Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem:

1) prepare down the pseudo code for merge sort algorithm and using bellow array values perform the merge sort algorithm. Provide all the steps and describe them.

8  2  9  7  3  10  2  5

2) prepare down the pseudo code for selection sort algorithm and using bellow array values perform the selection sort algorithm. Provide all the steps and describe them.

28  75  93  12  8  55  71  34  47  83

3) Consider the values for the array L = {2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20} and Implement a binary search on an ordered array. Compare the number of key comparisons and prepare down all the necessary steps to search values 3, 18 and 1 using binary search.

4)

A) Following data is inserted to a binary tree. Draw the binary tree after inserting data and describe the inserting methodology.

77  94  41  112  155  21  56  99  47  83

B) Print the data that you have inserted in part (A) in the following strategies.

•    Inorder
•    Preorder 
•    Postorder

C) What are the facts you should take into consideration when deleting a node from a binary tree. describe clearly for different situations with exs.

problem:

You are required to prepare a menu driven program which will maintain a list of car models, their price, name of the manufacturer, engine capacity etc., as a doubly linked list. The menu should make provisions for inserting information pertaining to new car models, delete obsolete (outdated) models, and update data such as price besides answering queries such as listing all car models within a price range specified by the user and listing all details given a car model.

1) Design the algorithms that required in above scenario. 
2) Implement the above program with the required algorithms by using an executable programming language (Java/C++).
3) Provide evidence and solutions for error handling during software implementation.
4) Carry out testing on implemented solution and provide evidence by including suitable screenshots.

problem:

1) Identify a method to count and record the number of occurrences of each vowel in uppercase or lowercase in any given paragraph. describe it.

2) Implement an algorithm to achieve above describeed method using suitable programming language. Paragraph is given below.

“A data structure is an arrangement of data in a computer's memory or even disk storage. An ex of several common data structures are Arrays, Linked Lists, Queues, Stacks, Binary Trees, and Hash Tables. Algorithms, on the other hand, are used to manipulate the data contained in these data structures as in searching and sorting. Many algorithms apply directly to a specific data structures.” Output must print the following lines, inserting the number of appearances of the vowel in lowercases and uppercases, and the total appearances.

A: __ Lowercase , __ Uppercase , __ Total
E: __ Lowercase , __ Uppercase , __ Total
I : __ Lowercase , __ Uppercase , __ Total
O: __ Lowercase , __ Uppercase , __ Total
U: __ Lowercase , __ Uppercase , __ Total

3) Identify different methods to reverse a String. describe all the identified methods.

(Note: student should describe at least two different methods and student can use any data structure to reverse a String value)

4) Implement a method to reverse any String Value by using String operations and String manipulation. 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9108

Have any Question? 


Related Questions in Computer Engineering

An airplane has an airspeed of 550 kmh bearing 48degreesdeg

An airplane has an airspeed of 550 km/h bearing 48degrees° north of east. The wind velocity is 50 km/h in the direction 26° north of west. Find the resultant velocity representing the path of the airplane with respect to ...

1 what is security assessment why is it important2 discuss

1. What is security assessment? Why is it important? 2. Discuss the necessary steps in analyzing the security state of an enterprise. 3. What is security assurance? How does it help in enterprise security? 4. What is sec ...

Given that all ascii codes are less than 128 design an

Given that all ascii codes are less than 128, design an algorithm that reads a given set of data and decides whether or not it may contain decimal data.

The isvalidsource function can be used to evaluate a c

The isValidSource() function can be used to evaluate a C++ source file, but it is incomplete. Brackets encountered inside comments and literal strings would not be paired with those found elsewhere in the program. (a) C+ ...

Consider an ltid system specified by the equation yn 1 -

Consider an LTID system specified by the equation y[n + 1] - 0.5y[n] = x[n + 1] + 0.8x[n]. (a) Determine and sketch the magnitude and the phase responses. (b) Find the system response y[n] to the input x[n] = cos(0.5n - ...

1 write a regular expression that finds all the words in a

1. Write a regular expression that finds all the words in a string that contain double letters, such as "deep" and "book". 2. Write a regular expression that finds all the header tags (, , etc.) in a Web page. 3. Write a ...

What is the relationship between hvac and physical security

What is the relationship between HVAC and physical security? What four physical characteristics of the indoor environment are controlled by a properly designed HVAC system? What are the optimal temperature and humidity r ...

1 using the resources available in your library find out

1. Using the resources available in your library, find out what laws your state has passed to prosecute computer crime. 2. Using a Web browser go to www.eff.org. What are the current top concerns of this organization?

Matlabs fft command computes the dft of a vector x assuming

MATLAB's fft command computes the DFT of a vector x assuming that the first sample occurs at time n = 0. Given that X = fft(x) has already been computed, derive a method to correct X to reflect an arbitrary starting time ...

In an 80211 communication the size of the payload frame

In an 802.11 communication, the size of the payload (frame body) is 1200 bytes. The station decides to fragment the frame into three fragments, each of 400 payload bytes. Answer the following questions: a. What would be ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro