java Singly linked list 1. Create a class called Citizen with the following attributes/variables: a. String citizenID b. String citizenName c. String citizenSurname d. String citizenCellNumber e. int registrationDay f. int registrationMonth
Q: Try to find the root mean speed from the velocities of ten particles(in m/s) which are entered by th...
A: Use a loop to iterate for 10 times and keep on accepting the input number and add its square to the ...
Q: Write a program to print following data
A: All the programs are written in Python: Program 1: Print the requirement print(''' -----------...
Q: For a certain processor, a Read request takes 80 nano seconds on a cache miss and 10 nano seconds on...
A: The answer is
Q: Lets say we are creating a python game. A word is displayed gets displayed on the screen. The playe...
A: - We need to know what datatype we should use for the word game problem.
Q: Write a Program in Java to find the value of universal gas constant at STP.
A: Your Java program is here with an output. Algorithm: 1. Start 2. Read the value of Volume, Pressur...
Q: The following incomplete code snippet: names ["Alice","Bob","Charlie"] scores = [15,5,10] winrates [...
A: Please refer to the following steps for the complete solution to the problem above.
Q: Lab Manual 223CCS-3 Advanced Object Oriented Programming Laboratory 3 GUI (Graphical User Interface)...
A:
Q: Invoices, MS Excel spreadsheets, printed documents and handwritten notes are examples of what? R...
A: To find "Invoices, MS Excel spreadsheets, printed documents and handwritten notes are examples of --...
Q: In what ways does a binary tree resemble a linked list?
A: Introduction: A tree has branches—-each node refers to one or more descendant nodes. A binary tree i...
Q: For the "internet" below with six websites, (a) Construct the ranking matrix for the system. (b) Fin...
A: In questions with many parts, we must answer the first The above formula can be used to rank matr...
Q: What is the reason that DMA requires cycle stealing?
A: We need to discuss, why DMA requires cycle stealing?
Q: Consider this data: "0 - 1" "1 - 1" "1 - 1" "1 - 0" "0 - 0" "1 - 0" "1 - 1" "1 - 1" "1 - 0" "0 - 1" ...
A: We need to form 4 columns out of X: A,B,C,D in R language.
Q: The Google search engine has a capability that allows web sites to show Google adverts. The advertis...
A: Google ads are nothing more than adverts on web pages; if a user visits a website that has Google ad...
Q: Create a program that calculates the interest on a loan. Console Interest Calculator Enter loan amou...
A: Algorithm: Start Create NumberFormat objects for the locale US to represent currency $ where one ob...
Q: Concept of SD-WAN?
A: Describe Concept of SD-WAN.
Q: True or False? {n²,n*,2", log n, ..} Big O Big Omega Big Theta 102 + 3000n + 10 21 log n 500 log n +...
A: We are going to find out the value of Big O, Big Omega and Big Theta for the given functions.
Q: How many memory accesses must a page fault occur if the memory access time is 200 nanoseconds and th...
A: Memory access time = 200 nano sec page-fault service time = 8 msec Effective Access Time (EAT)EAT is...
Q: Which of these connection technologies are viable for general-purpose networking of more than two ho...
A: The answer is
Q: 1001 1101 1000 1110 0011 1010 1001 0010 1000 0001 1101
A: Solution :- Step 1 Suppose we take the first two codewords 0000000 and 0001101 and perform the XOR o...
Q: Hello, can you answer multiple questions? 1. Which of the following is NOT an attribute that is ...
A: Following are the solutions to the given problem statements.
Q: te an EBNF description for a Java class definition header statement te a BNF description of the Bool...
A: 1.A Java class definition header statement <class_head> ® {<modifier>} class <id>...
Q: Despite the fact that Java is referred to as an interpreted language, it is actually a compiled lang...
A: Java Java is a compiler as well as an interpreted language. It compiles directly to machine code tha...
Q: What is regression testing?
A: Introduction: In this instance, regression refers to a previously fixed software bug that has return...
Q: The process control block (PCB) is a critical part of process management. Discuss the relevance of t...
A: Role of PCB in management of processes and resources is mentioned below,
Q: ntrusion protection systems and create a matrix comparing them, include comparisons of features, cos...
A: 1- VPN is one of the strong and populour tool which is being used across the globe in order to make ...
Q: Write a C++ program to calculate a rectangle's area. The program consists of the following function:...
A: It ask user to enter length and width Then it return the area of rectangle along with length and wi...
Q: Define the concept of temporal locality.
A: Locality: Programs frequently employ data and instructions with similar or identical addresses to th...
Q: Following the development and testing of individual software modules, they must be combined and test...
A: Introduction: Software development refers to computer programming, which is the process of writing a...
Q: java: // Class to do MergeSort and QuickSort on int arrays and test them public class MergeQuickS...
A:
Q: After completing this course successfully, you have been tasked with configuring a local area networ...
A: LAN: A local area network (LAN) is a group of computers and peripheral devices that share a common c...
Q: How are centralized and parallel/distributed databases different?
A: Distributed database uses concept of parallelism that stores database files at multiple locations. C...
Q: cuss the social and ethical aspects of using and deploying information technology.
A: The social and ethical aspects of using and deploying information technology:- Issues of social an...
Q: Explain the three formats of MIPS instructions and show how they are different each other.
A: Explain the three formats of MIPS instructions and show how they are different each other.
Q: One of the difficulties with computer security is that it is sometimes an afterthought, inserted int...
A: Introduction: Potential security feature assaults must be evaluated. Procedures employed to deliver ...
Q: What are the different sorts of programmes that come with operating systems? Give three to four exam...
A: Following are the sorts of programmes that come with operating systems Batch Operating System Mobil...
Q: What are some things to think about while creating a mobile app?
A: Several factors to consider when creating an application are as follows:
Q: Write code that outputs variable numMonths as follows. End with a newline. Ex: If the input is: 3 ...
A: Write code that outputs variable numMonths as follows. End with a newline. Ex: If the input is: 3 th...
Q: Encode the following ARM assembly instruction to ARM machine language code. CMNLT r0,#0×FF Ox
A: ARM assembly to ARM machine language code
Q: What is a downgrade attack, and how can you fight back against it?
A: Introduction: Downgrade attack: It's a type of computer system or communication protocol cryptograph...
Q: Please do it with regular expression. Don't use loops please. Do fast, I have no time left Write a j...
A: Required:- Please do it with regular expression. Don't use loops, please. Do fast, I have no time l...
Q: The formal approach to determining the big-O complexity of an algorithm is to set up recurrence rela...
A: - We need to choose for the recurrence of linear search and other time complexity in employee id sea...
Q: Define a problem with input, output, and Operator Overloading. If no output explain the reason why a...
A: cpp code:- /* adds two complex numbers *///overload the binary operator + #include <iostream&g...
Q: Analyze the way CPU registers are implemented in terms of logic gates
A: Introduction: They are the logic gates of digital electronics. Logic gates are often employed when c...
Q: Consider baking a cake to be the same as running three loops on a computer in parallel. Find and exp...
A: Introduction: A loop is a programming structure in computer science that repeats a sequence of instr...
Q: Mention the key features of Go-Bank-N and Selective Repeat.
A: Introduction: Sliding window methods include Go-Back-N and Selective Repeat. The transmitter window ...
Q: Consider the following circuit: P AND NOT S AND OR R (a) Find the output from the boolean circuit if...
A: First we will find the final expression S, then we will answer each part. (P*Q)' * (Q+R)=S ...... eq...
Q: Use a one-dimensional array to solve the following problem. Read in 20 numbers, each of which is bet...
A: The answer is
Q: Why will we study any business model, and how will our business solution provide the organisation wi...
A: Introduction: Every day, fresh data sources become available. This may be a good thing for some of u...
Q: What type of IPv6 address do you need to get on the Internet? a. Global unicast address b. Anycast ...
A: To get on the internet, you need an address. That address should be unique and be your's only. This ...
Q: Explain why each of the three design objectives for relational databases is beneficial.
A: Let's see the solution in the next steps
java Singly linked list
1. Create a class called Citizen with the following attributes/variables:
a. String citizenID
b. String citizenName
c. String citizenSurname
d. String citizenCellNumber
e. int registrationDay
f. int registrationMonth
g. int registrationYear
using the code template below
Step by step
Solved in 3 steps with 1 images
- Imagine you are working on an app that monitors a user's internet behavior. Provide an example of a collection class that may be used to get data from a recently visited web page.1.Question CREATE ANOTHER CLASS FOR TEAM The CODE FOR POKEMON: package com.company;import java.io.FileOutputStream;import java.io.IOException;import java.io.ObjectOutputStream;import java.io.Serializable;import java.util .*;public class Pokemaon implements Comparable, Serializable, Fightable {String name;int level;int health;int attack;String type;//2 Constructors - 1 Default, 1 sets all variablespublic Pokemaon(String name, int level, int health, int attack, String type) {super();this.name = name;this.level = level;this.health = health;this.attack = attack;this.type = type;}public String getName() {return name;}public void setName(String name) {this.name = name;}public int getLevel() {return level;}public void setLevel(int level) {this.level = level;}public int getHealth() {return health;}public void setHealth(int health) {this.health = health;}public int getAttack() {return attack;}public void setAttack(int attack) {this.attack = attack;}public String getType() {return…import java.util.Scanner;class StackNode {public StackNode(double data, StackNode underneath) {this.data = data;this.underneath = underneath;}public StackNode underneath;public double data;}class RPN {public void into(double new_data) {StackNode new_node = new StackNode(new_data, top);top = new_node;}public double outof( ) {double top_data = top.data;top = top.underneath;return top_data;}public RPN(String command) {top = null;this.command = command;}public double get( ) {double a, b;int j;for(int i = 0; i < command.length( ); i++) {// if it's a digitif(Character.isDigit(command.charAt(i))) {double number;// get a string of the numberString temp = "";for(j = 0; (j < 100) && (Character.isDigit(command.charAt(i)) || (command.charAt(i) == '.')); j++, i++) {temp = temp + String.valueOf(command.charAt(i));}// convert to double and add to the stacknumber = Double.parseDouble(temp);into(number);} else if(command.charAt(i) == '+') {b = outof( );a = outof( );into(a + b);} else…
- import java.io.BufferedReader; import java.io.InputStreamReader; import java.net.HttpURLConnection; import java.net.URL; import java.net.URLEncoder; import org.json.JSONObject; public class Myclass { public static void main(String[] args) throws Exception { try { URL url = new URL("https://parseapi.back4app.com/classes/City?count=1&limit=10&keys=name,population"); HttpURLConnection urlConnection = (HttpURLConnection)url.openConnection(); urlConnection.setRequestProperty("X-Parse-Application-Id", "mxsebv4KoWIGkRntXwyzg6c6DhKWQuit8Ry9sHja"); // This is the fake app's application id urlConnection.setRequestProperty("X-Parse-Master-Key", "TpO0j3lG2PmEVMXlKYQACoOXKQrL3lwM0HwR9dbH"); // This is the fake app's readonly master key try { BufferedReader reader = new BufferedReader(new InputStreamReader(urlConnection.getInputStream())); StringBuilder stringBuilder = new…java Singly linked list need help with numbers 5 only 1 to 5 is done but they connected 5 is in the picture 1. Create a class called Citizen with the following attributes/variables:a. String citizenIDb. String citizenNamec. String citizenSurnamed. String citizenCellNumbere. int registrationDayf. int registrationMonthg. int registrationYear2. Create a class called Node with the following attributes/variables:a. Citizen citizen b. Node nextNode 3. Create a class called CitizenRegister with the following attributes/variables:a. Node headNodeb. int totalRegisteredCitizens4. Add and complete the following methods in CitizenRegister:a. head()i. Returns the first citizen object in the linked listb. tail()i. Returns the last citizen object in the linked listc. size()i. Returns the totalRegisteredCitizend. isEmpty()i. Returns the boolean of whether the linked list is empty or note. addCitizenAtHead(Node newNode)i. Adds a new node object containing the citizen object information before the…1 Create a class called Citizen with the following attributes/variables:a. String citizenIDb. String citizenNamec. String citizenSurnamed. String citizenCellNumbere. int registrationDayf. int registrationMonthg. int registrationYear- Create a class called Node with the following attributes/variables:a. Citizen citizenb. Node nextNode- Create a class called CitizenRegister with the following attributes/variables:a. Node headNodeb. int totalRegisteredCitizens- Add and complete the following methods in CitizenRegister:a. head()i. Returns the first citizen object in the linked listb. tail()i. Returns the last citizen object in the linked listc. size()i. Returns the totalRegisteredCitizend. isEmpty()i. Returns the boolean of whether the linked list is empty or note. addCitizenAtHead(Node newNode)i. Adds a new node object containing the citizen object informationbefore the headNodef. addCitizenAtTail(Node newNode)i. Adds a new node object containing the citizen object information atthe end…
- Can i please have help with this question in java, please . Java is the language java kind regars Create a class called Citizen with the following attributes/variables:String citizenID ,String citizenName ,String citizenSurname ,String citizenCellNumber ,int registrationDay ,int registrationMonth ,int registrationYear Create a class called Node with the following attributes/variables:Citizen citizen , Node nextNode Create a class called CitizenRegister with the following attributes/variables:a. Node headNodeb. int totalRegisteredCitizens Add and complete the following methods in CitizenRegister: a. head() i. Returns the first citizen object in the linked listb. tail() i. Returns the last citizen object in the linked listc. size() i. Returns the totalRegisteredCitizend. isEmpty() i. Returns the boolean of whether the linked list is empty or note. addCitizenAtHead(Node newNode) i. Adds a new node object containing the citizen object information before the…Question 5 (Web crawler). Write a program WebCrawler.java that uses breadth-first search to crawl the web digraph, starting from a given web page. Do not explicitly build the web digraph. Please provide a valid java program Full explain this question and text typing work only We should answer our question within 2 hours takes more time then we will reduce Rating Dont ignore this lineIn order to provide a user interface, we need to provide a layer on top of the ParkingOffice class that will accept commands and send them on. This layer will be the ParkingService. Based on the diagram you should create a parking service class ParkingOffice.java public class ParkingOffice {String name;String address;String phone;String parkingOfficeName;List<Customer> customers;List<Car> cars;List<ParkingLot> lots;List<ParkingCharge> charges; public ParkingOffice(){customers = new ArrayList<>();cars = new ArrayList<>();lots = new ArrayList<>();charges = new ArrayList<>();}public Customer register() {Customer cust = new Customer(name,address,phone);customers.add(cust);return cust;}public Car register(Customer c,String licence, CarType t) {Car car = new Car(c,licence,t);cars.add(car);return car;}public Customer getCustomer(String name) {for(Customer cust : customers)if(cust.getName().equals(name))return cust;return null;}public double…
- CAN AN EXPERT HELP FIX MY CODE here is my code import java.io.BufferedReader; import java.io.File; import java.io.FileReader; import java.io.IOException; import java.io.InputStreamReader; import java.util.ArrayList; import java.util.Collections; import java.util.List; public class User implements Comparable<User> { private String username; private String password; public User(String username, String password) { this.username = username; this.password = password; } @Override public int compareTo(User other) { int cmp = this.password.length() - other.password.length(); if (cmp != 0) { return cmp; } cmp = this.password.toLowerCase().compareTo(other.password.toLowerCase()); if (cmp != 0) { return cmp; } return this.username.toLowerCase().compareTo(other.username.toLowerCase()); } @Override public String toString() { return String.format("%20s%20s", password, username); } public static void main(String args[]){ List<User> l= new ArrayList<>(); try{ BufferedReader br= new…CAN AN EXPERT HELP FIX MY CODE here is my code import java.io.BufferedReader; import java.io.File; import java.io.FileReader; import java.io.IOException; import java.io.InputStreamReader; import java.util.ArrayList; import java.util.Collections; import java.util.List; public class User implements Comparable<User> { private String username; private String password; public User(String username, String password) { this.username = username; this.password = password; } @Override public int compareTo(User other) { int cmp = this.password.length() - other.password.length(); if (cmp != 0) { return cmp; } cmp = this.password.toLowerCase().compareTo(other.password.toLowerCase()); if (cmp != 0) { return cmp; } return this.username.toLowerCase().compareTo(other.username.toLowerCase()); } @Override public String toString() { return String.format("%20s%20s", password, username); } public static void main(String args[]){ List<User> l= new ArrayList<>(); try{ BufferedReader br= new…CAN AN EXPERT HELP FIX MY CODE here is my code import java.io.BufferedReader; import java.io.File; import java.io.FileReader; import java.io.IOException; import java.io.InputStreamReader; import java.util.ArrayList; import java.util.Collections; import java.util.List; public class User implements Comparable<User> { private String username; private String password; public User(String username, String password) { this.username = username; this.password = password; } @Override public int compareTo(User other) { int cmp = this.password.length() - other.password.length(); if (cmp != 0) { return cmp; } cmp = this.password.toLowerCase().compareTo(other.password.toLowerCase()); if (cmp != 0) { return cmp; } return this.username.toLowerCase().compareTo(other.username.toLowerCase()); } @Override public String toString() { return String.format("%20s%20s", password, username); } public static void main(String args[]){ List<User> l= new ArrayList<>(); try{ BufferedReader br= new…