1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zavuch27 [327]
4 years ago
14

Write the getNumGoodReviews method, which returns the number of good reviews for a given product name. A review is considered go

od if it contains the string "best" (all lowercase). If there are no reviews with a matching product name, the method returns 0. Note that a review that contains "BEST" or "Best" is not considered a good review (since not all the letters of "best" are lowercase), but a review that contains "asbestos" is considered a good review (since all the letters of "best" are lowercase). Complete method getNumGoodReviews. /** Returns the number of good reviews for a given product name, as described in part (b). */ public int getNumGoodReviews(String prodName)
Computers and Technology
1 answer:
Naya [18.7K]4 years ago
3 0

Answer:

Check the explanation

Explanation:

ProductReview.java

public class ProductReview {

  private String name;

  private String review;

 

  public ProductReview(String name, String review) {

      super();

      this.name = name;

      this.review = review;

  }

  public String getName() {

      return name;

  }

  public String getReview() {

      return review;

  }

 

 

}

ReviewCollector.java

import java.util.ArrayList;

public class ReviewCollector {

  private ArrayList<ProductReview> reviewList;

  private ArrayList<String> productList;

  public ReviewCollector(ArrayList<ProductReview> reviewList, ArrayList<String> productList) {

      super();

      this.reviewList = reviewList;

      this.productList = productList;

  }

  public void addReview(ProductReview prodReview) {

      this.reviewList.add(prodReview);

  }

  public int getNumGoodReviews(String prodName) {

      int count = 0;

      ArrayList<ProductReview> set = new ArrayList<>();

      for (int i = 0; i < reviewList.size(); i++) {

          if (reviewList.get(i).getName().compareToIgnoreCase(prodName) == 0) {

              set.add(reviewList.get(i));

          }

      }

      if(set.size()==0)

          return count;

     

      for (int i = 0; i < set.size(); i++) {

          if (set.get(i).getReview().contains("best")) {

              count++;

          }

      }

      return count;

  }

}

You might be interested in
Expalin the defference between the driver of a desktop and a laptop​
Pani-rosa [81]

Answer:

None, drivers are hardware specific, if both devices share the same hadware manufacurer they tend to have the same drivers.

A driver is a software component that lets the operating system and a device communicate with each other. So asking for a difference in drivers is as asking the difference in hardware in both devices, though one tends to be more intergrated they are all the same in low level functions

Also drivers might not even communicate directly with the device but send a request. thats why some drivers can be written directly into an operating system.

7 0
3 years ago
How does technology improve productivity at home? (Select all that apply.)
Aliun [14]

Answer:

B, C

Explanation:

?

5 0
3 years ago
How serious are the risks to your computer security?
ASHA 777 [7]

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

<h3>What are the risk results for information and computer security?</h3>

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

brainly.com/question/12010892

#SPJ1

6 0
2 years ago
Although females are born with approximately 2 million ova, this number declines to
Pepsi [2]

Answer: 1

Explanation:

a woman is born with about 1-2million ova, during puberty this figure reduce to between 600,000 and 1million. during her child bearing years the figure drops down to about 300,000 to 400,000 ova, out of which only about 500 would be ovulated during her reproductive years. the rest die out during menopause.

8 0
3 years ago
Add the following line of code to the end of your script, replacing any function calls: nested_sum( eval(input()) )
masha68 [24]

The program is an illustration of loops; Loops are program statements used for repetition of operations

<h3>How to complete the code?</h3>

The complete question is added as an attachment

The code written in Python that completes the missing parameters in the question are:

def nested_sum(mylist):

   total = 0

   for other_list in mylist:

       total += sum(other_list)        

   print(total)

   

t = [[1,2],[3],[4,5,6]]

nested_sum(t)

nested_sum( eval(input()))

Read more about loops at:

brainly.com/question/24833629

#SPJ11

8 0
2 years ago
Other questions:
  • What is a different paragph formatting tools
    6·1 answer
  • You are building a gaming computer and you want to install a dedicated graphics card that has a fast GPU and 1GB of memory onboa
    6·1 answer
  • ​What is a combination of one or more related characters or bytes and is the smallest unit of data a user accesses?
    8·1 answer
  • Which scientific tool would be primarily used by scientists?
    12·2 answers
  • What is the significance of the following terms A A L U control unit in the CPU​
    13·1 answer
  • Discuss the causes ,symptoms, preventive measures and treatment of AIDS​
    6·2 answers
  • Identify the problems that computer program bugs can cause. Check all that apply.
    9·2 answers
  • Jennifer has written a short story for children. What should be her last step before she submits the story for publication?
    6·1 answer
  • 1. What is the difference between background sound and nat sound
    15·1 answer
  • Networks that are designed to connect similar computers that share data and software with each other are called:_______
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!