Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: Translate the given formula into a prefix form expression in Scheme:

1844_prefix form expression.jpg

problem 2: Define a procedure which takes three numbers as arguments and returns the sum of the squares of two larger numbers.
 
problem 3: Consider the given mathematical function:

1345_mathematical function.jpg

(a) prepare a procedure which computes f by means of the recursive process.
(b) prepare a procedure which computes f by means of the iterative process.
 
problem 4: Each of the given two procedures defines a method for adding two positive integers in terms of procedures inc, which increments its argument by 1, and dec, which decrements its argument by 1:

(define (plus1 a b)
(if (= a 0)
b
(inc (plus1 (dec a) b))))
 
(define (plus2 a b)
(if (= a 0)
b
(plus2 (dec a) (inc b))))

 
By using the substitution model, describe the process generated by each procedure in evaluating (+ 2 5). Are such processes iterative or recursive?
 
problem 5:

a) prepare a recursive procedure (digits n) which computes the number of digits in the integer n by using a linear recursive process. For illustration, (digits 42) must return 2 and (digits 13579) must return 5.

b) Reprepare (a) in such a way that a linear iterative process is produced. Call the procedure digits-it.

c) By using the substitution model, illustrate that your procedure in (b) generates a linear iterative process.
 
problem 6: Simpson's Rule is a more accurate method of numerical integration. By using Simpson's Rule, the integral of a function f between a and b is approximated as:

504_simpsons rule.jpg

where  h = (b  -  a)/n, for some even integer n, and yk= f(a + kh). (Increasing n increases the accuracy of the approximation.)

Define a procedure which takes as arguments f, a, b, and n and returns  the value of the  integral, computed by using Simpson's Rule. Use your process to integrate cube between 1 and 2  (with n = 100 and n = 1000)

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91838

Have any Question? 


Related Questions in Computer Engineering

1 why shouldnt an organization give an employee candidate a

1. Why shouldn't an organization give an employee candidate a tour of secure areas during the candidate's interview? 2. List and describe the typical relationships that organizations have with nonemployees. What are the ...

1 some have described social engineering as being

1. Some have described social engineering as being perpetuated by our internal fears. Discuss those fears. 2. What is the role of software security testing in the process of finding solutions to system vulnerabilities?

Create two pairs of sets using both the hash table

Create two pairs of sets using both the hash table implementation and the bit array implementation. Both implementations should use the same sets. Using the Timing class, compare the major operations (union, intersection ...

1 the second line of the web server starting script puts

1. The second line of the Web server starting script puts the process ID number of the Web server wrapper into a file. Why? 2. This exercise reconsiders the use of NIS to distribute user information such as password hash ...

Design the following functions and call them in main1 int

Design the following functions and call them in Main 1) int get_student_data(void): This function asks the user to enter the student ID, Quiz, Test, Recitation, Final scores etc and prints them in a file "Stu_score.txt". ...

Write a method randomshape that randomly generates objects

Write a method randomShape that randomly generates objects implementing the Shape interface: some mixture of rectangles, ellipses, and lines, with random positions. Call it 10 times and draw all of them.

Individual visual logic calculationsselect two calculation

Individual: Visual Logic: Calculations? Select two calculation tasks that a program could perform that could be used by a small business. Each task must include the following: • Inputting a value • Performing a calculati ...

You can use a stack to check if a programming statement or

You can use a Stack to check if a programming statement or a formula has balanced parentheses. Write a Windows application that provides a text box for the user to enter an expression with parenthesis. Provide a Check Pa ...

Background informationfor this assignment you need to write

Background information For this assignment you need to write a console application in the Java programming language which implements a simulation for a movie borrowing and return system for the video store MovieMaster. T ...

1 although we discussed several sources of security threats

1. Although we discussed several sources of security threats, we did not exhaust all. There are many such sources. Name and discuss five. 2. We pointed out that the design philosophy of the Internet infrastructure was pa ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro