EBK BIG JAVA: EARLY OBJECTS, INTERACTIV
EBK BIG JAVA: EARLY OBJECTS, INTERACTIV
6th Edition
ISBN: 8220102010314
Author: Horstmann
Publisher: YUZU
Question
Book Icon
Chapter 16, Problem 14PP
Program Plan Intro

To implement a hash table with open addressing

Program plan:

  • In a file “HashSet.java”, import necessary package, and create a class “HashSet”,
    • Declare the array of “Object” type.
    • Declare the necessary variable.
    • Define the method “getBucketsSize()” to get the length of the bucket.
    • Define the constructor to create a hash table.
      • Create an array and set the current size to “0”.
    • Define the method “toString()” that returns the string representation of array.
    • Define the method “contains()”,
      • Assign the hash code.
      • Check the condition,
        • If it is true, returns true.
          • Create a loop,
            • Check the condition,
              • If it is true, returns true.
            • Check whether the bucket value contains null,
              • If it is true, returns false.
    • Define the method “getHashCode()”,
      • Assign the hash code.
      • Check whether the value is less than “0”,
        • If it is true, assign the negative value.
          • Update the hash value.
          • Return the hash code.
    • Define the method “add()”
      • Check whether there is a room before probing,
        • If it is true, call the method “resizeTable()()”.
          • Assign the hash code returned from the method “getHashCode()”.
          • Check whether the has value is a null,
            • If it is true, assign the object properties.
          • Otherwise, execute a loop,
            • Check whether the bucket contains null value,
              • If it is true, assign the object properties.
              • Use break statement.
            • Otherwise, Check the condition,
              • Returns false.
          • Increment the current size.
          • Returns true.
    • Define the method “remove()” to remove the object from the set,
      • Get the hash code.
      • Set the position to “-1”.
      • Check the condition,
        • If it is true, assign the hash code to position.
          • Create a loop,
            • Check the condition, set the new position.
          • Check whether the position value is “-1”,
            • If it is true, returns false.
          • If the item found, find the last item in the rest of the probing sequence.
          • Create a loop,
            • Check whether the current bucket value contains null,
              • If it is true, assign the current value.
            • Otherwise, check the condition,
              • If it is true, assign the current value to last found.
          • Check whether the end sequence is “-1”,
            • If it is true, use conditional operator to find the end sequence.
          • Check the whether the last found is “-1”,
            • Assign the value to position.
            • Assign the null value to last found.
            • Decrement the current size.
            • Create a loop,
              • Check whether the bucket is not full,
                • Decrement the size.
                • Assign the value.
                • Assign the null value to the bucket.
                • Call the method “add()”.
          • Otherwise,
            • Assign null value to current bucket position.
            • Decrement the size.
          • Returns true.
    • Define the method “iterator ()” to return an iterator that traverse the set elements,
      • Return the object of “HashSetIterator()”.
    • Define the method “size()” to return the size.
    • Define the method “resizeTable()”,
      • Create an object.
      • Make a copy of bucket.
      • Assign the temporary value.
      • Set the current size to “0”.
      • Create a loop,
        • Check the condition, and if it is true, call the method “add()”.
    • Create a class “HashSetIterator”,
      • Declare the variable to denote bucket index.
      • Define the constructor that create a hash set iterator that points to the first element of the hash set.
      • Define the method “hasNext ()”,
        • Create a loop,
          • Check the condition,
            • Returns true.
        • Returns false.
    • Define the method “next ()”,
      • Execute the statement without checking the condition,
        • Increment the index.
        • Check the condition,
          • If it is true, create an object for “NoSuchElementException”.
      • Check whether the current bucket value contains null,
      • Return the value.
    • Define the method “remove()”,
      • Throw an exception “UnsupportedOperationException”.
  • In a file “HashSetTest.java”, create a class “HashSetTest”,
    • Define the method “main()”,
      • Create an object for “HashSet”.
      • Add the name “James” into the set.
      • Add the name “David” into the set.
      • Add the name “John” into the set.
      • Add the name “Kean” into the set.
      • Add the name “Juliet” into the set.
      • Add the name “Cassendra” into the set.
      • Print the set and expected output.
      • Remove the name “John” from the set.
      • Print the set and expected output.

Blurred answer
Students have asked these similar questions
Objective: 1. Implement a custom Vector class in C++ that manages dynamic memory efficiently. 2. Demonstrate an understanding of the Big Five by managing deep copies, move semantics, and resource cleanup. 3. Explore the performance trade-offs between heap and stack allocation. Task Description: Part 1: Custom Vector Implementation 1. Create a Vector class that manages a dynamically allocated array. 。 Member Variables: ° T✶ data; // Dynamically allocated array for storage. std::size_t size; // Number of elements currently in the vector. std::size_t capacity; // Maximum number of elements before reallocation is required. 2. Implement the following core member functions: Default Constructor: Initialize an empty vector with no allocated storage. 。 Destructor: Free any dynamically allocated memory. 。 Copy Constructor: Perform a deep copy of the data array. 。 Copy Assignment Operator: Free existing resources and perform a deep copy. Move Constructor: Transfer ownership of the data array…
2.68♦♦ Write code for a function with the following prototype: * Mask with least signficant n bits set to 1 * Examples: n = 6 -> 0x3F, n = 17-> 0x1FFFF * Assume 1 <= n <= w int lower_one_mask (int n); Your function should follow the bit-level integer coding rules Be careful of the case n = W.
Hi-Volt Components You are the IT manager at Hi-Voltage Components, a medium-sized firm that makes specialized circuit boards. Hi-Voltage's largest customer, Green Industries, recently installed a computerized purchasing sys- tem. If Hi-Voltage connects to the purchasing system, Green Industries will be able to submit purchase orders electronically. Although Hi-Voltage has a computerized accounting system, that system is not capable of handling EDI. Tasks 1. What options does Hi-Voltage have for developing a system to connect with Green Industries' pur- chasing system? 2. What terms or concepts describe the proposed computer-to-computer relationship between Hi-Voltage and Green Industries? why not? 3. Would Hi-Voltage's proposed new system be a transaction processing system? Why or 4. Before Hi-Voltage makes a final decision, should the company consider an ERP system? Why or why not?

Chapter 16 Solutions

EBK BIG JAVA: EARLY OBJECTS, INTERACTIV

Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education