Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

prepare an application that accomplishes the following tasks:

1) Read a text file that contains, integers, doubles, alphabet, alphanumeric, and others. The name of the input file should be entered as a command-line argument.

2) All other files should also be entered as command-line arguments. For ex, you may include the following:

data6.txt  integersOut.txt doubleOut.txtalphabeticOut.txt alphanumericOut.txt othersOut.txt

3) Check each token you read and save in the appropriate type of ArrayList.  

4) prepare each type of lists to a separate output text file with appropriate header with 6 values per line separated by tabs or spacing.

5) prepare the average values of integers and doubles to the appropriate files

6) prepare the longest token of the alphabet, alphanumeric, and others to the appropriate file.

7) Extra:

I) Document your classes

II) Include Exception handling

III) Indent code inside classes and methods

IV) Keep the methods short and simple. Break long methods by using supporting methods.

V) Name the driver TestMyTextFile6.java

VI) Zip your report, and classes in a file named with your last name

VII) Hint: You may use the String matches() method.

Data6.txt sample input file:

CS Math1111 CS1302A  Spring

VSU Valdosta Georgia

123  4567

-2.5   +100.75   -1234.567.3456  --1234

Is it Thanksgiving?  No!!

Integers:              123         4567

Double:                -2.5        +100.75

Alphabet:            CS           Spring   VSU  Valdosta State University Georgia   Is it

Alphanumeric:  math1111            CS1302

Others: -1234.567.3456  --1234   Thankdgiving?  No!!

 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91132

Have any Question? 


Related Questions in Computer Engineering

1 suppose a notifier sends e-mail to the system

1. Suppose a notifier sends e-mail to the system administrator when a successful compromise of that system is detected. What are the drawbacks of this approach? How would you notify the appropriate user? 2. Describe a se ...

1 why is it a good practice to delay naming specific

1. Why is it a good practice to delay naming specific individuals as resources early in the planning process? 2. What is a milestone, and why is it significant to project planning?

1 discuss the limitations of a kdc system in modern

1. Discuss the limitations of a KDC system in modern communication. 2. Discuss the future of PKI. 3. Discuss the differences between digital certificates and digital signatures in authentication. 4. Discuss the role and ...

1 what are the source and destination ip addresses in a

1. What are the source and destination IP addresses in a datagram that carries the ICMPv4 message reported by a router? 2. Explain why the registration request and reply are not directly encapsulated in an IP datagram. W ...

1 your job is to cook 3 cakes as efficiently as possible

1. Your job is to cook 3 cakes as efficiently as possible. Assuming that you only have one oven large enough to hold one cake, one large bowl, one cake pan, and one mixer, come up with a schedule to make three cakes as q ...

1 this chapter contains several recommendations regarding

1. This chapter contains several recommendations regarding variables and constants that make programs easier to read and maintain. Summarize these recommendations. 2. What is a final variable? Can you declare a final var ...

Assume that you have been hired to manage a large domestic

Assume that you have been hired to manage a large domestic and foreign information system. what are some of the issues and solution that you would discuss and plan.

Think about a time when you were required to accomplish a

Think about a time when you were required to accomplish a new or nonroutine task at work that had the potential to cause injury or illness. Discuss how a management of change process could be used to reduce the risks. Wh ...

1 using the web identify some certifications with an

1. Using the Web, identify some certifications with an information security component that were not discussed in this chapter. 2. Search the Web for at least five job postings for a security administrator. What qualifica ...

Implement a votingmachine class that can be used for a

Implement a VotingMachine class that can be used for a simple election. Have methods to clear the machine state, to vote for a Democrat, to vote for a Republican, and to get the tallies for both parties. Extra credit if ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro