Records are converted to valid json

Assignment Help Computer Engineering
Reference no: EM131310439

Assignment

Inside each of the data files is 102 lines of information. The first and last lines are just a header and footer that don't contain a relevant record. Each of the other 100 lines contains one record each. These records each have 150 fields separated by | . The final field is just a field indicating the end of a record.

The data layout file has one field name per line corresponding to each of the 150 fields that each record in the data files have. These field names and the fields in the data files are all in the same order.

For this assignment you can have all of your code in the Program class if you choose to. You will need to give the user the choice of reading in all of DataFile1, 2, or 3. The data in the chosen file should be read in and converted to the JSON format. It's important to note that the data files only have the values of each field, the DataFieldsLayout file contains the name of each field. The JSON formatted data then needs to be written out to a new file.

Make sure your project meets the following requirements:

File I/O Reading

• The field names are read in from the DataFieldsLayout file and stored in a variable.
• The data fields are able to be read in from at least one of the DataFile files and stored in a variable. File I/O Writing

o All relevant data from a DataFile is written out to a single file. JSON
o Records are converted to valid JSON. User Input

? The user is able to select which of the three data files they would like to process.

Extra Information

Tips and hints:

• Each line of the data files is a separate record made up of key:value pairs.
• Figuring out how to convert one record into JSON and then repeating that process for each record will be easier than trying to just lump convert the whole data set.
• Test your JSON using the JSON validator found here.
• This is an array of data, make sure that your output JSON file accurately represents this fact. The data should not just be a bunch of JSON objects in a file with no structure.

Go back through your code and check for the following:

o All variables and methods are named appropriately.
o Member variables should have either protected or private access.
o Anytime the user is asked for input the expected input is made clear to the user.
o Any information being output to the user should be clear and concise.
o Make sure nothing accesses an object that doesn't exist.

Reference no: EM131310439

Questions Cloud

Create a one-page systems diagram in microsoft visio : Using the Configuration Scenario Instructions, create a 1-page Systems Diagram in Microsoft Visio, or another diagramming tool, that shows the technical networking and server landscape of Ray's Food.
What is most recent stock price listed for tesla : What is most recent stock price listed for Tesla?- What is the market value of equity, or market capitalization?- How many shares of stock does Tesla have outstanding?
Identify hourly costs associated with certified computer : Identify hourly costs associated with specific certified computer experts that can be used for forensics purposes and suggest a certified computer professional, you think, would be effective for a court case.
Mobile devices and self-service e-commerce : Imagine that you have been hired by the startup e-Commerce company Sports R US to provide a convenient self-service solution for customers accessing sports products.
Records are converted to valid json : All relevant data from a DataFile is written out to a single file. JSON. Records are converted to valid JSON. User Input. Each line of the data files is a separate record made up of key:value pairs.
Should tb continue to bid on citect and at what price : Thoma Bravo - Citect Corporation, Should TB continue to bid on Citect and at what price? Are the expected ROIs and IRRs to TB sufficient at your revised bid amount
Develop a comprehensive network design document : Discuss about the Network Design Executive PowerPoint Presentation . Develop a comprehensive network design document. Use technology and information resources to research issues in network architecture and analysis.
What are the companys inventory turnover ratio : Sorenson Inc. has sales of $5,119,000, a gross profit margin of 32.18 percent, and inventory of $1,017,000.- What are the company's inventory turnover ratio and days' sales in inventory?
Compute the beta and interpret : Compute the Beta and interpret it.-  Examine different circumstances with analysis of data.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Questionillustrate a memory map for a system with a memory

questionillustrate a memory map for a system with a memory capability of 512mb. each memory location in system is 8

  Computer applications help minimizing the communication

computer applications help minimize the communication barriers experienced over the phone throughout the support

  Questionassume you were recently hired for a new position

questionassume you were recently hired for a new position as computer forensics specialist at a medium-sized

  Choose two of the security features you recognize and write

third-party assurance providers such as bbbonline inc. and truste sell their services to businesses that want to

  How many total registers are in cpu

How many total registers are in CPU? (Hint: Remember, due to the circular nature of the windows, the output registers of the last window are shared as the input registers of the first window.)

  What are the advantages and disadvantages of approach

consider whether or not the same people who develop the software should be tasked with maintaining it or whether or not a separate group must be tasked with development of software and separate group with maintaining it.

  Questiongenerate a class name that starts with string

questiongenerate a class name that starts with string variable first set to your first name and the string variable

  How to modify the perimetercalc class

how to modify the PerimeterCalc class so that a caller who has a square plot will be able to provide only one argument value for length and width (rather than two that are just the same) in the method invokation.

  What type of interface use between the sensors and computers

What type of interface would you use between the sensors and the computers? If all computers are to have access to all of the sensor input, would you use the same type of connection to interconnect the computers among one another?

  Analyze firewire using the value chain and competitive

firewire surfboards light up with cadnev hyman had been building surfboards in australia for 35 years. in 2005 he

  Write a class that encapsulates a deck of cards

Write a class (and a client class to test it) that encapsulates a deck of cards. A deck of cards is made up of 52 cards. You should have three instance variables.

  Explain the concepts of information systems security as

you are the information security officer for a small pharmacy that has recently been opened in the local shopping mall.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd