SlideShare a Scribd company logo
Please and Thank you
Objective: The purpose of this exercise is to create a Linked List data structure that mimics the
behavior of the Java Standard Library Version (Java API). The outcomes/results of using the
library features should be identical with your own version (My API). However, the underlying
implementation should follow with the descriptions listed below.
Instructions : Create the following Linked List Data Structure with the given description below
in your utils package and use "for loops" for your repetitive tasks.
Where to find starter code in my-api
package.class : utils.LinkedList
package.class : tests.console.week04.LinkedListTest
Where to find your JUNIT test in my-api
package.class : tests.junit.LinkedListJUnitTest
Nested Class that has to be added to LinkedList class
package.class : utils.LinkedList.Node
Task Check List
ONLY "for" loops should be used within the data structure class. There is an automatic 30%
deduction, if other loops are used.
The names of identifiers MUST match the names listed in the description below. Deductions
otherwise.
Complete coding Assignment in your "my-api" GitHub Repository. You will not be graded
otherwise and will receive a 0, if not uploaded there.
Run JUNIT TEST and take a SNAPSHOT of results. Upload PDF of snapshot of your JUnitTest
results to Canvas.
Description
The internal structure of the Linked List is a doubly linked Node data structure and should have
at a minimum the following specifications:
data fields: The data fields to declare are private and you will keep track of the size of the list
with the variable size and the start of the list with the reference variable data.
first is a reference variable for the first Node in the list.
last is a reference variable for the last Node in the list.
size keeps track of the number of nodes in the list of type int. This will allow you to know the
current size of the list without having to traversing the list.
constructors: The overloaded constructors will initialize the data fields size and data.
A constructor that is a default constructor initializes the starting node location first and size to a
zero equivalent, that is, constructs an empty list.
methods: methods that manages the behavior of the linked nodes.
Together, the methods below give the illusion of a index or countable location. Implement these
methods within your generic Linked List class.
Method
Description
Header
public boolean add(E item)
public void add(int index, E item)
public void append( E item)
private void checkIndex(int index)
public boolean contains(E item)
public void clear()
private E detach(int index)
public E get(int index)
public int indexOf(E item)
private void insertBefore(int index, E item)
public boolean isEmpty()
private Node node(int index)
public E remove(int index)
public boolean remove(E item)
public E set(int index, E item)
public int size()
public String toString()
Node Data Structure
The generic Linked List class includes a static Node class as a nested class, i.e. a static inner
class within the Linked List class.
inner class: class inside the body of another class.
Note: This private class does not require access to instance members of the outer class, so it is
declared static. This means that the node object wont be coupled to the outer class object, thus
will be more optimal since it wont require heap/stack memory.
data fields:
data : hold the data stored in each node as is of type E.
next : stores the location of the next node in the list.
prev : stores the location of the previous node in the list.
constructor:
A constructor that receives parameters for data, and prev and calls the second constructor.
public Node(Node prev, E data)
A constructor that receives parameters for data, next and prev.
public Node(Node prev, E data, Node next)
Method
Description
Header add(item)uses the append method and ensures that there is enough spaces to store each
element in the list. Also updates the number of elements in the list by one. This method returns
true, if the data was added successfully.
public boolean add(E item) add(index, item)inserts elements at a given location in the list,
shifting subsequent elements to the right. Uses the append and insertBefore methods to assist
with adding items to the front, back and middle of the list. Updates the number of elements in the
list by one.
public void add(int index, E item) append(item)appends elements to the end of the list, but does
not update the number of elements. This is a private helper method.
public void append( E item) checkIndex(index)checks if the given index is valid. Validation
means that you cannot access indexes where elements have not been placed. Throws an
IndexOutOfBoundsException, if invalid. This is a private helper method.
private void checkIndex(int index) contains(item)searches for a specific item within the linked
structure and returns true, if the item is in the list.
public boolean contains(E item) clear()clears list of all elements, returns size back to zero.
public void clear() detach(index)detaches the node at the specified index from list and returns
the deleted element, but does not reduce the size of the list. This is a private helper method.
private E detach(int index) get(index)returns the item at the specified position in the list. This
method first checks if the index requested is valid.
public E get(int index) indexOf(item)searches for a specific item within the linked structure and
returns the first occurrence (i.e. index location) in the list, otherwise returns -1, if NOT found.
public int indexOf(E item) insertBefore(index, item)inserts an item before the non-null node at
the specified index in the list. Traverses the list to find this node. This method also checks for
insertions at the start and end of the list, as well as when empty. This is a private helper method.
private void insertBefore(int index, E item) isEmpty()returns true, if the list is empty, i.e., the
list contains no elements.
public boolean isEmpty() node(index)returns a reference to the node at the given position in the
list. This node traverses the list in two directions from front to middle and back to middle. This is
a private helper method.
private Node node(int index) remove(index)removes the item at the given position in the list for
a valid index. Checks for valid index before it proceeds with removal. Shifts subsequent
elements to the left and returns the item removed. The number of elements in the list is reduced
by one.
public E remove(int index) remove(item)removes the first occurrence of the specified item from
the list, if present. Shifts subsequent elements to the left and returns true, if the item is removed.
The number of elements in the list is reduced by one.
public boolean remove(E item) set(index, item)replaces the item at the specified position with
the one passed. This method checks if the index requested is valid before it does the replacement
and returns the replaced item.
public E set(int index, E item)size()returns the number of elements in the list.
public int size()toString()displays the contents of the list according to the same format at shown
in the Java API.
public String toString()

More Related Content

Similar to Please and Thank youObjective The purpose of this exercise is to .pdf

Collections Api - Java
Collections Api - JavaCollections Api - Java
Collections Api - Java
Drishti Bhalla
 
Implementation The starter code includes List.java. You should not c.pdf
Implementation The starter code includes List.java. You should not c.pdfImplementation The starter code includes List.java. You should not c.pdf
Implementation The starter code includes List.java. You should not c.pdf
maheshkumar12354
 
linked list (c#)
 linked list (c#) linked list (c#)
linked list (c#)
swajahatr
 
Collection Framework-1.pptx
Collection Framework-1.pptxCollection Framework-1.pptx
Collection Framework-1.pptx
SarthakSrivastava70
 
Array list(1)
Array list(1)Array list(1)
Array list(1)
abdullah619
 
Built-in Data Structures in python 3.pdf
Built-in Data Structures in python 3.pdfBuilt-in Data Structures in python 3.pdf
Built-in Data Structures in python 3.pdf
alivaisi1
 
List Data Structure
List Data StructureList Data Structure
List Data Structure
Zidny Nafan
 
Unsorted Sorted List_Array.pptx
Unsorted Sorted List_Array.pptxUnsorted Sorted List_Array.pptx
Unsorted Sorted List_Array.pptx
KMEhsanUlHasan192196
 
There are a couple of new methods that you will be writing for this pr.pdf
There are a couple of new methods that you will be writing for this pr.pdfThere are a couple of new methods that you will be writing for this pr.pdf
There are a couple of new methods that you will be writing for this pr.pdf
aamousnowov
 
Part B- Implementing a Sorted Linked list The class declarations has b.pdf
Part B- Implementing a Sorted Linked list The class declarations has b.pdfPart B- Implementing a Sorted Linked list The class declarations has b.pdf
Part B- Implementing a Sorted Linked list The class declarations has b.pdf
info571050
 
oop lecture framework,list,maps,collection
oop lecture framework,list,maps,collectionoop lecture framework,list,maps,collection
oop lecture framework,list,maps,collection
ssuseredfbe9
 
The MyLinkedList class used in Listing 24.6 is a one-way directional .docx
 The MyLinkedList class used in Listing 24.6 is a one-way directional .docx The MyLinkedList class used in Listing 24.6 is a one-way directional .docx
The MyLinkedList class used in Listing 24.6 is a one-way directional .docx
Komlin1
 
Linked list (java platform se 8 )
Linked list (java platform se 8 )Linked list (java platform se 8 )
Linked list (java platform se 8 )
charan kumar
 
General Data structures
General Data structuresGeneral Data structures
General Data structures
Youssef Elsalhawy
 
AD3251-LINKED LIST,STACK ADT,QUEUE ADT.docx
AD3251-LINKED LIST,STACK ADT,QUEUE ADT.docxAD3251-LINKED LIST,STACK ADT,QUEUE ADT.docx
AD3251-LINKED LIST,STACK ADT,QUEUE ADT.docx
AmuthachenthiruK
 
Adt of lists
Adt of listsAdt of lists
Adt of lists
Nivegeetha
 
Collections and generics
Collections and genericsCollections and generics
Collections and generics
Muthukumaran Subramanian
 
Java Amend the LinkedList so that 1 Your list classes must.pdf
Java Amend the LinkedList so that 1 Your list classes must.pdfJava Amend the LinkedList so that 1 Your list classes must.pdf
Java Amend the LinkedList so that 1 Your list classes must.pdf
adinathassociates
 

Similar to Please and Thank youObjective The purpose of this exercise is to .pdf (20)

Collections Api - Java
Collections Api - JavaCollections Api - Java
Collections Api - Java
 
Implementation The starter code includes List.java. You should not c.pdf
Implementation The starter code includes List.java. You should not c.pdfImplementation The starter code includes List.java. You should not c.pdf
Implementation The starter code includes List.java. You should not c.pdf
 
linked list (c#)
 linked list (c#) linked list (c#)
linked list (c#)
 
Collection Framework-1.pptx
Collection Framework-1.pptxCollection Framework-1.pptx
Collection Framework-1.pptx
 
Array list(1)
Array list(1)Array list(1)
Array list(1)
 
Advanced core java
Advanced core javaAdvanced core java
Advanced core java
 
Built-in Data Structures in python 3.pdf
Built-in Data Structures in python 3.pdfBuilt-in Data Structures in python 3.pdf
Built-in Data Structures in python 3.pdf
 
List Data Structure
List Data StructureList Data Structure
List Data Structure
 
List data structure
List data structure List data structure
List data structure
 
Unsorted Sorted List_Array.pptx
Unsorted Sorted List_Array.pptxUnsorted Sorted List_Array.pptx
Unsorted Sorted List_Array.pptx
 
There are a couple of new methods that you will be writing for this pr.pdf
There are a couple of new methods that you will be writing for this pr.pdfThere are a couple of new methods that you will be writing for this pr.pdf
There are a couple of new methods that you will be writing for this pr.pdf
 
Part B- Implementing a Sorted Linked list The class declarations has b.pdf
Part B- Implementing a Sorted Linked list The class declarations has b.pdfPart B- Implementing a Sorted Linked list The class declarations has b.pdf
Part B- Implementing a Sorted Linked list The class declarations has b.pdf
 
oop lecture framework,list,maps,collection
oop lecture framework,list,maps,collectionoop lecture framework,list,maps,collection
oop lecture framework,list,maps,collection
 
The MyLinkedList class used in Listing 24.6 is a one-way directional .docx
 The MyLinkedList class used in Listing 24.6 is a one-way directional .docx The MyLinkedList class used in Listing 24.6 is a one-way directional .docx
The MyLinkedList class used in Listing 24.6 is a one-way directional .docx
 
Linked list (java platform se 8 )
Linked list (java platform se 8 )Linked list (java platform se 8 )
Linked list (java platform se 8 )
 
General Data structures
General Data structuresGeneral Data structures
General Data structures
 
AD3251-LINKED LIST,STACK ADT,QUEUE ADT.docx
AD3251-LINKED LIST,STACK ADT,QUEUE ADT.docxAD3251-LINKED LIST,STACK ADT,QUEUE ADT.docx
AD3251-LINKED LIST,STACK ADT,QUEUE ADT.docx
 
Adt of lists
Adt of listsAdt of lists
Adt of lists
 
Collections and generics
Collections and genericsCollections and generics
Collections and generics
 
Java Amend the LinkedList so that 1 Your list classes must.pdf
Java Amend the LinkedList so that 1 Your list classes must.pdfJava Amend the LinkedList so that 1 Your list classes must.pdf
Java Amend the LinkedList so that 1 Your list classes must.pdf
 

More from alicesilverblr

Part B Vulnerability Management Plan To prepare a vulnerability.pdf
Part B Vulnerability Management Plan To prepare a vulnerability.pdfPart B Vulnerability Management Plan To prepare a vulnerability.pdf
Part B Vulnerability Management Plan To prepare a vulnerability.pdf
alicesilverblr
 
Part 1 � 10 marksAster Turane Computers uses a perpetual accountin.pdf
Part 1 � 10 marksAster Turane Computers uses a perpetual accountin.pdfPart 1 � 10 marksAster Turane Computers uses a perpetual accountin.pdf
Part 1 � 10 marksAster Turane Computers uses a perpetual accountin.pdf
alicesilverblr
 
Part 1 Refer to pages 92-100 in your text as you answer these quest.pdf
Part 1 Refer to pages 92-100 in your text as you answer these quest.pdfPart 1 Refer to pages 92-100 in your text as you answer these quest.pdf
Part 1 Refer to pages 92-100 in your text as you answer these quest.pdf
alicesilverblr
 
Para arz B�y�k Buhran srasnda d�t� ��nk� __________. Yant se�enekl.pdf
Para arz B�y�k Buhran srasnda d�t� ��nk� __________. Yant se�enekl.pdfPara arz B�y�k Buhran srasnda d�t� ��nk� __________. Yant se�enekl.pdf
Para arz B�y�k Buhran srasnda d�t� ��nk� __________. Yant se�enekl.pdf
alicesilverblr
 
Pandas is a Python library used for working with data sets. It has f.pdf
Pandas is a Python library used for working with data sets. It has f.pdfPandas is a Python library used for working with data sets. It has f.pdf
Pandas is a Python library used for working with data sets. It has f.pdf
alicesilverblr
 
page 6-7 Fraud (previously referred to as irregularities) -Inten.pdf
page 6-7 Fraud (previously referred to as irregularities) -Inten.pdfpage 6-7 Fraud (previously referred to as irregularities) -Inten.pdf
page 6-7 Fraud (previously referred to as irregularities) -Inten.pdf
alicesilverblr
 
page 9 STAFF DISCUSSION OF THE RISK OF MATERIAL MISSTATEMENT DUE T.pdf
page 9 STAFF DISCUSSION OF THE RISK OF MATERIAL MISSTATEMENT DUE T.pdfpage 9 STAFF DISCUSSION OF THE RISK OF MATERIAL MISSTATEMENT DUE T.pdf
page 9 STAFF DISCUSSION OF THE RISK OF MATERIAL MISSTATEMENT DUE T.pdf
alicesilverblr
 
page 8 III. OUTLINE OF STATEMENT ON AUDITING STANDARDS NO. 99, CON.pdf
page 8 III. OUTLINE OF STATEMENT ON AUDITING STANDARDS NO. 99, CON.pdfpage 8 III. OUTLINE OF STATEMENT ON AUDITING STANDARDS NO. 99, CON.pdf
page 8 III. OUTLINE OF STATEMENT ON AUDITING STANDARDS NO. 99, CON.pdf
alicesilverblr
 
page 12 B. Conflicting or missing audit evidence, such as (1) Mis.pdf
page 12 B. Conflicting or missing audit evidence, such as (1) Mis.pdfpage 12 B. Conflicting or missing audit evidence, such as (1) Mis.pdf
page 12 B. Conflicting or missing audit evidence, such as (1) Mis.pdf
alicesilverblr
 
page 10 (4) In-house legal counsel. E. Be aware in evaluating ma.pdf
page 10 (4) In-house legal counsel. E. Be aware in evaluating ma.pdfpage 10 (4) In-house legal counsel. E. Be aware in evaluating ma.pdf
page 10 (4) In-house legal counsel. E. Be aware in evaluating ma.pdf
alicesilverblr
 
p14-15 34. The risk of fraud may be so high as to cause the audi.pdf
p14-15 34. The risk of fraud may be so high as to cause the audi.pdfp14-15 34. The risk of fraud may be so high as to cause the audi.pdf
p14-15 34. The risk of fraud may be so high as to cause the audi.pdf
alicesilverblr
 
p13 29. The auditor should evaluate whether analytical procedure.pdf
p13 29. The auditor should evaluate whether analytical procedure.pdfp13 29. The auditor should evaluate whether analytical procedure.pdf
p13 29. The auditor should evaluate whether analytical procedure.pdf
alicesilverblr
 
P1 Una entidad adquiere un elemento de equipo que no es de naturale.pdf
P1 Una entidad adquiere un elemento de equipo que no es de naturale.pdfP1 Una entidad adquiere un elemento de equipo que no es de naturale.pdf
P1 Una entidad adquiere un elemento de equipo que no es de naturale.pdf
alicesilverblr
 
Owner, Andy Pforzheimer, holds a meeting with his employees in which.pdf
Owner, Andy Pforzheimer, holds a meeting with his employees in which.pdfOwner, Andy Pforzheimer, holds a meeting with his employees in which.pdf
Owner, Andy Pforzheimer, holds a meeting with his employees in which.pdf
alicesilverblr
 
ow Effective Managers Use Information Systems Advances in computer-b.pdf
ow Effective Managers Use Information Systems Advances in computer-b.pdfow Effective Managers Use Information Systems Advances in computer-b.pdf
ow Effective Managers Use Information Systems Advances in computer-b.pdf
alicesilverblr
 
Overview of the Animal Kingdom (ch. 32)a. Describe the origins and.pdf
Overview of the Animal Kingdom (ch. 32)a. Describe the origins and.pdfOverview of the Animal Kingdom (ch. 32)a. Describe the origins and.pdf
Overview of the Animal Kingdom (ch. 32)a. Describe the origins and.pdf
alicesilverblr
 
Over the past ten years, if you had an innovative product like �EarP.pdf
Over the past ten years, if you had an innovative product like �EarP.pdfOver the past ten years, if you had an innovative product like �EarP.pdf
Over the past ten years, if you had an innovative product like �EarP.pdf
alicesilverblr
 
OTEL RIXOS PREMIUM BELEK OTEL POZSYON PAZARLAMA EKB COVID-19d.pdf
OTEL RIXOS PREMIUM BELEK OTEL POZSYON PAZARLAMA EKB COVID-19d.pdfOTEL RIXOS PREMIUM BELEK OTEL POZSYON PAZARLAMA EKB COVID-19d.pdf
OTEL RIXOS PREMIUM BELEK OTEL POZSYON PAZARLAMA EKB COVID-19d.pdf
alicesilverblr
 
other information provided is the answer for T T=-0.62 i still ne.pdf
other information provided is the answer for T T=-0.62 i still ne.pdfother information provided is the answer for T T=-0.62 i still ne.pdf
other information provided is the answer for T T=-0.62 i still ne.pdf
alicesilverblr
 
Please complete the fill in the box exercise by identify the federal.pdf
Please complete the fill in the box exercise by identify the federal.pdfPlease complete the fill in the box exercise by identify the federal.pdf
Please complete the fill in the box exercise by identify the federal.pdf
alicesilverblr
 

More from alicesilverblr (20)

Part B Vulnerability Management Plan To prepare a vulnerability.pdf
Part B Vulnerability Management Plan To prepare a vulnerability.pdfPart B Vulnerability Management Plan To prepare a vulnerability.pdf
Part B Vulnerability Management Plan To prepare a vulnerability.pdf
 
Part 1 � 10 marksAster Turane Computers uses a perpetual accountin.pdf
Part 1 � 10 marksAster Turane Computers uses a perpetual accountin.pdfPart 1 � 10 marksAster Turane Computers uses a perpetual accountin.pdf
Part 1 � 10 marksAster Turane Computers uses a perpetual accountin.pdf
 
Part 1 Refer to pages 92-100 in your text as you answer these quest.pdf
Part 1 Refer to pages 92-100 in your text as you answer these quest.pdfPart 1 Refer to pages 92-100 in your text as you answer these quest.pdf
Part 1 Refer to pages 92-100 in your text as you answer these quest.pdf
 
Para arz B�y�k Buhran srasnda d�t� ��nk� __________. Yant se�enekl.pdf
Para arz B�y�k Buhran srasnda d�t� ��nk� __________. Yant se�enekl.pdfPara arz B�y�k Buhran srasnda d�t� ��nk� __________. Yant se�enekl.pdf
Para arz B�y�k Buhran srasnda d�t� ��nk� __________. Yant se�enekl.pdf
 
Pandas is a Python library used for working with data sets. It has f.pdf
Pandas is a Python library used for working with data sets. It has f.pdfPandas is a Python library used for working with data sets. It has f.pdf
Pandas is a Python library used for working with data sets. It has f.pdf
 
page 6-7 Fraud (previously referred to as irregularities) -Inten.pdf
page 6-7 Fraud (previously referred to as irregularities) -Inten.pdfpage 6-7 Fraud (previously referred to as irregularities) -Inten.pdf
page 6-7 Fraud (previously referred to as irregularities) -Inten.pdf
 
page 9 STAFF DISCUSSION OF THE RISK OF MATERIAL MISSTATEMENT DUE T.pdf
page 9 STAFF DISCUSSION OF THE RISK OF MATERIAL MISSTATEMENT DUE T.pdfpage 9 STAFF DISCUSSION OF THE RISK OF MATERIAL MISSTATEMENT DUE T.pdf
page 9 STAFF DISCUSSION OF THE RISK OF MATERIAL MISSTATEMENT DUE T.pdf
 
page 8 III. OUTLINE OF STATEMENT ON AUDITING STANDARDS NO. 99, CON.pdf
page 8 III. OUTLINE OF STATEMENT ON AUDITING STANDARDS NO. 99, CON.pdfpage 8 III. OUTLINE OF STATEMENT ON AUDITING STANDARDS NO. 99, CON.pdf
page 8 III. OUTLINE OF STATEMENT ON AUDITING STANDARDS NO. 99, CON.pdf
 
page 12 B. Conflicting or missing audit evidence, such as (1) Mis.pdf
page 12 B. Conflicting or missing audit evidence, such as (1) Mis.pdfpage 12 B. Conflicting or missing audit evidence, such as (1) Mis.pdf
page 12 B. Conflicting or missing audit evidence, such as (1) Mis.pdf
 
page 10 (4) In-house legal counsel. E. Be aware in evaluating ma.pdf
page 10 (4) In-house legal counsel. E. Be aware in evaluating ma.pdfpage 10 (4) In-house legal counsel. E. Be aware in evaluating ma.pdf
page 10 (4) In-house legal counsel. E. Be aware in evaluating ma.pdf
 
p14-15 34. The risk of fraud may be so high as to cause the audi.pdf
p14-15 34. The risk of fraud may be so high as to cause the audi.pdfp14-15 34. The risk of fraud may be so high as to cause the audi.pdf
p14-15 34. The risk of fraud may be so high as to cause the audi.pdf
 
p13 29. The auditor should evaluate whether analytical procedure.pdf
p13 29. The auditor should evaluate whether analytical procedure.pdfp13 29. The auditor should evaluate whether analytical procedure.pdf
p13 29. The auditor should evaluate whether analytical procedure.pdf
 
P1 Una entidad adquiere un elemento de equipo que no es de naturale.pdf
P1 Una entidad adquiere un elemento de equipo que no es de naturale.pdfP1 Una entidad adquiere un elemento de equipo que no es de naturale.pdf
P1 Una entidad adquiere un elemento de equipo que no es de naturale.pdf
 
Owner, Andy Pforzheimer, holds a meeting with his employees in which.pdf
Owner, Andy Pforzheimer, holds a meeting with his employees in which.pdfOwner, Andy Pforzheimer, holds a meeting with his employees in which.pdf
Owner, Andy Pforzheimer, holds a meeting with his employees in which.pdf
 
ow Effective Managers Use Information Systems Advances in computer-b.pdf
ow Effective Managers Use Information Systems Advances in computer-b.pdfow Effective Managers Use Information Systems Advances in computer-b.pdf
ow Effective Managers Use Information Systems Advances in computer-b.pdf
 
Overview of the Animal Kingdom (ch. 32)a. Describe the origins and.pdf
Overview of the Animal Kingdom (ch. 32)a. Describe the origins and.pdfOverview of the Animal Kingdom (ch. 32)a. Describe the origins and.pdf
Overview of the Animal Kingdom (ch. 32)a. Describe the origins and.pdf
 
Over the past ten years, if you had an innovative product like �EarP.pdf
Over the past ten years, if you had an innovative product like �EarP.pdfOver the past ten years, if you had an innovative product like �EarP.pdf
Over the past ten years, if you had an innovative product like �EarP.pdf
 
OTEL RIXOS PREMIUM BELEK OTEL POZSYON PAZARLAMA EKB COVID-19d.pdf
OTEL RIXOS PREMIUM BELEK OTEL POZSYON PAZARLAMA EKB COVID-19d.pdfOTEL RIXOS PREMIUM BELEK OTEL POZSYON PAZARLAMA EKB COVID-19d.pdf
OTEL RIXOS PREMIUM BELEK OTEL POZSYON PAZARLAMA EKB COVID-19d.pdf
 
other information provided is the answer for T T=-0.62 i still ne.pdf
other information provided is the answer for T T=-0.62 i still ne.pdfother information provided is the answer for T T=-0.62 i still ne.pdf
other information provided is the answer for T T=-0.62 i still ne.pdf
 
Please complete the fill in the box exercise by identify the federal.pdf
Please complete the fill in the box exercise by identify the federal.pdfPlease complete the fill in the box exercise by identify the federal.pdf
Please complete the fill in the box exercise by identify the federal.pdf
 

Recently uploaded

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 

Recently uploaded (20)

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 

Please and Thank youObjective The purpose of this exercise is to .pdf

  • 1. Please and Thank you Objective: The purpose of this exercise is to create a Linked List data structure that mimics the behavior of the Java Standard Library Version (Java API). The outcomes/results of using the library features should be identical with your own version (My API). However, the underlying implementation should follow with the descriptions listed below. Instructions : Create the following Linked List Data Structure with the given description below in your utils package and use "for loops" for your repetitive tasks. Where to find starter code in my-api package.class : utils.LinkedList package.class : tests.console.week04.LinkedListTest Where to find your JUNIT test in my-api package.class : tests.junit.LinkedListJUnitTest Nested Class that has to be added to LinkedList class package.class : utils.LinkedList.Node Task Check List ONLY "for" loops should be used within the data structure class. There is an automatic 30% deduction, if other loops are used. The names of identifiers MUST match the names listed in the description below. Deductions otherwise. Complete coding Assignment in your "my-api" GitHub Repository. You will not be graded otherwise and will receive a 0, if not uploaded there. Run JUNIT TEST and take a SNAPSHOT of results. Upload PDF of snapshot of your JUnitTest results to Canvas. Description The internal structure of the Linked List is a doubly linked Node data structure and should have at a minimum the following specifications: data fields: The data fields to declare are private and you will keep track of the size of the list with the variable size and the start of the list with the reference variable data. first is a reference variable for the first Node in the list. last is a reference variable for the last Node in the list.
  • 2. size keeps track of the number of nodes in the list of type int. This will allow you to know the current size of the list without having to traversing the list. constructors: The overloaded constructors will initialize the data fields size and data. A constructor that is a default constructor initializes the starting node location first and size to a zero equivalent, that is, constructs an empty list. methods: methods that manages the behavior of the linked nodes. Together, the methods below give the illusion of a index or countable location. Implement these methods within your generic Linked List class. Method Description Header public boolean add(E item) public void add(int index, E item) public void append( E item) private void checkIndex(int index) public boolean contains(E item) public void clear() private E detach(int index) public E get(int index) public int indexOf(E item) private void insertBefore(int index, E item) public boolean isEmpty() private Node node(int index) public E remove(int index) public boolean remove(E item) public E set(int index, E item) public int size() public String toString() Node Data Structure The generic Linked List class includes a static Node class as a nested class, i.e. a static inner class within the Linked List class. inner class: class inside the body of another class. Note: This private class does not require access to instance members of the outer class, so it is declared static. This means that the node object wont be coupled to the outer class object, thus
  • 3. will be more optimal since it wont require heap/stack memory. data fields: data : hold the data stored in each node as is of type E. next : stores the location of the next node in the list. prev : stores the location of the previous node in the list. constructor: A constructor that receives parameters for data, and prev and calls the second constructor. public Node(Node prev, E data) A constructor that receives parameters for data, next and prev. public Node(Node prev, E data, Node next) Method Description Header add(item)uses the append method and ensures that there is enough spaces to store each element in the list. Also updates the number of elements in the list by one. This method returns true, if the data was added successfully. public boolean add(E item) add(index, item)inserts elements at a given location in the list, shifting subsequent elements to the right. Uses the append and insertBefore methods to assist with adding items to the front, back and middle of the list. Updates the number of elements in the list by one. public void add(int index, E item) append(item)appends elements to the end of the list, but does not update the number of elements. This is a private helper method. public void append( E item) checkIndex(index)checks if the given index is valid. Validation means that you cannot access indexes where elements have not been placed. Throws an IndexOutOfBoundsException, if invalid. This is a private helper method. private void checkIndex(int index) contains(item)searches for a specific item within the linked structure and returns true, if the item is in the list. public boolean contains(E item) clear()clears list of all elements, returns size back to zero. public void clear() detach(index)detaches the node at the specified index from list and returns the deleted element, but does not reduce the size of the list. This is a private helper method. private E detach(int index) get(index)returns the item at the specified position in the list. This method first checks if the index requested is valid. public E get(int index) indexOf(item)searches for a specific item within the linked structure and returns the first occurrence (i.e. index location) in the list, otherwise returns -1, if NOT found. public int indexOf(E item) insertBefore(index, item)inserts an item before the non-null node at the specified index in the list. Traverses the list to find this node. This method also checks for insertions at the start and end of the list, as well as when empty. This is a private helper method.
  • 4. private void insertBefore(int index, E item) isEmpty()returns true, if the list is empty, i.e., the list contains no elements. public boolean isEmpty() node(index)returns a reference to the node at the given position in the list. This node traverses the list in two directions from front to middle and back to middle. This is a private helper method. private Node node(int index) remove(index)removes the item at the given position in the list for a valid index. Checks for valid index before it proceeds with removal. Shifts subsequent elements to the left and returns the item removed. The number of elements in the list is reduced by one. public E remove(int index) remove(item)removes the first occurrence of the specified item from the list, if present. Shifts subsequent elements to the left and returns true, if the item is removed. The number of elements in the list is reduced by one. public boolean remove(E item) set(index, item)replaces the item at the specified position with the one passed. This method checks if the index requested is valid before it does the replacement and returns the replaced item. public E set(int index, E item)size()returns the number of elements in the list. public int size()toString()displays the contents of the list according to the same format at shown in the Java API. public String toString()