Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem:

1) prepare down the pseudo code for merge sort algorithm and using bellow array values perform the merge sort algorithm. Provide all the steps and describe them.

8  2  9  7  3  10  2  5

2) prepare down the pseudo code for selection sort algorithm and using bellow array values perform the selection sort algorithm. Provide all the steps and describe them.

28  75  93  12  8  55  71  34  47  83

3) Consider the values for the array L = {2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20} and Implement a binary search on an ordered array. Compare the number of key comparisons and prepare down all the necessary steps to search values 3, 18 and 1 using binary search.

4)

A) Following data is inserted to a binary tree. Draw the binary tree after inserting data and describe the inserting methodology.

77  94  41  112  155  21  56  99  47  83

B) Print the data that you have inserted in part (A) in the following strategies.

•    Inorder
•    Preorder 
•    Postorder

C) What are the facts you should take into consideration when deleting a node from a binary tree. describe clearly for different situations with exs.

problem:

You are required to prepare a menu driven program which will maintain a list of car models, their price, name of the manufacturer, engine capacity etc., as a doubly linked list. The menu should make provisions for inserting information pertaining to new car models, delete obsolete (outdated) models, and update data such as price besides answering queries such as listing all car models within a price range specified by the user and listing all details given a car model.

1) Design the algorithms that required in above scenario. 
2) Implement the above program with the required algorithms by using an executable programming language (Java/C++).
3) Provide evidence and solutions for error handling during software implementation.
4) Carry out testing on implemented solution and provide evidence by including suitable screenshots.

problem:

1) Identify a method to count and record the number of occurrences of each vowel in uppercase or lowercase in any given paragraph. describe it.

2) Implement an algorithm to achieve above describeed method using suitable programming language. Paragraph is given below.

“A data structure is an arrangement of data in a computer's memory or even disk storage. An ex of several common data structures are Arrays, Linked Lists, Queues, Stacks, Binary Trees, and Hash Tables. Algorithms, on the other hand, are used to manipulate the data contained in these data structures as in searching and sorting. Many algorithms apply directly to a specific data structures.” Output must print the following lines, inserting the number of appearances of the vowel in lowercases and uppercases, and the total appearances.

A: __ Lowercase , __ Uppercase , __ Total
E: __ Lowercase , __ Uppercase , __ Total
I : __ Lowercase , __ Uppercase , __ Total
O: __ Lowercase , __ Uppercase , __ Total
U: __ Lowercase , __ Uppercase , __ Total

3) Identify different methods to reverse a String. describe all the identified methods.

(Note: student should describe at least two different methods and student can use any data structure to reverse a String value)

4) Implement a method to reverse any String Value by using String operations and String manipulation. 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9108

Have any Question? 


Related Questions in Computer Engineering

Would you recommend using the routing table that has a

Would you recommend using the routing table that has a default route or hasn't? Please explain the advantage and disadvantages.

As is so often true in cryptography it is easy to weaken a

As is so often true in cryptography, it is easy to weaken a seemingly strong scheme by small modifications. Assume a variant of the OFB mode by which we only feed back the 8 most significant bits of the cipher output. We ...

1 given an unsorted list of n values what is the

1. Given an unsorted list of n values, what is the time-complexity to find the k t h smallest value in the worst case? What would be the complexity if the list were sorted? 2. What is the O(·) for the findSortedPosition( ...

1 suppose you are doing a random walk see previous problem

1. Suppose you are doing a random walk (see previous problem) on the blocks of a city street. At each "step" you choose to walk one block (at random) either forward, backward, left or right. In n steps, how far do you ex ...

1 explain how dhcp can be used when the size of the block

1. Explain how DHCP can be used when the size of the block assigned to an organization is less than the number of hosts in the organization. 2. Compare NAT and DHCP. Both can solve the problem of a shortage of addresses ...

Implement a class roachpopulation that simulates the growth

Implement a class RoachPopulation that simulates the growth of a roach population. The constructor takes the size of the initial roach population. The breed method simulates a period in which the roaches breed, which dou ...

Assignmentoverviewthe final exam consists of 8 essay

Assignment Overview: The Final Exam consists of 8 Essay Questions. Students will select and answer 4 of the 8 questions. If you answer more than 4 only the first four answered sequentially will be assessed. Students are ...

Write a program that creates a list of card objects see

Write a program that creates a list of card objects (see Programming Exercise 11 from Chapter 10) and prints out the cards grouped by suit and in rank order within suit. Your program should read the list of cards from a ...

Verify the rsa with crt example in the chapter by computing

Verify the RSA with CRT example in the chapter by computing yd = 15103 mod 143 using the square-and-multiply algorithm.  An RSA encryption scheme has the set-up parameters p = 31 and q = 37. The public key is e = 17. 1. ...

1 why is information security a management problem what can

1. Why is information security a management problem? What can management do that technology cannot? 2. Why is data the most important asset an organization possesses? What other assets in the organization require protect ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro