Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

prepare an application that accomplishes the following tasks:

1) Read a text file that contains, integers, doubles, alphabet, alphanumeric, and others. The name of the input file should be entered as a command-line argument.

2) All other files should also be entered as command-line arguments. For ex, you may include the following:

data6.txt  integersOut.txt doubleOut.txtalphabeticOut.txt alphanumericOut.txt othersOut.txt

3) Check each token you read and save in the appropriate type of ArrayList.  

4) prepare each type of lists to a separate output text file with appropriate header with 6 values per line separated by tabs or spacing.

5) prepare the average values of integers and doubles to the appropriate files

6) prepare the longest token of the alphabet, alphanumeric, and others to the appropriate file.

7) Extra:

I) Document your classes

II) Include Exception handling

III) Indent code inside classes and methods

IV) Keep the methods short and simple. Break long methods by using supporting methods.

V) Name the driver TestMyTextFile6.java

VI) Zip your report, and classes in a file named with your last name

VII) Hint: You may use the String matches() method.

Data6.txt sample input file:

CS Math1111 CS1302A  Spring

VSU Valdosta Georgia

123  4567

-2.5   +100.75   -1234.567.3456  --1234

Is it Thanksgiving?  No!!

Integers:              123         4567

Double:                -2.5        +100.75

Alphabet:            CS           Spring   VSU  Valdosta State University Georgia   Is it

Alphanumeric:  math1111            CS1302

Others: -1234.567.3456  --1234   Thankdgiving?  No!!

 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91132

Have any Question? 


Related Questions in Computer Engineering

Assignmenttopic the effect of virtual achievements on

Assignment Topic :The Effect of Virtual Achievements on Student Engagement For this task, I need help in developing a narrative about my topic (above), and an outline of the collegiate dissertation process, to submit for ...

1 distinguish between a time-out event and the

1. Distinguish between a time-out event and the three-duplicate-ACKs event. Which one is a stronger sign of congestion in the network? Why? 2. Figure 24.15 shows the client and server in the transition diagram for the co ...

1 how did cgi revolutionize web programming2 what are the

1. How did CGI revolutionize Web programming? 2. What are the differences between client-side and server-side scripting? Is one better than the other? 3. In terms of security, is client-side scripting better than server- ...

In problem how far upstream does the flow from the source

In Problem, how far upstream does the flow from the source reach? Problem :- For the case of a source at the origin with a uniform free stream plot the streamline ψ = 0.

How do you make a module in ms acessattached is a database

How do you make a module in MS Acess Attached is a database with modules that were done for me I need directions , how and why these are built .I am trying to understand VBA and programing better. Attachment:- info262_rm ...

Tracy swallow has a bright idea for avoiding the need to

Tracy Swallow has a bright idea for avoiding the need to store passwords securely. She suggests transforming the user's name with a key-driven cryptographic transformation using a systemwide "password key" and giving the ...

1 differentiate between access and authorization2 what are

1. Differentiate between access and authorization. 2. What are the bene fits of authorization? 3. Why is it dif fi cult to implement distributed authorization? 4. Discuss the merits and demerits of centralized and decent ...

1 assume we add a new protocol to the application layer

1. Assume we add a new protocol to the application layer. What changes do we need to make to other layers? 2. Explain which entity provides service and which one receives service in the client-server paradigm. 3. In the ...

1 add a function to the binarysearchtree class that counts

1. Add a function to the BinarySearchTree class that counts the number of edges in a tree. 2. Rewrite Exercise 1 so that it stores the words from a text file. Display all the words in the file and the number of times the ...

The baypoint group tbg needs your help with a presentation

The Baypoint Group (TBG) needs your help with a presentation for Academic Computing Services (ACS), a nationwide organization that assists colleges and universities with technology issues. ACS needs more information abou ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro