information security or risk.
Discuss about the history of development of the networking : Do a research on the Internet and discuss about the history of development of the networking field.
Research one job and company that interests you : Research one job and company that interests you, one that you think might be a good fit for you after graduation.
Write a java program that reads a set of integer lattice : Write a java program that reads a set of integer lattice points, prints out the ones on the boundry of the convex hull sorted left to right.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Define relationships between users and permissions

Assume a system with N job positions. For job position i, the number of individual users in that position is Ui and the number of permissions.

  An approximation to a zero of a continuous function

provide a pseudocode for the bisection method algorithm Bise(f(x),a,b,error) for finding an approximation to a zero of a continuous function f(x) in the interval [a, b] accurate to within error.

  Questioncreate your own repeat-until repetition arrangement

questioncreate your own repeat-until repetition arrangement. you decide theme. you have to provide both pseudocode and

  Write a function to determine if the hand contains a pair

Write a function to determine if the hand contains a pair. Write a function to determine if the hand contains two pairs.

  Write an html document to create a form

Write an HTML document to create a form with the following capabilities: A text widget to collect the user's name and Four 25-watt light bulbs for $2.39.

  Using microsoft visio or an open source alternative such as

write a two to three page paper in which you using microsoft visio or an open source alternative such as dia create a

  Verify the floppy image with md-5

Using the image in Course Content called Assignment2.001, and using any of the methods that you have seen for doing an MD-5 hash (FTK, PRODISCOVER - THEY CAN BE DOWNLOADED ONLINE), verify the floppy image with MD-5.

  What is the history of osi model and benefits

Why you will recommend either asymmetric key encryption, symmetric key encryption, or no encryption at all for the Email correspondence.

  What profit do you see with partitioned view

Explain your idea for a database along with your thoughts for a partitioned view. 1. How will you use this partitioned view?

  Write a method that will traverse a linked B-tree

Write a method that will traverse a linked B-tree, visiting all its entries in order traversal of keys (smaller keys first).

  Define what a distributed database is

In this discussion board, you would investigate distributed databases and partitioning. You have been asked to prepare an informative memo that will address the following.

  Create an interface called breakable

Imagine a game in which some game elements can be broken by the player and others can't. Create an interface called Breakable that has a method called break.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd