Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: Find the minimum weighted path length P for six weights 4, 15, 25, 5, 8, 16. Draw the huffman tree also for the given weights. Find the huffman code for each weight.

problem 2: Find the Inorder, preorder and postorder traversal for the given tree:

1667_tree.jpg

problem 3: Convert the following expressions in binary expression tree.

A - (B*C) + D $ (E*F)
(b) (A-B) * (B-C)/(C-D)
(c)  (3x+4y) - (5x/7y)2

After constructing the expression tree find the inorder, preorder and postorder traversals.

problem 4:

(a) Create a binary tree. Given,

Post Order: D H I E A J F N P G C B.
Inorder: D H A I E B F J C N G P

(b) Create  a binary tree. Given,
Preorder: D B C A G E F H I J.
Inorder: B C D G E A H F I J

(c) Create a binary tree. Given,
Preorder: K A E F C D H L B
Inorder: E A C F K H D B L

problem 5: Perform the following operations in BST:

Insert Z, A, C, D, B, E, F, N, M, P, T, U, R, O, Q.
Delete M and then D.

problem 6: Construct an AVL tree by inserting the following elements in order of their occurrences: 44, 10, 11, 96, 7, 14, 53, 47, 50, 101, 4, 1

Then Delete 7, Delete 47 and then delete 101.

problem 7: A 3 way search tree constructed out of an empty search tree with following keys in order as given: D, K, P, V, A, G. Then Delete A and K.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91719

Have any Question? 


Related Questions in Computer Engineering

1 what are the various types of malware how do worms differ

1. What are the various types of malware? How do worms differ from viruses? Do Trojan horses carry viruses or worms? 2. Why does polymorphism cause greater concern than traditional malware? How does it affect detection?

1 assuming there are no stalls or hazards what is the

1. Assuming there are no stalls or hazards, what is the utilization of the data memory? 2. Assuming there are no stalls or hazards, what is the utilization of the write-register port of the "Registers" unit? 3. Instead o ...

For a network with about 150 people what network devices ie

For a network with about 150 people. What network devices (i.e router, switches, APs), security devices (i.e Firewall), network services (i.e DHCP, file, active directory) would you recommend using and why?

Design and implement a merging algorithm that uses only two

Design and implement a merging algorithm that uses only two arrays. It can be assumed that the sizes of the two data sets are known in advance. An interesting way to do this is to place the array with the biggest element ...

Louis reasoner has just read an advertisement for a raid

Louis Reasoner has just read an advertisement for a RAID controller that provides a choice of two configurations. According to the advertisement, the first configuration is exactly the RAID 4 system described in Section ...

1 how is an sts multiplexer different from an adddrop

1. How is an STS multiplexer different from an add/drop multiplexer since both can add signals together? 2. What is the relationship between STS signals and OC signals? 3. What is the purpose of the pointer in the line o ...

Rewrite exercise 2 using the sortedlist classexercise

Rewrite Exercise 2 using the SortedList class. Exercise 2 Write a program that stores names and phone numbers from a text file in a dictionary, with the name being the key. Write a method that does a reverse lookup, that ...

1 rewrite the computer terms glossary application using the

1. Rewrite the computer terms glossary application using the customdesigned Hash class developed in the chapter. Experiment with different hash functions and collision-resolution strategies. 2. Using the Hashtable class, ...

1 is the use of checksum for error control optional or

1. Is the use of checksum for error control optional or mandatory in a. UDP? b. TCP? 2. Assume a TCP server expects to receive byte 2001, but it receives a segment with sequence number 2200. What is the reaction of the T ...

1 what is a communication protocol2 why do we need

1. What is a communication protocol? 2. Why do we need communication protocols? 3. List the major protocols discussed in this chapter. 4. In addition to ISO and TCP/IP, what are the other models?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro