Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Software Engineering Expert

At this point, you want to put together the work that has been completed to deliver a working program for alpha testing. You will combine the elements you have written to this point and deliver a working solution. You will read the contributor information from a file similar to this table below; it is a comma delimited (CSV) file.



Jeff

Sherman

USA

9035551212

100

50

John

Dallas

USA

9035552121

200

51

Bob

Atlanta

USA

9035551111

300

52

Bill

Chicago

USA

9035553333

400

53

Sam

Phoenix

USA

9035557777

500

54

  • First Name in first column
  • Last Name in second column
  • Country in third column
  • Phone # in fourth column
  • Donation amount in fifth column
  • Contributor ID in sixth column

As each record is read, create a sorted Linked list of the contributors using the Insertion sort method. You also need to maintain your table, with one modification. You need to add an object to the Hash Collision Object that is a pointer to the data in the Linked list. In addition, you need to implement Contributor search functionality based on a Contributor Name. Your design should include the following:

High Level Implementation Instructions:

  • Sorted Linked list
  • Sorted using Insertion sort
  • Hash bucket of size 5 with a collision solution using a linked list (no need to order)
  • A Search Algorithm based on ID and Contributor Name.
    • The Contributor Name Algorithm needs to be implemented using the Sequential Search

Each contributor will have the following information:

  • Name: String; //the name of the contributor
  • City: String; //the city in which the contributor lives
  • Country: String; //the country in which the contributor lives
  • Phone: String; //the phone number for the contributor
  • Contribution: Double; //the amount of the contribution given by the contributor to the zoo
  • ID: Integer; //identifier key for future needs

Contributor functions/methods:

  • Input constructor: //to accept a string for the name and additional information for each contributor (this should call the Add constructor to implement the sorted list)
  • Print constructor: //to print out the contributor data
  • Print All constructor: //to print the entire list of contributor names
  • Add constructor: //to traverse the Linked list and find the proper location for adding the instance
  • Search constructor: //the Search algorithm to implement is Sequential Search

Each hash bucket collision item will have the following information:

  • ID: Integer; //identifier key for future needs
  • Contributor Address: Pointer; //a pointer to the address of the contributor instance in the sorted linked list

Hash bucket functions/methods:

  • Input constructor: //to accept a string for the name and additional information for each contributor (you will only need the ID portion of the input data)
  • Hash Function constructor: //Hint: You only have 5 Hash buckets so the function can be very a simple calculation
  • Pop constructor
  • Push constructor
  • Print constructor: //to show the information of the contributor based on a given ID

Software Engineering, Computer Science

  • Category:- Software Engineering
  • Reference No.:- M91380875
  • Price:- $50

Guranteed 36 Hours Delivery, In Price:- $50

Have any Question?


Related Questions in Software Engineering

Write review on this article with apa formatgovernment

Write review on this article with APA format. Government surveillance is a major issue in the United States and globally. Surveillance refers to any collection and processing of personal data, whether, identifiable or no ...

Instructionsprivacy-preserving data miningdata mining

INSTRUCTIONS PRIVACY-PRESERVING DATA MINING Data mining technology can be exploited to reveal sensitive information from the original data. Thus it is important to preservethe privacy of the parties that the data refer t ...

Overviewyou are required to modify and logically extend

Overview You are required to modify and logically extend the functionality of a provided code base to implement a game. This requires you to modify the code base as well as create documentation and implement various user ...

In this assignment you will answer the following review

In this assignment, you will answer the following review questions from the reading materials of the module/week. 1. "What are the key components of a typical P2P application? Describe their functions." 2. "What are the ...

Research projectin the course we have covered various

RESEARCH PROJECT In the course, we have covered various security and privacy issues that arise in the cyberspace field. We have learned to identify these risks and have discussed the current approaches and developments f ...

Address the following integrating biblical perspectives

Address the following, integrating biblical perspectives where appropriate: Define a hate crime and describe how white supremacist groups use the Internet to spread their message of hate. Explain why hate crime legislati ...

In this assignment you will answer the following questions

In this assignment, you will answer the following questions related to Android platform and Android security design. 1. Describe Android architecture in detail by explaining the four conceptual layers. 2. Describe Androi ...

Write reply to this article with references with apa

Write reply to this article with references with APA bibliography. Hate Crimes Over the past couple of years, hate crimes have been on the rise in America's largest cities. Studies show that there were sharp spikes in th ...

Assignment part 1objectives to learn to identify the

Assignment Part 1 Objectives: To learn to identify the relevant use cases for a given application, describe the use cases and develop an object-oriented domain model. Problem Statement - Standing Orders Management System ...

Write review on this article with apa formatalthough

Write review on this article with APA format. Although computer crimes are being seen in our society more and more each day, it is still difficult to prosecute people who commit these crimes mainly because everything is ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As