Ask Question, Ask an Expert


Ask Computer Engineering Expert

prepare an application that accomplishes the following tasks:

1) Read a text file that contains, integers, doubles, alphabet, alphanumeric, and others. The name of the input file should be entered as a command-line argument.

2) All other files should also be entered as command-line arguments. For ex, you may include the following:

data6.txt  integersOut.txt doubleOut.txtalphabeticOut.txt alphanumericOut.txt othersOut.txt

3) Check each token you read and save in the appropriate type of ArrayList.  

4) prepare each type of lists to a separate output text file with appropriate header with 6 values per line separated by tabs or spacing.

5) prepare the average values of integers and doubles to the appropriate files

6) prepare the longest token of the alphabet, alphanumeric, and others to the appropriate file.

7) Extra:

I) Document your classes

II) Include Exception handling

III) Indent code inside classes and methods

IV) Keep the methods short and simple. Break long methods by using supporting methods.

V) Name the driver

VI) Zip your report, and classes in a file named with your last name

VII) Hint: You may use the String matches() method.

Data6.txt sample input file:

CS Math1111 CS1302A  Spring

VSU Valdosta Georgia

123  4567

-2.5   +100.75   -1234.567.3456  --1234

Is it Thanksgiving?  No!!

Integers:              123         4567

Double:                -2.5        +100.75

Alphabet:            CS           Spring   VSU  Valdosta State University Georgia   Is it

Alphanumeric:  math1111            CS1302

Others: -1234.567.3456  --1234   Thankdgiving?  No!!


Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91132

Have any Question? 

Related Questions in Computer Engineering

Define the group of each of the following multicast

Define the group of each of the following multicast addresses (local network control block, internetwork control block, SSM block, Glop block, or administratively scoped block): a. b. c.

Write a gui application for the webbuy company that allows

Write a GUI application for the WebBuy Company that allows a user to compose the three parts of a complete email message: the "To:", "Subject:" and "Message:" text. The "To:", and "Subject:" Text areas should provide a s ...

1 handling forensic evidence in cyber crime situations must

1. Handling forensic evidence in cyber crime situations must be done very carefully. Discuss the many pitfalls that an investigator must be aware of. 2. One of the methods used in extracting computer forensics evidence i ...

1 what is radius what advantage does it have over tacacs2

1. What is RADIUS? What advantage does it have over TACACS? 2. What is a content filter? Where is it placed in the network to gain the best result for the organization? 3. What is a VPN? Why is it becoming more widely us ...

1 describe a physical firewall that is used in buildings

1. Describe a physical firewall that is used in buildings. List the reasons why an organization might need firewalls for physical security controls. 2. What is considered the most serious threat within the realm of physi ...

1 implement the general priority queue adt using the

1. Implement the general Priority Queue ADT using the min-heap implemented as a vector. Instead of having the number of priority levels as an argument of the constructor, specify the maximum capacity of the queue. 2. Com ...

Circle intersection write a program that computes the

Circle Intersection. Write a program that computes the intersection of a circle with a horizontal line and displays the information textually and graphically. Input: Radius of the circle and the y-intercept of the line O ...

1 implement a text-based version of the reversi game using

1. Implement a text-based version of the Reversi game using your game logic ADT from the previous question. 2. Define a game logic ADT, similar to that of the Reversi Game Logic ADT, for the game of checkers.

1 describe the tracking methodology used in hcc and discuss

1. Describe the tracking methodology used in HCC and discuss each method to provide a basis for choosing one of them for a particular application. 2. Describe the tracking methodology used in fuzzy logic control and comp ...

Programming assignmentbackground informationfor this

Programming Assignment Background information For this assignment you need to write an object-oriented console application in the Java programming language which adheres to basic object-oriented programming principles sh ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro