BEST代写-线上编程学术专家

Best代写-最专业靠谱代写IT | CS | 留学生作业 | 编程代写Java | Python |C/C++ | PHP | Matlab | Assignment Project Homework代写

C++代写 | C++ Implementation of Hash table with linear probing

C++代写 | C++ Implementation of Hash table with linear probing

You are asked to use C++ to implement
• Hash table with linear probing
2 Submission Guideline
You must follow this guideline! Your submission will be marked automatically. Failure to
follow this guideline will result in 0.
Your submission should contain exactly one le: main.cpp.
You do not need to submit a design.
You are asked to implement a very speci c hash table. The keys are lower-case English words (e.g., apple,
pear). The length of a key is at most 10. The hash function is \simply using the last character”. That is,
the hash value of apple should be e, and the hash value of pear should be r. Your hash table contains exactly
26 slots (hash value a to hash value z). The total number of English words/keys you need to deal with is at
most 26, so the table is never too small.
A table slot has three di erent statuses: \never used”, \tombstone”, and \occupied”. Table starts with
26 \never used” slots.
Searching works as follows: given a key, take its last character as the hash value. First try the corre-
sponding table slot, if the objective key is there, then you have found it. If the corresponding slot is never
used, terminate because we are certain that the objective is not in the table. If the slot is occupied but it’s
not the objective, or the slot is a \tombstone”, then we move on to the next slot (may need to wrap around
the table if the current slot is the last one). We keep trying until we either nd the key or are certain that
the key does not exist in the table.
Insertion works as follows: First perform searching to ensure that the key does not exist. If it already
exists, then do nothing. If it does not, take the last character of a key as the hash value. If the corresponding
table slot is not occupied (either \never used” or \tombstone”), put the key there (the slot is now occupied).
If the corresponding slot is already occupied, try the next slot. Repeat trying until you nd an unoccupied
slot.
Deletion works as follows: given a key, use the searching process to locate its slot. (If the key is not in
the table, then do nothing.) Once you nd the key, change the slot status to \tombstone”.
You should start your program by initializing an empty hash table. Your program takes one line as
input. The input line contains n \modi cation moves” separated by spaces (1  n  26). The available
modi cation moves are
• AWord (Character A followed by a lower-case English word of length at most 10): Aapple means insert
key apple into the hash table. If apple is already in the table, do nothing.
• DWord (Character D followed by a lower-case English word of length at most 10): Dapple means delete
key apple from the hash table. If apple is not in the tree, do nothing.

At the end, you need to go through the slots from a to z, and output all the keys separated by space.
You don’t need to worry about invalid inputs.
Sample input 1: Aaaa Accc Abbb
Sample output 1: aaa bbb ccc
Sample input 2: Abba Aaaa Acca
Sample output 2: bba aaa cca
Sample input 3: Abba Aaaa Acca Daaa
Sample output 3: bba cca
3 Marking
Marking will be done automatically. The total mark is 10 (1 for compiling and 9 for 9 test cases).
4 SVN Instructions
First of all, you need to create a directory under version control:
aXXXXXXX should be your student ID. The directory path needs to be exactly \2021/s1/adsa/assignmentK”,
where \K” is the assignment number. To check out a working copy, type
Commit the les to SVN:
SVN helps keeping track of le changes (over di erent commits). You should commit your work early and
often.
5 Websubmission