Use OnlineGDB while explaining this please with notes// The following exercise assesses your ability to do the
Fantastic news! We've Found the answer you've been seeking!
Question:
Use OnlineGDB while explaining this please with notes//
Transcribed Image Text:
The following exercise assesses your ability to do the following: Use and manipulate String objects in a programming solution. 1. Review the rubric for this assignment before beginning work. Be sure you are familiar with the criteria for successful completion. The rubric link can be found in the digital classroom under the assignment. 2. Write a program that reads text from a file called input.in. For each word in the file, output the original word and its encrypted equivalent in all-caps. The output should be in a tabular format, as shown below. The output should be written to a file called results.out. Here are the rules for our encryption algorithm: a. If a word has n letters, where n is an even number, move the first n/2 letters to the end of the word. For example, "before" becomes *orebef b. If a word has n letters, where n is an odd number, move the first (n+1)/2 letters to the end of the word. For example: 'kitchen' becomes 'henkitc Here is a sample run of the program for the following input file. Your program should work with any file, not just the sample shown here. Lagava - mputz.txt 1Life is either a daring adventure or nothing at all Program output EX3 [Java Application] C:\Prog Life FELI is SI either HEREIT a A daring INGDAR adventure TUREADVEN or RO nothing at all INGNOTH TA LAL 3. Make a video of your project. In your video, discuss your code and run your program. Your video should not exceed 4 minutes. The following exercise assesses your ability to do the following: Use and manipulate String objects in a programming solution. 1. Review the rubric for this assignment before beginning work. Be sure you are familiar with the criteria for successful completion. The rubric link can be found in the digital classroom under the assignment. 2. Write a program that reads text from a file called input.in. For each word in the file, output the original word and its encrypted equivalent in all-caps. The output should be in a tabular format, as shown below. The output should be written to a file called results.out. Here are the rules for our encryption algorithm: a. If a word has n letters, where n is an even number, move the first n/2 letters to the end of the word. For example, "before" becomes *orebef b. If a word has n letters, where n is an odd number, move the first (n+1)/2 letters to the end of the word. For example: 'kitchen' becomes 'henkitc Here is a sample run of the program for the following input file. Your program should work with any file, not just the sample shown here. Lagava - mputz.txt 1Life is either a daring adventure or nothing at all Program output EX3 [Java Application] C:\Prog Life FELI is SI either HEREIT a A daring INGDAR adventure TUREADVEN or RO nothing at all INGNOTH TA LAL 3. Make a video of your project. In your video, discuss your code and run your program. Your video should not exceed 4 minutes.
Expert Answer:
Related Book For
Contemporary Human Resource Management Text And Cases
ISBN: 9780273757825
4th Edition
Authors: Tom Redman, Adrian Wilkinson
Posted Date:
Students also viewed these programming questions
-
An algorithm has been written in pseudocode to input some numbers. It only outputs any numbers that are greater than or equal to 100. The number 999 is not output and stops the algorithm. INPUT...
-
Q1. You have identified a market opportunity for home media players that would cater for older members of the population. Many older people have difficulty in understanding the operating principles...
-
Melissa buys an iPod for $120 and gets consumer surplus of $80. a. What is her willingness to pay? b. If she had bought the iPod on sale for $90, what would her consumer surplus have been? c. If the...
-
The following data were collected for the destruction of O3 by H (O3 + H O2 + OH) at very low concentrations: (a) Write the rate law for the reaction. (b) Calculate the rate constant. Trial [O3l (M)...
-
72. For a chemical reaction if rate constant is 2 103 mol L min then order of reaction is :- (1) Zero (2) 1 (3) 2 (4) Can not predict 73. Which of the following is not an electrophile? (1) CH3 (3) C...
-
Why is it important to establish the meaning of talent and talent management in a particular organizational setting?
-
Regular Dividends the balance sheet for apple pie Corp, is shown here in market values terms. There are 5,000 shares of stock outstanding. The company has declared a dividend of $1.20 per share. The...
-
You wish to test if two population means are equal to each other, against an alternative that they are different. You may assume equal variances. You have two samples n1-12 and n2-12. What is the...
-
Cleveland Company has a stock portfolio valued at $4,910 (available-for-sale). Its cost was $4,270. If the Fair Value Adjustment account has a debit balance of $247, prepare the journal entry at...
-
When does a lender have the right to foreclose on mortgaged property?
-
The only way a principal can ratify a transaction is with a written statement. (True/False)
-
Gina conveys her warehouse to Sam under a warranty deed. Later, Hannah appears, holding a better title to the warehouse than Sams. Hannah proceeds to evict Sam. Sam can recover from Gina a. the...
-
Directors have a right to inspect corporate books and records. (True/False)
-
Bass Corporation hires Onika to manage one of its stores. Bass does not specify whether or to what extent Onika has the authority to contract with third parties. The express authority that Bass gives...
-
Ryanair, Wal-Mart, Timex, Casio, and Hyundai are all cited as examples of firms pursuing cost leadership strategies, but these firms make substantial investments in advertising, which seems more...
-
Rewrite Programming Exercise 7.5 using streams. Display the numbers in increasing order. Data from Programming Exercise 7.5 Write a program that reads in 10 numbers and displays the number of...
-
a. Show that the mean-squared forecast error \(E\left[\left(\hat{y}_{T+1}-y_{T+1} ight)^{2} \mid I_{T} ight]\) for a forecast \(\hat{y}_{T+1}\), that depends only on past information \(I_{T}\), can...
-
Consider the AR(1) model \(y_{t}=\delta+\theta y_{t-1}+e_{t}\) where \(|\theta|)=0\) and \(\operatorname{var}\left(e_{t} \mid I_{t-1} ight)=\sigma^{2}\). Let \(\bar{y}_{-1}=\sum_{t=2}^{T} y_{t}...
-
Consider a stationary model that combines the \(\operatorname{AR}(2)\) model \(y_{t}=\delta+\theta_{1} y_{t-1}+\theta_{2} y_{t-2}+e_{t}\) with an \(\mathrm{AR}(1)\) error model \(e_{t}=ho...
Study smarter with the SolutionInn App