Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem:

1) prepare down the pseudo code for merge sort algorithm and using bellow array values perform the merge sort algorithm. Provide all the steps and describe them.

8  2  9  7  3  10  2  5

2) prepare down the pseudo code for selection sort algorithm and using bellow array values perform the selection sort algorithm. Provide all the steps and describe them.

28  75  93  12  8  55  71  34  47  83

3) Consider the values for the array L = {2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20} and Implement a binary search on an ordered array. Compare the number of key comparisons and prepare down all the necessary steps to search values 3, 18 and 1 using binary search.

4)

A) Following data is inserted to a binary tree. Draw the binary tree after inserting data and describe the inserting methodology.

77  94  41  112  155  21  56  99  47  83

B) Print the data that you have inserted in part (A) in the following strategies.

•    Inorder
•    Preorder 
•    Postorder

C) What are the facts you should take into consideration when deleting a node from a binary tree. describe clearly for different situations with exs.

problem:

You are required to prepare a menu driven program which will maintain a list of car models, their price, name of the manufacturer, engine capacity etc., as a doubly linked list. The menu should make provisions for inserting information pertaining to new car models, delete obsolete (outdated) models, and update data such as price besides answering queries such as listing all car models within a price range specified by the user and listing all details given a car model.

1) Design the algorithms that required in above scenario. 
2) Implement the above program with the required algorithms by using an executable programming language (Java/C++).
3) Provide evidence and solutions for error handling during software implementation.
4) Carry out testing on implemented solution and provide evidence by including suitable screenshots.

problem:

1) Identify a method to count and record the number of occurrences of each vowel in uppercase or lowercase in any given paragraph. describe it.

2) Implement an algorithm to achieve above describeed method using suitable programming language. Paragraph is given below.

“A data structure is an arrangement of data in a computer's memory or even disk storage. An ex of several common data structures are Arrays, Linked Lists, Queues, Stacks, Binary Trees, and Hash Tables. Algorithms, on the other hand, are used to manipulate the data contained in these data structures as in searching and sorting. Many algorithms apply directly to a specific data structures.” Output must print the following lines, inserting the number of appearances of the vowel in lowercases and uppercases, and the total appearances.

A: __ Lowercase , __ Uppercase , __ Total
E: __ Lowercase , __ Uppercase , __ Total
I : __ Lowercase , __ Uppercase , __ Total
O: __ Lowercase , __ Uppercase , __ Total
U: __ Lowercase , __ Uppercase , __ Total

3) Identify different methods to reverse a String. describe all the identified methods.

(Note: student should describe at least two different methods and student can use any data structure to reverse a String value)

4) Implement a method to reverse any String Value by using String operations and String manipulation. 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9108

Have any Question? 


Related Questions in Computer Engineering

In a company all files which are sent on the network are

In a company, all files which are sent on the network are automatically encrypted by using AES-128 in CBC mode. A fixed key is used, and the IV is changed once per day. The network encryption is file-based, so that the I ...

Assignmentbullcreate an array of peoples first names using

Assignment • Create an array of people's first names. Using a loop, read the names from a text (txt) file, and store each one into the array. The array should allow for a maximum of 100 entries. Continue to read in first ...

1 http version 11 defines the persistent connection as the

1. HTTP version 1.1 defines the persistent connection as the default connection. Using RFC 2616, find out how a client or server can change this default situation\ to nonpersistent. 2. In SMTP, a sender sends unformatted ...

1 choose three software solutions based on self-regulation

1. Choose three software solutions based on self-regulation. Study the solutions and discuss how they work. 2. Study the various forms of activism. Comment on the effectiveness of each. 3. Software rating, although helpf ...

Abstract data types adts are very important as they serve

Abstract data types (ADTs) are very important as they serve as programming tools that enable component reuse and encapsulation. This assignment requires students to create, implement and apply ADTs in an application.The ...

The stream cipher described in definition 211 can easily be

The stream cipher described in Definition 2.1.1 can easily be generalized to work in alphabets other than the binary one. For manual encryption, an especially useful one is a stream cipher that operates on letters. 1. De ...

1 discuss the differences between clouding computing and

1. Discuss the differences between clouding computing and virtualization. 2. Discuss four business applications best suited for cloud computing. 3. To determine what business applications should go on the cloud, you need ...

1 in chapter 1 we mentioned that the tcpip suite unlike the

1. In Chapter 1, we mentioned that the TCP/IP suite, unlike the OSI model, has no session layer. But an application-layer protocol can include some of the features defined in this layer if needed. Does SMTP or POP3 have ...

1 what are the types of password attacks what can a systems

1. What are the types of password attacks? What can a systems administrator do to protect against them? 2. What is the difference between a denial-of-service attack and a distributed denial-of-service attack? Which is mo ...

1 why are the marginal benefit and marginal abatement cost

1. Why are the marginal benefit and marginal abatement cost of pollution considered equivalent? 2. How do regulators use Pigouvian taxes to produce efficient outcomes? 3. Describe how tradable pollution permits can be us ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen