Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1) Count the number of zeros in 69!.

problem 2) A magic square is the square matrix of integers such that sum of every row, the sum of every column and sum of each of the diagonal are same. Such a magic square is given below:

8 1 6
3 5 7
4 9 2

prepare a program to show a magic square.

problem 3) Find out a appropriate representation for polynomials in the single variable based on arrays. A polynomial p(x) is of the form: 5 x 3 - 10 x + 23. prepare the program that given p(x) and a point, say x = 1, determine the value of p(x) at that point. Like, the value of the polynomial 5 x 3 - 10 x + 23 at x = 1 is 18.

Given two polynomials, prepare different functions for performing polynomial arithmetic involving operations of +, - and *. Or, prepare the complete definitions of the following function prototypes:

void add ( float *p, degp, float *q, degq, float *res, degres );
void sub ( float *p, degp, float *q, degq, float *res, degres );
void mult ( float *p, degp, float *q, degq, float *res, degres );

where p, q and polynomials with degrees 'degp' and 'degq' respectively and res is resulting polynomial of degree degres that holds after the polynomial arithmetic +, -, *

problem 4) This assignment deals with creating data structure for large numbers (nonnegative). You have to read from an input file, say, "input", data of the following type:

980089673400089200098129823 # 120006734009867453400 #


1000000000000000000209 #

34567892 #

Note that every big number is followed by hash(#) symbol as shown above. Furthermore digits of the big number are consecutive ( you may suppose this to be always true in the input if which simplifies the design ). Neither the number of digits in a big number is known apriori nor is the number of such large numbers in the input file.

Program must read such input file and produce output file of the following form:

/* Output From Program */

Big Number 1 : 27 digits : 980089673400098200098129893

Big Number 2 : .......................................

Note that representation selected for a big number is to be a linked list each of whose node must contain certain fragments of the large number. A possible representation is outlined below but you may select a different one if you so please. A node may be defined as:

i) a short integer and a

ii) link.

Data of the first node must hold the no. of digits in the number; data of remaining nodes would store 4 consecutive digits of the large number. The internal representation for the first input number would be:

27 -> 9800 -> 8967 -> 3400 -> 982 -> 9 -> 8129 -> 893

Though, when you generate back the number, you have to account for the missing zeros in the above representation. You may select to read the input as a character array, convert to numbers as you proceed and assemble the linked list.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96223

Have any Question? 

Related Questions in Computer Engineering

Abc corp mines copper with xed costs of 060lb and variable

ABC Corp. mines copper, with ?xed costs of $0.60/lb and variable cost of $0.30/lb. The 1-year forward price of copper is $1.10/lb. The 1-year effective annual interest rate is 6.2%. One-year option prices for copper are ...

1 what does a typical mdm solution include2 list and

1. What does a typical MDM solution include? 2. List and discuss vendors of MDM 3. Discuss the Windows Mobile security model, authentication services, Credential Manager, cryptography, and LASS application development an ...

1 both acls and c-list entries use owners users rather than

1: Both ACLs and C-List entries use "owners" (users) rather than individual processes. Why? 2: Alice can read and write to the file x, can read the file y, and can execute the file z. Bob can read x, can read and write t ...

A read hit occurs in way2 of set 17 within an 8-way set

A read hit occurs in way2 of set 17 within an 8-way set associative cache that uses a line size of 128 bytes. The total number of lines in the cache is 32768. The system employs 32-bit addresses and the tag for way2 with ...

Assignment 1information security within organizations has

Assignment 1 Information security within organizations has evolved and has become much more complex.  In a written paper, answer the following questions:  How has computer security evolved into modern information securit ...

Purposedemonstrate the ability to implement and use

Purpose Demonstrate the ability to implement and use structured data types utilizing the facilities of the C programming language. Assignment Write a program that simulates a soft drink machine. Your program will consist ...

1 which security protocols are used to protect e-mail2

1. Which security protocols are used to protect e-mail? 2. IPSec can be used in two modes. What are they? 3. Which kind of attack on cryptosystems involves using a collection of pre-identified terms? Which kind of attack ...

1 determine the picker route in the storage zone of the

1. Determine the picker route in the storage zone of the French warehouse of the Guillen company (see given figure), using the S-shaped heuristic, the largest gap heuristic, the combined heuristic and the aisle-by-aisle ...

Using figure 2419 explain how flow control can be achieved

Using Figure 24.19, explain how flow control can be achieved at the sender site in TCP (from the sending TCP to the sending application). Draw a representation.

The fibonacci sequence starts 1 1 2 3 5 8 each number in

The Fibonacci sequence starts 1, 1, 2, 3, 5, 8, . . .. Each number in the sequence (after the first two) is the sum of the previous two. Write a program that computes and outputs the nth Fibonacci number, where n is a va ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen