Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

prepare an application that accomplishes the following tasks:

1) Read a text file that contains, integers, doubles, alphabet, alphanumeric, and others. The name of the input file should be entered as a command-line argument.

2) All other files should also be entered as command-line arguments. For ex, you may include the following:

data6.txt  integersOut.txt doubleOut.txtalphabeticOut.txt alphanumericOut.txt othersOut.txt

3) Check each token you read and save in the appropriate type of ArrayList.  

4) prepare each type of lists to a separate output text file with appropriate header with 6 values per line separated by tabs or spacing.

5) prepare the average values of integers and doubles to the appropriate files

6) prepare the longest token of the alphabet, alphanumeric, and others to the appropriate file.

7) Extra:

I) Document your classes

II) Include Exception handling

III) Indent code inside classes and methods

IV) Keep the methods short and simple. Break long methods by using supporting methods.

V) Name the driver TestMyTextFile6.java

VI) Zip your report, and classes in a file named with your last name

VII) Hint: You may use the String matches() method.

Data6.txt sample input file:

CS Math1111 CS1302A  Spring

VSU Valdosta Georgia

123  4567

-2.5   +100.75   -1234.567.3456  --1234

Is it Thanksgiving?  No!!

Integers:              123         4567

Double:                -2.5        +100.75

Alphabet:            CS           Spring   VSU  Valdosta State University Georgia   Is it

Alphanumeric:  math1111            CS1302

Others: -1234.567.3456  --1234   Thankdgiving?  No!!

 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91132

Have any Question? 


Related Questions in Computer Engineering

Assume that you have a cache designed as specified in the

Assume that you have a cache designed as specified in the last problem. Explain how the function of a TLB can be integrated into this cache; in other words, explain how to use just this cache, with no TLB, to achieve the ...

1 why is it important to explore traffic behavior when

1. Why is it important to explore traffic behavior when designing a network? What problems could arise if you don't understand traffic behavior when you build a new network or upgrade a network? 2. Do some research regar ...

The rsa encryption algorithm is based on the fact that it

The RSA encryption algorithm is based on the fact that it is hard to factor a large number (250+ digits). If you were able to factor a large number quickly how would you be able to find the encryption ( e ) and decryptio ...

Implement the first text-formatting design proposed try to

Implement the first text-formatting design proposed. Try to avoid the need for shifting word fragments after the current line is printed.

Your task is to design a general program for managing board

Your task is to design a general program for managing board games with two players. Your program should be flexible enough to handle games such as tic-tac-toe, chess, or the Game of Nim of Project 6.2. Design an interfac ...

1 find the greatest common divisor of 234 and 1242 find r

1. Find the greatest common divisor of 234 and 124. 2: Find r and s such that 8,092r + 1,111s = 1. 3: Find a counterexample to the claim that if the greatest common divisor of a and b is not 1, there exists a unique r an ...

Writenbspa java program non-gui preferred to demonstrate

Write  a Java program (non-GUI preferred) to demonstrate the use of JDBC. The program should allow a user to do the following: Write a list of animal and its characteristics to a database using JDBC Display the character ...

Compute the first two output bytes of the lfsr of degree 8

Compute the first two output bytes of the LFSR of degree 8 and the feedback polynomial from Table 2.3 where the initialization vector has the value FF in hexadecimal notation.

Study the power of the mobile cloud through cloud mobile

Study the Power of the Mobile Cloud Through Cloud Mobile Hybrid Application Development Rapid advances and marriage between computing and telecommunication technologies have created an ubiquitous landscape of powerful sm ...

In a typical vector adt the size of the underlying array

In a typical Vector ADT, the size of the underlying array decreases after a sufficient number of items have been removed. Devise a strategy for decreasing the size of the array as items are removed. Modify your implement ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen