Question about java hashtables

Assignment Help Data Structure & Algorithms
Reference no: EM1380344

We are working on hashtables and I am trying to figure out a real life example that could be solved with hashtables to jtree as well as some type of array or jlist. I just need some opinions or examples of this part please.

Here is an exercise I do not understand in this chapter.

Observe the following code, which creates a simple hashtable.
// Demonstrate a Hashtable
import java.util.*;
class HTDemo
{
public static void main(String args[])
{
Hashtable<String,Integer> numbers = new
Hashtable<String,Integer>();

numbers.put("one", new Integer(1));
numbers.put("two", new Integer(2));

}
}

Starting with this provided code, add the following functionality:
1. Add the numbers 3 through 10 to the hashtable continuing in the same manner as shown.
2. Prompt the user for a string, and display the corresponding number. For example, if the user types "five", the program would output "5". This must be done using the hashtable as created in the previous step.
3. Using a loop and a single printlng statement, display all of the values (both strings and integers) in a table.

 

Reference no: EM1380344

Questions Cloud

It is vital to understand what metrics are : It is vital to understand what metrics are. Be sure to study the Conference permitted More Information on metrics the specific information desirable to calculate each metric must be discussed
Question about key encryption : Assume Alice wishes to send an e-mail to Bob. Bob has a public private key pair, Alice has Bob's certificate. But Alice does not have a public, private key pair.
Which accounting discipline is responsible : Her prospective banker has requested information concerning financial condition of her business. Which accounting discipline is responsible for providing accounting information to outside stakeholders.
Explain the process for handling conflicts : Explain the process for handling conflicts taking place in the organization and analyze the elements of organizational culture to improve corporate performance.
Question about java hashtables : Prompt the user for a string, and display the corresponding number. For example, if the user types "five", the program would output "5". This must be done using the hashtable as created in the previous step.
Which are three most relevant lessons learned : Which are three most relevant lessons learned of this reading. Please Explain why. Also analyze also discuss in great detail.
New keynesian model with technology shocks : Discuss the real output and in ation expressions verbally - New Keynesian model with technology shocks
Explain how do we balance this with our new found : We have touched on delicate balance of successful marketing also perhaps social ethics. Explain how do we balance this with our new found POWERFUL knowledge of consumer behaviour.
New keynesian model with technology shocks : Discuss the real output and in ation expressions verbally - New Keynesian model with technology shocks

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  What do you meant by an rfp

Select a specific category of vertical applications to investigate. Use the Internet and any other sources of information you might have to study some of the different products that are available in that category.

  Graph in which every node is pivotal for at least two nodes

Give an example of a graph in which every node is pivotal for at least two di fferent pairs of nodes. Explain your answer.

  Creating java programming scripts

Discuss how does a programmer typically get access to a Graphics object when coding an applet?

  Create an algorithm to produce list of customers

Create an algorithm to produce list of customers from Glad Rags Clothing Company's customer master file. Each record on customer master file contains the customer's number

  Effective address-addressing mode of instruction is direct

Evaluate the effective address if the addressing mode of the instruction is (a) direct; (b) immediate; (c) relative; (d) register indirect.

  Different network connections

Use your laptop at public store to check your email and discuss all the different network connections involved in this operation.

  Create a binary search tree program

Creating a Binary Search Tree program - Finding the largest and smallest values in the tree Add two class methods

  Creating a method find ranks in java

Create a method findRanks in Java that accepts an unsorted array of integers vals, and starting and ending rank start and end, numbering ranks from 0,

  What is the most difficult part of creating the algorithm

Pseudocode algorithm you would write for a simple task. What do you think is the most difficult part of creating the algorithm? What can you do to make this process easier?

  Sketch portion of decision tree via quicksort to sort array

Suppose you are using quicksort to sort array A with 6 distinct elements a1, a2, ..., a6. Sketch portion of the decision tree which corresponds to th ordering a3

  Entity relationship diagrams

Discuss why are Entity Relationship Diagrams an important initial stage in developing databases? Who would be the initial parties interacting to develop the ERDs?

  Illustrate how b-tree will expand

Illustrate how tree will expand (after inserting each Part#), and what the final tree would like. (b) Repeat item (a), but use a B-tree of order p = 4 instead of a B+-tree.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd