Write a program that uses an arraylist of parameter type

Assignment Help Basic Computer Science
Reference no: EM13307994

Write a program that uses an ArrayList of parameter type Contact to store a database of contacts. The Contact class should store the contact's first and last name, phone number, and email address. Add appropriate accessor and mutator methods. Your database program should present a menu that allows the user add a contact, display all contacts, search for a specific contact and display it, or search for a specific contact and give the user the option to delete it. The searches should find any contact where an instance variable contains a target search string. For example, if "elmore" is the search target then any contact where the first name, last name, phone number, or email address contains "elmore" should be returned for display or deletion. Use a "for each" loop to iterate through the ArrayList.

Reference no: EM13307994

Questions Cloud

Implement a class for complete binary trees : You should have only one member function that adds a new node(since there is only one place where a node may be added, and one member function that removes the last node of the tree.
Current work organization (or an organization of interest) : Using your current work organization (or an organization of interest) as the subject matter
Determine the values of stress and the change in thickness : A rectangular steel plate with thickness t=0.625 inches is subjected to normal stresses sigma x and sigma y.The strain in the x direction is known to be 0.00065 and the strain in the y direction is known to be 0.0004.
Determine the stresses acting on an element oriented : An element in plane stress is subjected to stresses sigma x=27 MPA,sigma y=14 MPA,sigma xy=6MPA.Using mohr's circle,determine the stresses acting on an element oriented at an angle 40 degrees from the x axis.
Write a program that uses an arraylist of parameter type : For example, if "elmore" is the search target then any contact where the first name, last name, phone number, or email address contains "elmore" should be returned for display or deletion. Use a "for each" loop to iterate through the ArrayList.
Compute the magnitude of the acceleration of the elevator : A man stands on a scale in an elevator that is accelerating upward. compute the magnitude of the acceleration of the elevator?
Find distance required for police officer to overtake car : At the moment when A passes P, the police car begines to accelerate at the constant rate of 6m/s^2 until a speed of 160km/h is achieved, and that speed is then maintained.
Explain a python program storing and processing simple bank : A Python program storing and processing simple bank records is in the early stages of development. The records are stored in a text file (bank.txt) that contains, for each bank customer, their given name, account number and balance.
Develop a plan to connect your remote users : Develop a plan to connect your remote users. your solution can involve more than one remote access type.

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Write a statement that changes the value of 6 in the array

Write a statement that changes the value of 6 in the array to a 12.

  Describe the different parts of the cia triad

Describe the different parts of the C.I.A. triad and how each can be used to improve the overall security of an information system.

  How to stop process-freeze its memory image in process

Some multicomputers permit running processes to be migrated from one node to another. Is it adequate to stop process, freeze its memory image, and just ship that off to different node?

  Develop the logic for a program

The exact number of household records has not yet been determined, but you know that Marengo has fewer than 300 households. Develop the logic for a program that allows a user to enter each household size and dtermine the mean and median household ..

  Hash function h is used and the signature

Suppose a hash function h is used and the signature must be valid for h(m) instead of m. Explain how  this scheme protects against existential forgery

  Significant to control changes to asset baselines

Why is it significant to control changes to asset baselines? Explain why is labeling process approached hierarchically?

  Signed-magnitude representations binary numbers in computers

Why do we require signed-and-magnitude representations of binary numbers in computers? Represent decimal values: -37, -54, and 56 in binary by using signed-and magnitude representation.

  How matrices are calculated

Show each of the intermediate matrices. Refer to section 9-1 of the textbook for the details of how matrices are calculated. Because no translations are involved, you can use 3 x 3 matrix math for your calculations.

  What is the order of the leaf node

The order of a leaf node in a B+ tree is the maximum number of pairs it can hold. Given that the block size is 1K bytes, data record pointer is 7 bytes long, the value field is 9bytes long and a block pointer is 6bytes long, what is the order of t..

  Describe the structure of the world wide web

Describe the structure of the World Wide Web as interconnected hypertext documents and create and validate HTML documents - create presentations using Cascading Style Sheets and DHTML.

  What is the response time for jobs in observed system

We observe a closed system for 30 minutes, during which 1600 tasks are completed, from 12 terminals. Each terminal (source of tasks). What is the response time for jobs in the observed system?

  Explains how hackers can hide their own ip address

Explains how hackers can hide their own IP address when attacking other computers, and how administrators can thwart this type of cracking

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd