Create java program reads words from a text file, creates a ItemNode instance for each word (use type String), adds each NodeItem instance to a SinglyLinkedList class instance, then traverses this list recursively to display the words in the reverse original (FIFO) order they were added in. For instance, if you added the Strings "one", "two", "three" in that order, code the SinglyLinkedList print() method to display "one two three". You can do this by recursively traversing the list, then displaying each item as you return from each activation record. For instance, data "one two" should be displayed as "two one".
Q: Firewalls can operate on which two OSI model levels, if any?
A: The OSI Model levels: The connections between computer systems are divided into seven abstraction…
Q: The operating system is responsible for ensuring that the blocks are placed in the right sequence…
A: Answer:
Q: What exactly is a peer-to-peer process?
A: Problem Analysis: The problem is based on the basics of networking.
Q: It is said that the set of pages in memory for n frames is alvays a subset of the set of pages in…
A: algorithm: The operating system switches out the page whose next usage is furthest in the future…
Q: What is the difference between creating a computer programme from scratch and utilising a…
A: Introduction: A comparison between multiuser databases and distributed databases is as follows: A…
Q: Specify the architecture of a computed unified device.
A: Introduction: Compute Unified Device Architecture (CUDA) is an acronym for Compute Unified Device…
Q: Providers of assistance and features to assure the integrity of data entry and database management
A: A Database Management System: A database management system (DBMS) is a piece of software that…
Q: This question relates to AES encryption. Element (0, 0) of the state array initially containing the…
A: I have solved your question in handwritten format please check step 2 for that.
Q: xperts are against
A: Denormalization is a system utilized on a formerly standardized database to increment execution. In…
Q: During the systems analysis phase, the goal of issue analysis is to:
A: Introduction: Prototyping is an iterative approach used throughout the analysis phase of the system…
Q: What technological innovations in the fields of software engineering and computing have occurred…
A: Introduction: Software engineering refers to creating computer programs by using engineering…
Q: What goes into an information system's software design?
A: The SDLC (Systems Development Life Cycle) is also known as the application development lifecycle.…
Q: in C language implement a graph coloring method that assigns the minimum color to each vertex so it…
A: Algorithm: The Algorithm to implement the graph colouring method is: Start Initialise the variables…
Q: The 8086 data bus consists of 8, 16, or 32 parallel signal lines * 8, 16, or 32 parallel signal…
A: Below is the answer to above question. I hope this will be helpful for you...
Q: A system analysis may be described in what way?
A: Information Technology: Information System = Information Base(s) + Applications + Interfaces…
Q: What level of confidence do you have in the safety of your data?
A: Start: To guarantee that your information is safe and secure for the rest of your life, follow the…
Q: Which of the following assertions is false: There are two keys used for encryption and decryption in…
A: Introduction: Which of the following assertions is false: There are two keys used for encryption and…
Q: Write a method that calculates and prints both the maximum humidity and maximum temperature values…
A: ANSWER is given below.
Q: Explain why it is important that software products are developed and delivered quickly ?
A: According to the question the software quick delivery always have to take one thing in your mind…
Q: What does the term "risk analysis" relate to in the context of information security?
A: Risk analysis: The uncertainty a of predicted cash flow streams, the variation of portfolio or…
Q: In the programme Finch TV, what is its main objective.? Next-generation sequencing data Sequencing…
A: Next-Generation Sequencing: NGS (next-generation sequencing) is a new technique for determining…
Q: VPN stands for "virtual private network," but what does it mean?
A: VPN is referenced as a virtual private network and it has the primary job of making a private…
Q: What are the OSI's seven levels?
A: OSI's Seven levels: Physical, Data Link, Network, Transport, Session, Presentation, and Application…
Q: Write program to enter and draw, as a CT signal, the following two sequences: A-(3, 6, 9, 12) and…
A: I'm providing the answer of the above question with the program & figure. I hope this will be…
Q: Suppose you have a RISC machine with a 2.7 GHz clock (i.e., the clock ticks 2.7 billion times per…
A: The answer is
Q: Mark Burgess' five systems administration concepts are as follows:
A: System Administration: System administration is the profession of managing one or more systems, such…
Q: Write a row-level trigger that executes before updating a project's location in the project table.…
A: The question is to write the SQL query for the given problem.
Q: 10.7 - What are the values in cells C5, C7, C10, and C13 in the output layer? Con(Layer1 < 2, 0, 1)…
A: The solution for the above-given question is given below:
Q: Explain the distinctions between client-server and peer-to-peer architectures.
A: In a client server network, there are clients and servers. In a peer-to-peer network, there is no…
Q: What hardware methods are required to maximise the efficiency of virtual memory systems? What is the…
A: Introduction: Virtual memory is a memory management approach that allows secondary memory to be used…
Q: What does it mean to own data?
A: Start: The legal respect for and control over the rights of a single piece or set of data pieces is…
Q: In a stack, items are added and deleted only at one end, referred to as the of the stack.
A: Stack:- The Stack is a linear data structure that follows a particular order in which the operations…
Q: Explain how DIGITAL SIGNATURES protect messages from altering but not from listening in on them.…
A: Digital signatures safeguard the message: A digital signature verifies the message's integrity. It…
Q: Which of the following are examples where you would not want to ignore a constant term or a…
A: In Big-O notation, we don't care about constants because Multiplying a function by a constant only…
Q: Do you know how to check whether a system is designed correctly from the start as a systems analyst?
A: Systems Analyst: You may use the methodologies and critical aspects described below to build a…
Q: 150. Write a C# Sharp program to create a new list from a given list of integers removing those…
A: logic:- create a list and insert above elements. Create another list. Iterate previous list and…
Q: Have you received any phishing email? Post a screenshot of the phishing email that you have…
A: Phishing is when attacker send noxious messages intended to fool individuals into succumbing to a…
Q: Isit possible to investigate the five moral components of information systems?
A: The Ethical Considerations Involved With Information Systems. The following moral considerations can…
Q: Give an explanation of the advantages of the Agile method.
A: Introduction: Agile method: The Agile method is a project management approach that divides a project…
Q: There are a total of forty duties required of the systems analyst (40). What does each one mean?
A: Systems analyst: Maintaining software systems, conducting system issue solving, interacting with…
Q: 6. What is the result of executing the following instruction MOV AL,05H AND AL, 03H OR AL,01H NOT AL…
A: Assembly language An assembly language is a sort of low-degree programming language that is…
Q: In every aspect of our life, technology has had a profound impact. Discuss the impact of technology…
A: Technology has completely changed our lives: Discuss the influence of technology on corporate…
Q: Design a floating point ALU for multiplication and division. Also draw the flowcharts. Please do it…
A: MULTIPLICATION Example on decimal values given in scientific notation: 3.0 x 10 ** 1 + 0.5 x 10 ** 2…
Q: Is it true that the star topology is less expensive than the Mesh topology?
A: Introduction: To find out if the star topology is less expensive than the mesh topology.
Q: Please explain the meaning of each term in the following list. There is a Turing test and there is…
A: (a) Artificial Intelligence (AI) is the study of programming computers to behave intelligently in…
Q: When do data processing models make use of structured English? Is there any reason why this…
A: Given: All logic is stated in structured English in terms of sequential structures, decision…
Q: What does it mean to own data?
A: Introduction: Data ownership is the legal respect and control over the rights of a single data item…
Q: ve an explanation of the advantages of the
A: Agile method: The Agile method is an undertaking the board methodology that breaks a venture into…
Q: In order to use wireless LANS, you must meet the following five conditions:
A: Wireless LAN Requirements A wireless LAN must fulfil the same characteristics as any other LAN,…
Q: To reach a host or router, a packet requires two levels of addressing. What are they?
A: Switching of packets: Packet switching is a way of arranging data transferred across a digital…
Create java program
- reads words from a text file,
- creates a ItemNode instance for each word (use type String),
- adds each NodeItem instance to a SinglyLinkedList class instance, then
- traverses this list recursively to display the words in the reverse original (FIFO) order they were added in. For instance, if you added the Strings "one", "two", "three" in that order, code the SinglyLinkedList print() method to display "one two three". You can do this by recursively traversing the list, then displaying each item as you return from each activation record.
For instance, data "one two" should be displayed as "two one".
Step by step
Solved in 2 steps with 2 images
- Add a void instance method replaceAll(E oldE, E newE) in the MyLinkedList class to replace the occurrence of all oldE value with the specified newE value. Implement this method in O(n) time. import java.util.*; public class PExamCh24 { public static void main(String[] args) { new PExamCh24();}public PExamCh24() { // Create a list for strings MyLinkedList<String> list = new MyLinkedList<>(); // Add elements to the list list.add("America"); // Add America to the list System.out.println("(1) " + list); list.add(0, "Japan"); // Add Canada to the beginning of the list System.out.println("(2) " + list); list.add("Russia"); // Add Russia to the end of the list System.out.println("(3) " + list); list.addLast("Japan"); // Add France to the end of the list System.out.println("(4) " + list); list.add(2, "Japan"); // Add Germany to the list at index 2 System.out.println("(5) " + list); list.add(5, "Norway"); // Add Norway to the list…Create a DeleteDuplicatesclass which consists of a deleteDuplicates method which takes the nums list as its parameter. Implement the deleteDuplicates method: Check if the input list is null or empty, and return an empty list if so. Initialize a pointer i to keep track of the unique elements. Use a for loop to Iterate through the list using another pointer j which starts at j=1 and goes until j=nums.size(); If the current element at j is not equal to the previous element at i using !nums.get(i).equals(nums.get(j), increment i and set the current element at j to the new position at i using nums.set(i, nums.get(j)). After the for loop ends, return the sublist from the beginning to i + 1, as this will contain all unique elements. Call the deleteDuplicates method with the sample list as argument: Call the deleteDuplicates method and pass the nums list as argument Store the result in a variable result Print the result to the console. Input: [1, 1, 2, 3, 3,…Java Given main() in the ShoppingList class, define an insertAtEnd() method in the ItemNode class that adds an element to the end of a linked list. DO NOT print the dummy head node. Ex. if the input is: 4 Kale Lettuce Carrots Peanuts where 4 is the number of items to be inserted; Kale, Lettuce, Carrots, Peanuts are the names of the items to be added at the end of the list. The output is: Kale Lettuce Carrots Peanuts Second image is ItemNode
- do the changes in this program according to the given instruction like coaches instead of teachers,sports name instead of courses etc, import java.util.*;class CourseManager{//toatl students each section can holdstatic int max_Students;//mapping of each sections w.r.t to courseHashMap<String,ArrayList<Section> > courses ; //constructor for CourseManagerpublic CourseManager(int max){max_Students = max;courses = new HashMap<>();}//class Person which will be used by teacher and students to inherit its propertiesstatic class Person{String name;int age;public Person(String name , int age ){this.name = name;this.age = age;}}//teacher classstatic class Teacher extends Person{int id;public Teacher(int id , String name , int age ){super(name , age );this.id = id;}}//student classstatic class Student extends Person{int id;public Student(int id , String name , int age ){super(name , age );this.id = id;}}//section classstatic class Section{int section;String course ;Teacher…Implement a Doubly linked list to store a set of Integer numbers (no duplicate) • Instance variable• Constructor• Accessor and Update methods2. Define DLinkedList Classa. Instance Variables: # Node header # Node trailer # int sizeb. Constructorc. Methods # int getSize() //Return the number of nodes of the list. # int getSize() //Return the number of elements of the list. # boolean isEmpty() //Return true if the list is empty, and false otherwise. # E getFirst() //Return the value of the first node of the list. # E getLast()/ /Return the value of the Last node of the list. # addFirst(E e) //Add a new node to the front of the list. # addLast(E e) //Add a new node to the end of the list. # Node remove(Node n) //remove a node which has the reference n from the list # Node removeFirst() //Remove the first node of the list, and return the removed node or null if failed. # Node removeLast() //Remove the last node of the list, and return the…Implement a class “LinkedList” which has two private data members head: A pointer to the Node class length: length of the linked listImplement the following private method: 1. bool InsertHead(int data); // Use InsertAt FunctionInsert at the start of the linked list. Return true2. bool InsertEnd(int data); // Use InsertAt FunctionInsert at the end of the linked list. Return true3. bool RemoveAt(int index);Remove and delete the node at position “index”. Return true if successful, otherwise, false. this in c++
- Develop a class ResizingArrayQueueOfStrings that implements the queueabstraction with a fixed-size array, and then extend your implementation to use arrayresizing to remove the size restriction.Develop a class ResizingArrayQueueOfStrings that implements the queueabstraction with a fixed-size array, and then extend your implementation to use arrayresizing to remove the size restriction.Implement a simple linked list in Python (Write source code and show output) with basic linked list operations like: (a) create a sequence of nodes and construct a linear linked list. (b) insert a new node in the linked list. (b) delete a particular node in the linked list. (c) modify the linear linked list into a circular linked list. Use this template: class Node:def __init__(self, val=None):self.val = valself.next = Noneclass LinkedList:"""TODO: Remove the "pass" statements and implement each methodAdd any methods if necessaryDON'T use a builtin list to keep all your nodes."""def __init__(self):self.head = None # The head of your list, don't change its name. It shouldbe "None" when the list is empty.def append(self, num): # append num to the tail of the listpassdef insert(self, index, num): # insert num into the given indexpassdef delete(self, index): # remove the node at the given index and return the deleted value as an integerpassdef circularize(self): # Make your list circular.…Implement a program that creates an unsorted list by using a linked list implemented by yourself. NOT allowed to use LinkedList class or any other classes that offers list functions. It is REQUIRED to use an ItemType class and a NodeType struct to solve this. Use C++! The “data.txt” file has three lines of data 100, 110, 120, 130, 140, 150, 160 100, 130, 160 1@0, 2@3, 3@END You need to create an empty unsorted list add the numbers from the first line to list using putItem() function. Then print all the current keys to command line in one line using printAll(). delete the numbers given by the second line in the list by using deleteItem() function. Then print all the current keys to command line in one line using printAll().. putItem () the numbers in the third line of the data file to the corresponding location in The list. For example, 1@0 means adding number 1 at position 0 of the list. Then print all the current keys to command line in one line…
- Implement a member method for the List ADT called removeDuplicates(). The method removes every duplicate from the list such that there is only ONE copy of each element in the list. The method also returns the number of copies it removed. For example, if L = {Joe, Bob, Joe, Ned, Bob, Ron, Ron}, a call to L.removeDuplicates modifies the list such that L = {Joe, Bob, Ned, Ron} and returns 3. import java.util.Iterator;import java.util.NoSuchElementException; public class Mock1ListWrapper { public static interface List<E> extends Iterable<E> { public int size(); public boolean isEmpty(); public boolean isMember(E e); public int firstIndexOf(E e); public int lastIndexOf(E e); public void add(E e); public void add(E e, int position); public E get(int position); public E remove(int position); public E replace(int position, E newElement); public void clear(); public Object[] toArray(); public int removeDuplicates(); } @SuppressWarnings("unchecked") public static…using arrays or Arraylist in Java language Write the method filterBySize().* * Given an ArrayList of String, return a new list where only * strings of the given length are retained.* * Examples:* filterBySize(["a", "bb", "b", "ccc"], 1) returns ["a", "b"]* filterBySize(["a", "bb", "b", "ccc"], 3) returns ["ccc"]* filterBySize(["a", "bb", "b", "ccc"], 4) returns []* * @param list the list of Strings to process.* @param n the size of words to retain.* @return a new list of words with the indicated size retained.Open class WordList from the package ceLinked. Add a foreach loop at the end of the main method to print all the list elements side by side, separated by single spaces. Include a brief description so the output shows that these are the list elements printed with the foreach loop. Notice the squiggly line. It won't compile because foreach loops can only iterate over arrays or instances of java.lang.Iterable. Implement the interface Iterable<String> for class WordList.When you are done, the foreach loop should compile. Run it and verify that all elements are listed in the expected order.If you followed the instructions posted in CE ArrayList | LinkedList the combined output should look like: size: 0The list is empty. TODO 2: prepend 'ape'list: ape ant bat cow dog TODO 2: prepend 'auk'list: auk ape ant bat cow dog size: 6 TODO 3: indexOfIndex of dog: 5Index of auk: 0Index of yak: -1 TODO 4: containscow is included in the list.yak is not included in the list. list: auk ape ant bat…