Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1)a) prepare a detail note on big on notation used in time and space complexity.

b) Consider integer array int. a[5][4] declared in C program. If base address is 510, determine the address of the element a[3][2] with the row major and column major representation.

c) Describe the concept of ordered list with suitable ex.

problem 2) prepare pseudo C code to multiply two sparse matrices. What is the complexity of your code.

problem 3)a) How do you sort a linked list? prepare C program to sort a linked list.

b) What are the advantages of circular linked list.

problem 4)a) prepare the steps in Pseudo C code to insert an item in doubly linked list.

b) prepare function to check whether two singly link lists are equal or not.

problem 5)a) Convert the following infix expression into postfix expression by showing contents of stack for every iteration.
(((A/(BΛC)) + (D&E)) - (A&C)).

Evaluate the postfix expression obtained by using stack for
A = 27, B = 3, C = 2, D = 3, E = 17.

b) prepare applications of stack as a data structures.

problem 6)a) What is a queue? How is it represented in 'C' using array? What are the operations to be performed to implement a queue using array? prepare pseudo codes in 'C' to implement these operations.

b) Give an ADT for queue.

problem 7)a) prepare recursive 'C' function to Determine:

i) Height of a given binary tree.

ii) Width (breadth) of a given binary tree.

problem 8)a) prepare a function for following:

i) Inorder traversal in a binary tree.

ii) Pre order traversal in a binary tree.

b) Define the following

i) Spanning tree.

ii) Graph.

problem 9)a) Describe index sequential search with ex.

b) prepare a non recursive algorithm for binary search and analyze its complexity.

problem 10)a) prepare pseudo C code for bubble sort and find out its time complexity.

b) Describe in detail Best, Worst and Average time complexity of the following

i) Quick sort.

ii) Merge sort

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95588

Have any Question? 

Related Questions in Computer Engineering

1 show that all of the stack adt operations have a constant

1. Show that all of the Stack ADT operations have a constant time in the worst case when implemented as a linked list. 2. Would it buy us anything to use a tail reference with the linked list structure used to implement ...

Repeat prob 91-8 using the complex signalprob 91-8consider

Repeat Prob. 9.1-8 using the complex signal Prob. 9.1-8 Consider a complex signal composed of a dc term and two complex exponentials Plot each N-point DFT as a function of frequency fk = k/N. (a) Compute and plot the DFT ...

Wvcc has decided to purchase a standalone firewall reread

WVCC has decided to purchase a standalone firewall. Reread the "Improved Performance and Security for the Edge of the Network" section of the chapter to understand WVCC's requirements for the firewall. Do some Internet r ...

1 what is cloud computing2 discuss the software models

1. What is cloud computing? 2. Discuss the software models predating cloud computing. 3. Discuss the major models in cloud computing. 4. What are the bene fits of cloud computing over software as a service (SaaS)?

The internet is made up of a large number of networks their

The Internet is made up of a large number of networks. Their arrangement determines the topology of the Internet. A considerable amount of information about the Internet topology is available on line. Use a search engine ...

1 suppose a notifier sends e-mail to the system

1. Suppose a notifier sends e-mail to the system administrator when a successful compromise of that system is detected. What are the drawbacks of this approach? How would you notify the appropriate user? 2. Describe a se ...

Case study - directors requirementsyour office has outgrown

Case Study - Director's Requirements Your office has outgrown its old desktop machines and is in the market for new PCs, but would like some guidance on what to purchase. The Director wants to ensure that the office obta ...

Read the scenario carefully and then discuss how the

Read the scenario carefully and then discuss how the concepts of confidentiality, integrity, and availability relate to the value of each asset. For example, the school would normally have the student's health records. W ...

1 describe the critical characteristics of information how

1. Describe the critical characteristics of information. How are they used in the study of computer security? 2. Identify the six components of an information system. Which are most directly affected by the study of comp ...

1 in a connection the value of cwnd is 3000 and the value

1. In a connection, the value of cwnd is 3000 and the value of rwnd is 5000. The host has sent 2000 bytes, which have not been acknowledged. How many more bytes can be sent? 2. A client uses TCP to send data to a server. ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro