Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem:

1) prepare down the pseudo code for merge sort algorithm and using bellow array values perform the merge sort algorithm. Provide all the steps and describe them.

8  2  9  7  3  10  2  5

2) prepare down the pseudo code for selection sort algorithm and using bellow array values perform the selection sort algorithm. Provide all the steps and describe them.

28  75  93  12  8  55  71  34  47  83

3) Consider the values for the array L = {2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20} and Implement a binary search on an ordered array. Compare the number of key comparisons and prepare down all the necessary steps to search values 3, 18 and 1 using binary search.

4)

A) Following data is inserted to a binary tree. Draw the binary tree after inserting data and describe the inserting methodology.

77  94  41  112  155  21  56  99  47  83

B) Print the data that you have inserted in part (A) in the following strategies.

•    Inorder
•    Preorder 
•    Postorder

C) What are the facts you should take into consideration when deleting a node from a binary tree. describe clearly for different situations with exs.

problem:

You are required to prepare a menu driven program which will maintain a list of car models, their price, name of the manufacturer, engine capacity etc., as a doubly linked list. The menu should make provisions for inserting information pertaining to new car models, delete obsolete (outdated) models, and update data such as price besides answering queries such as listing all car models within a price range specified by the user and listing all details given a car model.

1) Design the algorithms that required in above scenario. 
2) Implement the above program with the required algorithms by using an executable programming language (Java/C++).
3) Provide evidence and solutions for error handling during software implementation.
4) Carry out testing on implemented solution and provide evidence by including suitable screenshots.

problem:

1) Identify a method to count and record the number of occurrences of each vowel in uppercase or lowercase in any given paragraph. describe it.

2) Implement an algorithm to achieve above describeed method using suitable programming language. Paragraph is given below.

“A data structure is an arrangement of data in a computer's memory or even disk storage. An ex of several common data structures are Arrays, Linked Lists, Queues, Stacks, Binary Trees, and Hash Tables. Algorithms, on the other hand, are used to manipulate the data contained in these data structures as in searching and sorting. Many algorithms apply directly to a specific data structures.” Output must print the following lines, inserting the number of appearances of the vowel in lowercases and uppercases, and the total appearances.

A: __ Lowercase , __ Uppercase , __ Total
E: __ Lowercase , __ Uppercase , __ Total
I : __ Lowercase , __ Uppercase , __ Total
O: __ Lowercase , __ Uppercase , __ Total
U: __ Lowercase , __ Uppercase , __ Total

3) Identify different methods to reverse a String. describe all the identified methods.

(Note: student should describe at least two different methods and student can use any data structure to reverse a String value)

4) Implement a method to reverse any String Value by using String operations and String manipulation. 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9108

Have any Question? 


Related Questions in Computer Engineering

You are to design a visual system for detecting small black

You are to design a visual system for detecting small black objects against a tight background. Assume that the image of one of these objects is a square that is 5 pixels wide. Your system is to be used to create a Boole ...

1 select two hypervisors on the market today and compare

1. Select two hypervisors on the market today, and compare and contrast how they virtualize and manage the underlying hardware (CPUs and memory). 2. Discuss what changes may be necessary in future multi-core CPU platform ...

1 write a program that can read an indefinite number of

1. Write a program that can read an indefinite number of lines of VB.NET code and store reserved words in one linked list and identifiers and literals in another linked list. When the program has finished reading input, ...

In an 80211 network assume station a has four fragments to

In an 802.11 network, assume station A has four fragments to send to station B. If the sequence number of the first fragment is selected as 3273, what are the values of the more fragment flag, fragment number, and sequen ...

Balanced scorecard analysis and strategic

Balanced Scorecard Analysis and Strategic Plan Resources Balanced Scorecard Analysis and Strategic Plan Scoring Guide. iGuide: ePortfolio. APA Style and Format. This assignment is the culmination of your work in previous ...

How much space would be required to store a table for an

How much space would be required to store a table for an entire idealized block cipher that operates on 64-bit blocks and that has 80-bit keys? How many rounds are in DES? How many bits are in a DES key? What is the DES ...

What is the relationship between increased social

What is the relationship between increased social responsibility and IT at the workplace? Answer in about two paragraphs with reference. Must be 200-400 words and show an understanding and full development of the concept ...

In a network using the selective-repeat protocol with m 4

In a network using the Selective-Repeat protocol with m = 4 and the sending window of size 8, the value of variables are S f = 62, S n = 67, and R n = 64. Packet 65 has already been acknowledged at the sender site; packe ...

1nbsptcos 3 and 5 in windows 7 how do you open the task

1.  (TCOs 3 and 5) In Windows 7, how do you open the Task Manager? On the Processes tab, name, and describe at least three parameters that are displayed by default. Should be at least one paragraph

1 unlike infrared wireless devices bluetooth technology

1. Unlike Infrared wireless devices, Bluetooth technology uses radio waves to communicate. What are the advantages of Bluetooth over these devices and also over 802.11 technology? 2. Study and discuss the reasons why WEP ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen