Read and prints highest valued legal scrabble word

Assignment Help Computer Networking
Reference no: EM13763571

You are to write a program that will read a file of scrambled 7-letter strings, and then prints out the highest valued legal Scrabble word(s). Before reading the file, your program will store a list of words read from the file words.txt. That file contains both legal and illegal words. Scrabble words are up to seven letters long, and are only composed of lowercase alphabetic characters. Your program will have to avoid storing the illegal words.

Your program should have a Word class that contains 1) a real Scrabble word stored in a string; and 2) the Scrabble value of the word. These Words must be stored in a set. You must create a map of letters to values, and use the map in determining the value of a word. The values, from 'a' to 'z' are 1, 3, 3, 2, 1, 4, 2, 4, 2, 8, 5, 1, 3, 1, 1, 3, 10, 1, 1, 1, 1, 4, 4, 8, 4, and 10. I initialized an array of shorts, named
values, with these values, and then inserted them into the map.

The toughest part of this program is designing an algorithm to test all of the permutations of the file string and its substrings. You must use rotate and/or next_permutation to help in this task. Besides pp. 878-879 in the text, you will find more information on the web by searching for "STL rotate", or "next_permutation". You are not allowed to use any arrays or pointers in this program, other than the array of shorts named values. Your program must compile without warnings when compiled with -Wall -ansi. Your output must match mine exactly!

You will find words.txt, File1.txt, and my scrabble.out in ~ssdavis/40/p8

[ssdavis@lect1 p8]$ cat File1.txt
abcdefg
ableujk
ttabeed
olbisha
abjects
ytvxyzk
[ssdavis@lect1 p8]$ scrabble.out File1.txt
9 abcdefg: badge cafe face
15 ableujk: jake juke
10 ttabeed: abetted
13 olbisha: abolish
17 abjects: abject
0 ytvxyzk: No words found.
[ssdavis@lect1 p8]$

Reference no: EM13763571

Questions Cloud

Information on a mnc-publicly-traded company : Search the Internet for information on a MNC, publicly-traded company. Download the annual report for the most recent year reported; review the information contained on the company Website and proxy statement for use in this assignment. Review and..
Homicides committed with firearms : The difference between a perforating gunshot wound and a penetrating gunshot wound?
Read and prints highest valued legal scrabble word : You are to write a program that will read a file of scrambled 7-letter strings, and then prints out the highest valued legal Scrabble word(s). Before reading the file, your program will store a list of words read from the file words.txt.
Discuss the concept of domestic containment : Discuss the concept of "domestic containment". How did this concept operate in 1950's-1960's America? Why was it destined to ultimately fail? Give an example of one of the values present in domestic containment.
Read and prints highest valued legal scrabble word : You are to write a program that will read a file of scrambled 7-letter strings, and then prints out the highest valued legal Scrabble word(s). Before reading the file, your program will store a list of words read from the file words.txt.
Auditing cash and cash equivalents : Describe why there is a big emphasis placed on auditing cash and cash equivalents. Address the following:
What do you think of when you use the word church : What do you think of when you use the word church? How much of this is biblical and how much is cultural? Please explain and include material from your reading.
Why are data analysis skills and thinking so important : Why are data analysis skills and thinking so important to spend analysis. Can't software applications be used to generate the information needed automatically
Write critique of book is the healing of america by tr ried : Write the Critique of The Book is The Healing of America by T.R. Ried.

Reviews

Write a Review

Computer Networking Questions & Answers

  Find laptop models which have internal networking capability

Many desktop computers and laptop computers now include automatic built-in network connectivity. Find and name specific desktop and laptop models which have internal networking capability.

  Connecting computers in a local area network

Assume you are asked to head a non computerized department and you need ten computers and would like to connect them to each other.

  Q1 explain what a relational database is and why relational

you are the trainer for a major technology firm. one of the problems your firm has is hiring new technologists who have

  1consider a desktop publishing system used to produce

1.consider a desktop publishing system used to produce documents for various organizations. give an example in which

  Types of cable to make connection

Bank Corp. is planning new network. Engineers in design shop should have connections to accountants and salespeople in front officeWhat types of cable will work to make this connection?

  Would a packet-switched network or a circuit-switched

consider an application that transmits data at a steady rate for example the sender generates an n-bit unit of data

  Question 1a there are two analysis techniques in reverse

question 1a there are two analysis techniques in reverse engineering for mobile apps static and dynamic.i set apart

  Discuss new ways for employees to use web-based

discuss new ways for employees to use web-based self-service applications in their companies that will help save time

  Determine prefixes for four subnets

Assume it wishes to create four subnets from this block, with each block having same number of IP addresses. Determine the prefixes (of form a.b.c.d/x) for four subnets?

  Two of the characteristics of an ethernet 802.3 network

Two of the characteristics of an Ethernet 802.3 network are a shared bus and CSMA/CD. Explain in detail how a switch interacts with those characteristics.

  What are the requirements regarding plaintext and ciphertext

Keeping the IV secret in OFB mode does not make an exhaustive key search more complex. Describe how we can perform a brute-force attack with unknown IV. What are the requirements regarding plaintext and ciphertext?

  Several views to cybersecurity architecture

several views to Cybersecurity Architecture. Describe the Business View and the Architect's View through a business case example.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd