Starting Out with Java: From Control Structures through Objects (7th Edition) (What's New in Computer Science)
Starting Out with Java: From Control Structures through Objects (7th Edition) (What's New in Computer Science)
7th Edition
ISBN: 9780134802213
Author: Tony Gaddis
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
bartleby
Concept explainers
Question
Book Icon
Chapter 9.4, Problem 9.17CP
Program Plan Intro
String class:
- The “String” class provides a number of methods that examines for a string inside of a string.
- The term “substring” refers to a string that denotes another string’s part.
- The “startsWith” method would determine whether calling string of object begins with a particular substring.
- The method returns “true” if string begins with specified substring, it returns “false” otherwise.
- The “endsWith” method would determine whether calling string would end with a specified substring.
- The method returns “true” if string ends with specified substring, it returns “false” otherwise.
- The “regionMatches” method would determine whether specified regions for two strings match.
- The first argument of this method can be “true” or “false” that indicates whether a case-insensitive comparison could be performed.
StringBuilder class:
- The “StringBuilder” class is same as “String” class except that contents of “StringBuilder” objects could be changed.
- It provides several methods that “String” class does not have.
- The “append” method accepts an argument that might be a primitive data type.
- It appends a string representation to contents of calling object.
- The “insert” method accepts two arguments, an integer that specifies position in string of calling object as well as value to be inserted.
- The “replace” method replaces the occurrences of one character with another character.
- The “toString” method converts a “StringBuilder” object in to a regular string.
Expert Solution & Answer
Check MarkWant to see the full answer?
Check out a sample textbook solutionBlurred answer
Students have asked these similar questions
make corrections of this program based on the errors shown. this is CIS 227 .
Create 6 users: Don, Liz, Shamir, Jose, Kate, and Sal.
Create 2 groups: marketing and research.
Add Shamir, Jose, and Kate to the marketing group.
Add Don, Liz, and Sal to the research group.
Create a shared directory for each group.
Create two files to put into each directory:
spreadsheetJanuary.txt
meetingNotes.txt
Assign access permissions to the directories:
Groups should have Read+Write access
Leave owner permissions as they are
"Everyone else" should not have any access
Submit for grade:
Screenshot of /etc/passwd contents showing your new users
Screenshot of /etc/group contents showing new groups with their members
Screenshot of shared directories you created with files and permissions
⚫ your circuit diagrams for your basic bricks, such as AND, OR, XOR gates and 1 bit multiplexers,
⚫ your circuit diagrams for your extended full adder, designed in Section 1 and
⚫ your circuit diagrams for your 8-bit arithmetical-logical unit, designed in Section 2.
1 An Extended Full Adder
In this Section, we are going to design an extended full adder circuit (EFA). That EFA takes 6 one bit inputs: aj, bj,
Cin, Tin, t1 and to. Depending on the four possible combinations of values on t1 and to, the EFA produces 3 one bit
outputs: sj, Cout and rout.
The EFA can be specified in principle by a truth table with 26 = 64 entries and 3 outputs. However, as the EFA
ignores certain inputs in certain cases, it is easier to work with the following overview specification, depending only
on t1 and to in the first place:
t1 to Description
00
Output Relationship
Ignored
Inputs
Addition Mode
2 Coutsjaj + bj + Cin, Tout= 0
Tin
0 1
Shift Left Mode
Sj = Cin,
Cout=bj, rout = 0
rin, aj
10
1 1
Shift Right...
Chapter 9 Solutions
Starting Out with Java: From Control Structures through Objects (7th Edition) (What's New in Computer Science)
Ch. 9.2 - Prob. 9.1CP Ch. 9.2 - Write an if statement that displays the word digit... Ch. 9.2 - Prob. 9.3CP Ch. 9.2 - Write a loop that asks the user, Do you want to... Ch. 9.2 - Prob. 9.5CP Ch. 9.2 - Write a loop that counts the number of uppercase... Ch. 9.3 - Prob. 9.7CP Ch. 9.3 - Modify the method you wrote for Checkpoint 9.7 so... Ch. 9.3 - Look at the following declaration: String cafeName... Ch. 9.3 - Prob. 9.10CP
Ch. 9.3 - Prob. 9.11CP Ch. 9.3 - Prob. 9.12CP Ch. 9.3 - Prob. 9.13CP Ch. 9.3 - Look at the following code: String str1 = To be,... Ch. 9.3 - Prob. 9.15CP Ch. 9.3 - Assume that a program has the following... Ch. 9.4 - Prob. 9.17CP Ch. 9.4 - Prob. 9.18CP Ch. 9.4 - Prob. 9.19CP Ch. 9.4 - Prob. 9.20CP Ch. 9.4 - Prob. 9.21CP Ch. 9.4 - Prob. 9.22CP Ch. 9.4 - Prob. 9.23CP Ch. 9.4 - Prob. 9.24CP Ch. 9.5 - Prob. 9.25CP Ch. 9.5 - Prob. 9.26CP Ch. 9.5 - Look at the following string:... Ch. 9.5 - Prob. 9.28CP Ch. 9.6 - Write a statement that converts the following... Ch. 9.6 - Prob. 9.30CP Ch. 9.6 - Prob. 9.31CP Ch. 9 - The isDigit, isLetter, and isLetterOrDigit methods... Ch. 9 - Prob. 2MC Ch. 9 - The startsWith, endsWith, and regionMatches... Ch. 9 - The indexOf and lastIndexOf methods are members of... Ch. 9 - Prob. 5MC Ch. 9 - Prob. 6MC Ch. 9 - Prob. 7MC Ch. 9 - Prob. 8MC Ch. 9 - Prob. 9MC Ch. 9 - Prob. 10MC Ch. 9 - To delete a specific character in a StringBuilder... Ch. 9 - Prob. 12MC Ch. 9 - This String method breaks a string into tokens. a.... Ch. 9 - These static final variables are members of the... Ch. 9 - Prob. 15TF Ch. 9 - Prob. 16TF Ch. 9 - True or False: If toLowerCase methods argument is... Ch. 9 - True or False: The startsWith and endsWith methods... Ch. 9 - True or False: There are two versions of the... Ch. 9 - Prob. 20TF Ch. 9 - Prob. 21TF Ch. 9 - Prob. 22TF Ch. 9 - Prob. 23TF Ch. 9 - int number = 99; String str; // Convert number to... Ch. 9 - Prob. 2FTE Ch. 9 - Prob. 3FTE Ch. 9 - Prob. 4FTE Ch. 9 - The following if statement determines whether... Ch. 9 - Write a loop that counts the number of space... Ch. 9 - Prob. 3AW Ch. 9 - Prob. 4AW Ch. 9 - Prob. 5AW Ch. 9 - Modify the method you wrote for Algorithm... Ch. 9 - Prob. 7AW Ch. 9 - Look at the following string:... Ch. 9 - Assume that d is a double variable. Write an if... Ch. 9 - Write code that displays the contents of the int... Ch. 9 - Prob. 1SA Ch. 9 - Prob. 2SA Ch. 9 - Prob. 3SA Ch. 9 - How can you determine the minimum and maximum... Ch. 9 - Prob. 1PC Ch. 9 - Prob. 2PC Ch. 9 - Prob. 3PC Ch. 9 - Prob. 4PC Ch. 9 - Prob. 5PC Ch. 9 - Prob. 6PC Ch. 9 - Check Writer Write a program that displays a... Ch. 9 - Prob. 8PC Ch. 9 - Prob. 9PC Ch. 9 - Word Counter Write a program that asks the user... Ch. 9 - Sales Analysis The file SalesData.txt, in this... Ch. 9 - Prob. 12PC Ch. 9 - Alphabetic Telephone Number Translator Many... Ch. 9 - Word Separator Write a program that accepts as... Ch. 9 - Pig Latin Write a program that reads a sentence as... Ch. 9 - Prob. 16PC Ch. 9 - Lottery Statistics To play the PowerBall lottery,... Ch. 9 - Gas Prices In the student sample program files for...
Knowledge Booster
Background pattern image
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Show the correct stereochemistry when needed!! mechanism: mechanism: Show the correct stereochemistry when needed!! Br NaOPh diethyl ether substitutionarrow_forwardIn javaarrow_forwardKeanPerson #keanld:int #keanEmail:String #firstName:String #lastName: String KeanAlumni -yearOfGraduation: int - employmentStatus: String + KeanPerson() + KeanPerson(keanld: int, keanEmail: String, firstName: String, lastName: String) + getKeanld(): int + getKeanEmail(): String +getFirstName(): String + getLastName(): String + setFirstName(firstName: String): void + setLastName(lastName: String): void +toString(): String +getParkingRate(): double + KeanAlumni() + KeanAlumni(keanld: int, keanEmail: String, firstName: String, lastName: String, yearOfGraduation: int, employmentStatus: String) +getYearOfGraduation(): int + setYearOfGraduation(yearOfGraduation: int): void +toString(): String +getParkingRate(): double In this question, write Java code to Create and Test the superclass: Abstract KeanPerson and a subclass of the KeanPerson: KeanAlumni. Task 1: Implement Abstract Class KeanPerson using UML (10 points) • Four data fields • Two constructors (1 default and 1 constructor with all...arrow_forward
- Plz correct answer by best experts...??arrow_forwardQ3) using the following image matrix a- b- 12345 6 7 8 9 10 11 12 13 14 15 1617181920 21 22 23 24 25 Using direct chaotic one dimension method to convert the plain text to stego text (hello ahmed)? Using direct chaotic two-dimension method to convert the plain text to stego text?arrow_forward: The Multithreaded Cook In this lab, we'll practice multithreading. Using Semaphores for synchronization, implement a multithreaded cook that performs the following recipe, with each task being contained in a single Thread: 1. Task 1: Cut onions. a. Waits for none. b. Signals Task 4 2. Task 2: Mince meat. a. Waits for none b. Signals Task 4 3. Task 3: Slice aubergines. a. Waits for none b. Signals Task 6 4. Task 4: Make sauce. a. Waits for Task 1, and 2 b. Signals Task 6 5. Task 5: Finished Bechamel. a. Waits for none b. Signals Task 7 6. Task 6: Layout the layers. a. Waits for Task 3, and 4 b. Signals Task 7 7. Task 7: Put Bechamel and Cheese. a. Waits for Task 5, and 6 b. Signals Task 9 8. Task 8: Turn on oven. a. Waits for none b. Signals Task 9 9. Task 9: Cook. a. Waits for Task 7, and 8 b. Signals none At the start of each task (once all Semaphores have been acquired), print out a string of the task you are starting, sleep for 2-11 seconds, then print out a string saying that you...arrow_forward
- Programming Problems 9.28 Assume that a system has a 32-bit virtual address with a 4-KB page size. Write a C program that is passed a virtual address (in decimal) on the command line and have it output the page number and offset for the given address. As an example, your program would run as follows: ./addresses 19986 Your program would output: The address 19986 contains: page number = 4 offset = 3602 Writing this program will require using the appropriate data type to store 32 bits. We encourage you to use unsigned data types as well. Programming Projects Contiguous Memory Allocation In Section 9.2, we presented different algorithms for contiguous memory allo- cation. This project will involve managing a contiguous region of memory of size MAX where addresses may range from 0 ... MAX - 1. Your program must respond to four different requests: 1. Request for a contiguous block of memory 2. Release of a contiguous block of memory 3. Compact unused holes of memory into one single block 4....arrow_forwardusing r languagearrow_forwardProgramming Problems 9.28 Assume that a system has a 32-bit virtual address with a 4-KB page size. Write a C program that is passed a virtual address (in decimal) on the command line and have it output the page number and offset for the given address. As an example, your program would run as follows: ./addresses 19986 Your program would output: The address 19986 contains: page number = 4 offset = 3602 Writing this program will require using the appropriate data type to store 32 bits. We encourage you to use unsigned data types as well. Programming Projects Contiguous Memory Allocation In Section 9.2, we presented different algorithms for contiguous memory allo- cation. This project will involve managing a contiguous region of memory of size MAX where addresses may range from 0 ... MAX - 1. Your program must respond to four different requests: 1. Request for a contiguous block of memory 2. Release of a contiguous block of memory 3. Compact unused holes of memory into one single block 4....arrow_forward
- using r languagearrow_forwardWrite a function to compute a Monte Carlo estimate of the Beta(3, 3) cdf, and use the function to estimate F(x) for x = 0.1,0.2,...,0.9. Compare the estimates with the values returned by the pbeta function in R.arrow_forwardWrite a function to compute a Monte Carlo estimate of the Gamma(r = 3, λ = 2) cdf, and use the function to estimate F(x) for x = 0.2, 0.4, . . . , 2.0. Compare the estimates with the values returned by the pgamma function in R.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Text book imageEBK JAVA PROGRAMMINGComputer ScienceISBN:9781337671385Author:FARRELLPublisher:CENGAGE LEARNING - CONSIGNMENTText book imageC++ Programming: From Problem Analysis to Program...Computer ScienceISBN:9781337102087Author:D. S. MalikPublisher:Cengage LearningText book imageEBK JAVA PROGRAMMINGComputer ScienceISBN:9781305480537Author:FARRELLPublisher:CENGAGE LEARNING - CONSIGNMENT
- Text book imageMicrosoft Visual C#Computer ScienceISBN:9781337102100Author:Joyce, Farrell.Publisher:Cengage Learning,Text book imageProgramming Logic & Design ComprehensiveComputer ScienceISBN:9781337669405Author:FARRELLPublisher:CengageText book imagePrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Text book image
EBK JAVA PROGRAMMING
Computer Science
ISBN:9781337671385
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT
Text book image
C++ Programming: From Problem Analysis to Program...
Computer Science
ISBN:9781337102087
Author:D. S. Malik
Publisher:Cengage Learning
Text book image
EBK JAVA PROGRAMMING
Computer Science
ISBN:9781305480537
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT
Text book image
Microsoft Visual C#
Computer Science
ISBN:9781337102100
Author:Joyce, Farrell.
Publisher:Cengage Learning,
Text book image
Programming Logic & Design Comprehensive
Computer Science
ISBN:9781337669405
Author:FARRELL
Publisher:Cengage
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning