Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: Show that we can represent pairs of non-negative integers by using only numbers and arithmetic operations if we represent the pair a and b as the integer that is the product 2a3b. Give the corresponding definitions of procedures cons, car, and cdr.
 
problem 2: Make a Money data structure which is made up of amount and currency.

a) prepare a constructor for this data structure.
 
b) Make accessors for this data structure.

c) prepare operations convert-money (takes a Money object and a currency symbol and returns the Money object of the requested currency), add-money and subtract-money (add and subtract Money objects possibly from various currencies and return a Money object with currency of the first Money object argument).

problem 3: This problem deals with the AVL trees. You should use mutable pairs or lists to implement this data structure:

a) Define a procedure called make-avl-tree that makes an AVL tree with one node. As well create another constructor build-avl-tree which creates an AVL tree from a root, left subtree and right subtree. The constructors return an AVL tree object.
 
b) Make procedures for accessing the root, left subtree and right subtree, and as well mutators for changing the root, left subtree and right subtree of an avl argument.
 
c) prepare a procedure called (insert n t). This procedure consists of 2 arguments: n is the value being inserted and t is the AVL tree.
 
d) prepare a procedure called (lookup n t). This procedure consists of 2 arguments: n is the value being looked up and t is the AVL tree. The subtree with n as its root is returned (or '() if no such node is found).
 
e) prepare a procedure called (print-as-list t). This procedure prints the AVL tree passed in t as a regular list (not a mutable list).
 
f) prepare down a procedure called (print-inorder t). This procedure prints the AVL tree passed in t in inorder traversal form.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91840

Have any Question? 


Related Questions in Computer Engineering

1 virtual security seems to work in some systems why is

1. Virtual security seems to work in some systems. Why is this so? Can you apply it in a network environment? Support your response. 2. Security best practices are security guidelines and policies aimed at enhancing syst ...

Ups system integration challengesafter you have read the

UPS system integration challenges After you have read the case study, answer the following questions: 1. What are some of the system integration challenges faced by UPS? 2. Discuss the systems integration solutions at UP ...

1 draw the recursive call tree for the printrev function

1. Draw the recursive call tree for the printRev() function from Section 10.1 when called with a value of 5. 2. Determine the worst case run time of the recursive factorial function. 3. Determine the worst case run time ...

Compare and contrast traditional outsourcing with the

Compare and contrast traditional outsourcing with the Software as a Service. Under what conditions do you think a company should choose SaaS over traditional outsourcing? Explain your views and discuss them with your pee ...

Library research assignmentintroductionyou are to complete

Library Research Assignment Introduction You are to complete a research assignment during weeks 6-7, after a Librarian visits the class and shows various research strategies and tools during a one hour long class present ...

1 are the helo and mail from commands both necessary in

1. Are the HELO and MAIL FROM commands both necessary in SMTP? Why or why not? 2. In Figure 26.13 in the text, what is the difference between the MAIL FROM in the envelope and the FROM in the header?

Write a program named intarraydemo that stores an array of

Write a program named IntArrayDemo that stores an array of 10 integers. Until the user enters a sentinel value, allow the user three options: (1) to view the list in order from the first to last position, (2) to view the ...

Assume we have 20 hosts in a small as there are only four

Assume we have 20 hosts in a small AS. There are only four groups in this AS. Find the number of spanning trees in each of the following approaches: a. source-based tree b. group-shared tree

1 what drawbacks to symmetric and asymmetric encryption are

1. What drawbacks to symmetric and asymmetric encryption are resolved by using a hybrid method like Diffie Hellman? 2. What is steganography, and what can it be used for? 3. Which security protocols are predominantly use ...

How do you make a module in ms acessattached is a database

How do you make a module in MS Acess Attached is a database with modules that were done for me I need directions , how and why these are built .I am trying to understand VBA and programing better. Attachment:- info262_rm ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen