There are three parts to this question. Review the class below that adds elements to a hashtable. You may assume the class runs in a properly declared program with all necessary import statements. The key, value pairs are of type integer and string, respectively. Write program statements where indicated in the class declaration. // BEGIN simple class definition without size, load factor etc class AddElementsToHashtable { public static void main(String args[]) { // Q. 1 Write a statement to declare a new hashtable called hashy1 // Q.2 Write statements to insert values "one" "two" and "three" // Q.3 Write a statement to print the key, value pairs to the console }
Q: By using JAVA, write a recursive display function, that print a linked list in reverse order.
A: 1) Below is JAVA Program that write a recursive display function, that print a linked list in…
Q: The information storage area shared by multiple data or word processing terminals is called what?
A: first, check all the options one by one a) AI => what is AI? full form of AI is Artificial…
Q: Briefly describe the following cryptocurrency products: stablecoin, nonstablecoin, and smart…
A: Stablecoin: A stablecoin is a cryptocurrency whose value is pegged to a fiat currency or other…
Q: you did not answer question 2
A: A finite state machine is a machine that can, at any point in time, be in a specific state from a…
Q: What exactly is a unit test? Assume a developer writes the source code below to compute the sum of…
A: Introduction: A unit test is a piece of code that tests a section of code. It declares the intended…
Q: You have 1000 bottles of soda, and exactly one is poisoned. You have 10 test strips which can be…
A: A straightforward method is to divide the bottles among the 10 test strips, initially in groups of…
Q: What are the biggest technical and non-technical obstacles to reusing software? Do you frequently…
A: Introduction: Non-technical problems include how a project is managed and funded. Non-technical…
Q: Give examples of the various data connection layer flow control techniques that are frequently used…
A: The Solution is in the Steps Below:- Answer: Flow Management By sending an acknowledgement (ACK) to…
Q: Reproduce the following plot: y-axis 20 18 16 14 12 10 clear, clc Data x-axis 10
A: We need to plot the given graph in Matlab.
Q: I need a PYTHON CODE and SCREENSHOT of the OUTPUT to do facial recognition to determine if an…
A: In this Python project, we'll create a machine learning model that can identify people in a photo.…
Q: How much do differences exist between computer architecture and organization? As an example, please…
A: Computers are electronic devices that do calculations and accept input and output.Actually, there…
Q: after reading, "Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support…
A: AI reads human behavior to develop intelligent machines. is the main learning goal was from this…
Q: What would happen if you made reboot.target (or runlevel 6) the default for your system?
A: On Unix-like systems such as Linux, the current operating system level is referred to as the…
Q: You need to learn more about cloud computing, social media blogging, and other crucial topics.
A: Blogging: Gain a better grasp of social media blogging, cloud computing, and other related areas in…
Q: and each channel is divided into 8 time slots. What is the maximum nu
A: The answer is
Q: Learning about current issues like cloud computing, social networking, and others may be…
A: These days, "the cloud" is being discussed everywhere. The cloud's reach keeps growing as technology…
Q: Question 3: Find the Minimum Spanning Tree for the given graph using Prim's algorithm and write the…
A: The spanning tree is the subgraph of an undirected connected graph. The minimum spanning tree is…
Q: QUESTION 18 Systems that capture knowledge in very specific and limited domain of human expertise…
A: Please check the solution below
Q: If our RDTProcedures were so time-sensitive, why did we need stopwatches?
A: For safe data transfer, sequence numbers inform the receiver whether new or old data is contained in…
Q: Using long division to divide x^3- 4x^2+5x-1 by x - 2 and write the result in the following format…
A: Long division method is a method divide the dividend by divisor to get quotient and remainder.
Q: Wrire detailed explainationof Typical anary tree representation with pseudocode?
A: Introduction: The pseudo code for anary tree representation is provided below. Pseudocode is a fake…
Q: Write code that defines a class named Animal: Add an attribute for the animal name. Add an eat()…
A: Object-Oriented Programming: => Object-oriented programming is a programming paradigm…
Q: e assumptions listed below to answer the questions below. o a network. Packets sent from Host A to…
A: The answer is
Q: is divided into 8 time slots. What is the maximum number of use
A: The answer is
Q: How can the CIA triad of security be applied to an organization and not just a single system? Give…
A: The CIA Triad is a data security model, which is generally well known. It directs an association's…
Q: A GSM system uses 124 channels and each channel is divided into 8 time slots. What is the maximum…
A: Check next step for explanation
Q: 40) A is a word that is part of the Python language and can't be used as a variable name. a. keyword…
A: 39. Composition is a method used in programming to define the connections between different types of…
Q: Task 2: Conditional Statements (Java) ‘Taste Buds’ Ice cream shop provides a menu to customers with…
A: The solution is given below for the above-given question:
Q: which of the followings are weak key attributes, derived attribute, entity rounded, weak entity,…
A: The correct answer for the above mentioned question is given in the following steps for your…
Q: A notice is recorded on VA page 30 if an instruction is denied. Why does this matter? A TLB…
A: Instructions that write to VA page 30 The Translation of Lookaside Buffer (TLB) table is searched…
Q: Some individuals who work in multimedia production have formed their own subculture. Do a quick…
A: The phrase "Google's network" refers to locations where AdWords advertisements appear. They are…
Q: we only need to pick up any one NPC problem and design a polynomial-time algorithm for the problem.…
A: SUMMARY The P inside the P class stands for Polynomial Time. It’s far a group of decision problems…
Q: Python: Write a programs that will take 3 lists: Name Wage Hours Juan 7.50 35 Rae 11.00 41 Ivanna…
A: The python program for the problem is given below with self-explanatory embedded comments: # lists…
Q: How computationally difficult is it to get the complete jackknife estimate of accuracy and variance…
A: The computational difficulty of a complete jackknife is as follows: A more accurate estimation of…
Q: Master not just cloud computing but also social media blogging and other related topics.
A: Improve your understanding of social media blogging, cloud computing, and related topics.
Q: When preparing a meeting agenda, make sure _____. a) to solicit input from those who will attend as…
A: Introduction: With built-in capabilities like chat, screen sharing, and recording, video…
Q: 1. Perform a depth-first search of the Australia digraph given below, starting at Sydney. List the…
A: Since you have posted multiple questions, we will provide the solution only to the first question as…
Q: Question 4: Find the Shortest Path Tree for the given graph using Dijkstra's algorithm and write the…
A: Here in this question we have given a graph and we have asked to apply dijkstra algorithm and find…
Q: create a function that accepts an integer and returns its equivalent letter grade. in c program…
A: Pseudo code:- Take value input from user If value equals to 10 Print "S" Else if value greater…
Q: Assume the range of data in a sequence of data stream is 148,000,000,050 to 1.75. What is the…
A: We need to find the minimum number of binary bits needed to represent the given data range.
Q: Everyone knows how to break the AES and RSA encryption schemes, so why are they still in use?
A: Introduction Data can be encrypted using encryption to ensure that only authorized parties may…
Q: Your program has a list of professors and their office location and office hours per day of the…
A: Dear Student, The source code, implementation and expected output is given below -
Q: (10 points) Filled out the following table regarding C++ STL and corresponding data structures that…
A: Introduction STL class: The Standard Template Library (STL) is a collection of C++ template classes…
Q: Can cloud computing fix all of a company's IT woes?
A: Cloud computing and a greater reliance on Software-as-a-Service (SaaS) programmes can both help…
Q: In a circular array-based implementation of a queue, what is the performance of the dequeue…
A: Dear Student, The answer to your question is given below -
Q: There is a 100-story skyscraper there. If an egg drops from the Nth floor or It will crack above. It…
A: We can see that Egg 2 must perform a linear search (from lowest to highest) between the "breaking…
Q: Implement the following function in which students are represented by int IDs and teams are…
A: Solution: Given, Implement the following function in which students are represented by int IDs…
Q: his program we are going to find the factorial * of a user entered number. * A factorial is a…
A: Dear Student, The complete source code along with code implementation and expected output is given…
Q: 4. Write a regular expression that matches all strings over the alphabet (a, b, c) that contain: i)…
A: Here is DFA of the above problem. See below steps.
Q: PROPOSAL • Find a database design problem. • Write a short description in one or two paragraphs…
A: While creating and handling database design we will encounter many problems so we need to take care…
Step by step
Solved in 3 steps with 2 images
- Computer Science You are required to develop a small chatting application where two or more friends can communicate each other through messages. Create a class Message which has Date d, and message (string). Provide getters/setters, constructors, toString. Create a class Friend having String name, String contact, email and ArrayList of Messages provide getters/setters, constructors, toString addMessage(Message m) method which will add new message to the list. Provide following options to the user using JFrame. Login which will help user login to the application. View Friends (Display List of All Friends) View Messages ( This should display all message of a Friend) Send message (This should ask for friend name and message match the friend name and write that message to the array list).Computer Science Write a program in the Java language that includes: 1. A class for books, taking into account the encapsulation and getter, setter. 2. Entering books by the user using Scanner 3. LinkedList class for: (Adding a new book - Inserting a book- Searching for a book using the ISBN Number - Viewing all books,delete book). 4. Serial number increases automatically with each book that is entered. 5. Printing the names of books is as follows: Serial - ISBN - Name - PubYear - Price - Notes. 6-Design a main menu that includes: • Add Book • Insert Book • Delete Book • Search . Display . Exita Java static method that will take an array of strings as its only parameter. The method will return the first string alphabetically (lowest) in the array.
- JAVAclass: Main.java, Quadratic.java, TestQuadratic.java Create a class called Quadratic for representing a one-variable quadratic expression of the form: ax2 + bx + c a,b and c here are the coefficients. The class should contain the following methods: * A constructor that accepts values for a, b, and c. * public double getA() * public double getB() * public double getC() * public double evaluate (int x) * will return the value of the expression at point x * public double discriminant() - that will return (b2 - 4ac) * public boolean isImaginaryRoots() - roots are imaginary if (b2 - 4ac) < 0 * public boolean isRealRoots() - roots are real if (b2 - 4ac) >= 0 // these methods can only be invoked if the roots are not imaginary * public float firstRoot() * public float secondRoot() * public boolean isPerfectSquare(); // If the first and second roots are equal * Try to override the toString methods * Write a sample main program that will work as shown below. Example output:…The class diagram below shows an Order class that "has a" Customer and zero or more Items. Order class should contain private Customer m_cust; private ArrayList<Item> m_items; public Order(Customer cus t) public void additem(Item i) public String toString() Item class should contain private String m_desc private int m_qty private double m_price public Item(String des c, double price, int qty) public String toString() Customer class should contain private String m_first; private String m_last; public Customer(String first, String last) public String toString() Please create the Order, Customer, and Item classes shown above. I have provided you with a read-only Main class that you can use to test your code. When you have completed the Order, Customer, and Item classes, running the Main program should produce the following output: Order for Smith, Tom Order Items: Greeting Card: 1 at 1.5 Baseball Glove: 1 at 54.0 Notebook: 3 at 2.5 public class Main{ public static void…Java Programming Define a class CollectionBooks. This class has a data member list of type Book using the ArrayList collection. Define method add. This method add the any object to list. Define printAll. This method display all the added object in the list. Define printAll. This method display all the added object in the list. · Define int count. This method returns the number of objects added in the list. Define Book search(Object e). This method returns the object being search if not found return null. Define void remove(int index). This method remove the object in a list Add a main method with the following menu:1 – Add 2 – Count 3 – Print4 – Search 5 – Delete 6 - Exit
- c# programMake a class called Employees, with attributes Name, Gender, Experience, Salary and ID.Make a delegate called EligiblePromo. This delegate takes an employees object as a parameter and returns a boolean value indication whether or not the employee should be promoted.Make a PromoteEmployee() method that takes an arraylist of Employees and delegate of type EligiblePromo as parametersNB: PromoteEmployee() methos loops through each Employees object and passes it to the delegate(25)Java Programming Class Car Attributes (all private): vin: String (5 digits) make: String model: String year: int price: double Methods: Parameterized constructor for initializing a new Car instance Getters for all attributes toString method to display a Car's attributes Executable Class Create an array of at least ten Car objects. Be sure to use many with identical last years and different prices. Create an ArrayList from the array. Shuffle the ArrayList. Sort the ArrayList first by year and then by price. See page 790-791. Using the forEach method and a lambda expression, print all cars sorted as above. Create a LinkedList from the ArrayList. Create an iterator capable of cycling both forward and backward through the LinkedList. Iterate forward through the entire LinkedList but without generating any output. Then iterate backwards through the LinkedList to print the cars data.public class MyGenClass { private T1 name; private T2 stulD; private T3 CGPA; public void setStuData( ){ l parameters name = n; stulD = d: CGPA = g; public void printAsString() { System.out.printin( '): # print all Information as string public static void main(String args||) { Il Create an object stu by parameters String, Integer, Double II Call setStuData() with any values you like Il Call printAsString()
- Java programming - please see attched image for initial instruction before the following below. Write a subclass of VowelSeparator that adds three additional methods and a constructor. The class should be named VowelSeparatorAndCounter. Here are the methods to add: void setString(String s) This method should replace the string stored by the object with s. If the argument is null then the method should throw an IllegalArgumentException. (This is an unchecked exception) int getVowelCount() This method should return the number of vowels in the string.int getNonVowelCount() This method should return the number of characters in the string that are not vowels. Write a static method that accepts an array of VowelSeparatorAndCounter objects and returns the total number of vowels contained in all of them. It should have the following signature: public static int totalVowelCount(VowelSeparatorAndCounter[] a)**Students.java code** // A Java program to demonstrate use of Comparableimport java.util.*; // A class 'Student' that implements Comparableclass Student implements Comparable<Student>{ private String FirstName; private String LastName; private int StudentID; // Used to sort movies by year public int compareTo(Student a) { return this.StudentID - a.StudentID; } // Constructor public Student(String fm, String ls, int id) { this.FirstName = fm; this.LastName = ls; this.StudentID = id; } // Getter methods for accessing private data public String getFirstName() { return FirstName; } public String getLastName() { return LastName; } public int getStudentID() { return StudentID; }} // Driver classclass Students{ public static void main(String[] args) { ArrayList<Student> list = new ArrayList<Student>(); list.add(new Student("Amir", "Alao", 123456)); list.add(new…For the following four classes, choose the correct relationship between each pair. public class Room ( private String m type; private double m area; // "Bedroom", "Dining room", etc. // in square feet public Room (String type, double area) m type type; m area = area; public class Person { private String m name; private int m age; public Person (String name, int age) m name = name; m age = age; public class LivingSSpace ( private String m address; private Room[] m rooms; private Person[] m occupants; private int m countRooms; private int m countoccupants; public LivingSpace (String address, int numRooms, int numoccupants) m address = address; new int [numRooms]; = new int [numOceupants]; m rooms %3D D occupants m countRooms = m countOccupants = 0; public void addRoom (String type, double area)