Ask Question, Ask an Expert


Ask Computer Engineering Expert

1)(i) Derive the ADT to execute insertion and deletion in the singly linked list.

(ii) Describe cursor implementation of linked lists. prepare down the necessary operations.

2)(i) prepare down an ADT to execute stack of size N using an array. The elements in the stack are to be integers. The operations to be supported are PUSH, POP and DISPLAY. Take into account the exceptions of stack overflow and stack underflow.

(ii) Circular queue has the size of 5 and has 3 elements 10, 20 and 40 where F = 2 and R = 4. After inserting 50 and 60, find is the value of F and R. Trying to insert 30 at this stage what happens? Delete two elements from queue and insert 70, 80 & 90. Illustrate the sequence of steps with essential diagrams with the value of F & R

3)(i) prepare down an ADT to construct an AVL tree.

(ii) Assume the following sequences list nodes of a binary tree T in preorder and inorder, respectively:

Preorder: A, B, D, C, E, G, F, H,J
Inorder: D, B, A, E, G, C, H, F, J

Design the diagram of the tree.

4)(i) prepare down an ADT for performing insert and delete operations in a Binary Search Tree.

(ii) describe in detail binary heaps. Construct a min heap tree for the following:
5, 2, 6,7, 1, 3, 8, 9, 4

5)(i) Create the ADT to execute separate chaining hashing scheme.

(ii) Illustrate the result of inserting the keys 2, 3, 5, 7, 11, 13, 15, 6, 4 into the initially empty extendible hashing data structure with M = 3.

6) (i) Create an ADT to perform for the Union and find operations of disjoint sets.

(ii) describe about Union-by-rank and determine with path compression with code.

7) (i) prepare routines to determine shortest path using Dijkstra’s algorithm.

(ii) Determine all articulation points in the below graph. Illustrate the depth first spanning tree and the values of DFN and Low for each vertex.

8)(i) prepare down the pseudo code to determine a minimum spanning tree using Kruskal’s algorithm.

(ii) Determine the topological ordering of the below graph.

9)(i) Describe the running time of Divide-and-Conquer merge sort algorithm.

(ii) Describe the concept of greedy algorithm with Huffman codes ex.

10) Describe the Dynamic Programming with suitable ex.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M910318

Have any Question? 

Related Questions in Computer Engineering

Consider the following scenariojason from the designer

Consider the following scenario: Jason from the designer group submitted a ticket with your companies IT Help Desk stating that he could no longer access the Internet. Whenever he types a website name into his web browse ...

You are designing a controller for a tiny cache that is

You are designing a controller for a tiny cache that is fully associative but has only three words in it. The cache has an LRU replacement policy. A reference record module (RRM) monitors references to the cache and alwa ...

1 write and test a function removeduplicatessomelist that

1. Write and test a function removeDuplicates(somelist) that removes duplicate values from a list. 2. One disadvantage of passing a function to the list sort method is that it makes the sorting slower, since this functio ...

1 what is a footprint2 what is the relationship between the

1. What is a footprint? 2. What is the relationship between the Van Allen belts and satellites? 3. Compare an uplink with a downlink. 4. What is the purpose of GPS? 5. What is the main difference between Iridium and Glob ...

The algorithm we have developed may not reproduce the

The algorithm we have developed may not reproduce the original text if the output was used as input. This would happen because if there was a space at the end of an input line it would be turned into two spaces in the re ...

Calculate the cpi for the system listed above assuming that

Calculate the CPI for the system listed above assuming that there are no accesses to I/O. What is the CPI if the VMM performance impact doubles? If it is cut in half? If a virtual machine software company wishes to obtai ...

1 discuss the basic components of cryptography2 discuss the

1. Discuss the basic components of cryptography. 2. Discuss the weaknesses of symmetric encryption. 3. Discuss the weaknesses of public-key encryption. 4. Why is a hybrid cryptosystem preferred over symmetric and public- ...

Building one model from another related to exploration 15

Building one model from another Related to exploration 15, more generally, another way to build a model of a phenomenon you wish to model is to take a model that you already have that uses a similar mechanism to the mode ...

1 what mac protocol is used in the baseband layer of

1. What MAC protocol is used in the baseband layer of Bluetooth? 2. What is the role of the L2CAP layer in Bluetooth? 3. In an 802.11, give the value of the address 1 field in each of the following situations (left bit d ...

1 complete the tutorials that are available in the netlogo

1. Complete the tutorials that are available in the NetLogo User Manual. 2. Look over the models in the Sample Models section of the NetLogo models library. The models are grouped by subject area. Pick out a model you fi ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro