Ask Question, Ask an Expert


Ask Computer Engineering Expert


1) prepare down the pseudo code for merge sort algorithm and using bellow array values perform the merge sort algorithm. Provide all the steps and describe them.

8  2  9  7  3  10  2  5

2) prepare down the pseudo code for selection sort algorithm and using bellow array values perform the selection sort algorithm. Provide all the steps and describe them.

28  75  93  12  8  55  71  34  47  83

3) Consider the values for the array L = {2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20} and Implement a binary search on an ordered array. Compare the number of key comparisons and prepare down all the necessary steps to search values 3, 18 and 1 using binary search.


A) Following data is inserted to a binary tree. Draw the binary tree after inserting data and describe the inserting methodology.

77  94  41  112  155  21  56  99  47  83

B) Print the data that you have inserted in part (A) in the following strategies.

•    Inorder
•    Preorder 
•    Postorder

C) What are the facts you should take into consideration when deleting a node from a binary tree. describe clearly for different situations with exs.


You are required to prepare a menu driven program which will maintain a list of car models, their price, name of the manufacturer, engine capacity etc., as a doubly linked list. The menu should make provisions for inserting information pertaining to new car models, delete obsolete (outdated) models, and update data such as price besides answering queries such as listing all car models within a price range specified by the user and listing all details given a car model.

1) Design the algorithms that required in above scenario. 
2) Implement the above program with the required algorithms by using an executable programming language (Java/C++).
3) Provide evidence and solutions for error handling during software implementation.
4) Carry out testing on implemented solution and provide evidence by including suitable screenshots.


1) Identify a method to count and record the number of occurrences of each vowel in uppercase or lowercase in any given paragraph. describe it.

2) Implement an algorithm to achieve above describeed method using suitable programming language. Paragraph is given below.

“A data structure is an arrangement of data in a computer's memory or even disk storage. An ex of several common data structures are Arrays, Linked Lists, Queues, Stacks, Binary Trees, and Hash Tables. Algorithms, on the other hand, are used to manipulate the data contained in these data structures as in searching and sorting. Many algorithms apply directly to a specific data structures.” Output must print the following lines, inserting the number of appearances of the vowel in lowercases and uppercases, and the total appearances.

A: __ Lowercase , __ Uppercase , __ Total
E: __ Lowercase , __ Uppercase , __ Total
I : __ Lowercase , __ Uppercase , __ Total
O: __ Lowercase , __ Uppercase , __ Total
U: __ Lowercase , __ Uppercase , __ Total

3) Identify different methods to reverse a String. describe all the identified methods.

(Note: student should describe at least two different methods and student can use any data structure to reverse a String value)

4) Implement a method to reverse any String Value by using String operations and String manipulation. 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9108

Have any Question? 

Related Questions in Computer Engineering

1 list and describe the three fundamental ways that data

1. List and describe the three fundamental ways that data can be intercepted. How does a physcial security program protect against each of these data interception methods? 2. What can you do to reduce the risk of laptop ...

Write a 500 word report to explain issues of storing and

Write a 500 word report to explain issues of storing and representing data that is difficult to structure in an RDBMS. Search and find an example, or create one in the content of the small business you proposed previousl ...

Assignment objective to develop a simple but attractive

Assignment OBJECTIVE: To develop a simple but attractive webpage using CSS and following HCI criteria. CASE STUDY - A new profile website for academics at the School of Computer Science and Electronic Engineering, Univer ...

Assignmentdefineupdate the security objectives for

Assignment Define/update the "security objectives" for confidentiality, integrity, and availability of information resources, describing the potential harm/security impact that failure to achieve security objectives woul ...

Cryptography projectlets suppose that alice and bob have

Cryptography Project Let's suppose that Alice and Bob have each a number n_A and respectively n_B between 1 and 10 and they want to know if they have the same number or not. The problem is that in case they don't have th ...

Assignmentsection 1 algorithm analysisto do well before

Assignment SECTION 1. Algorithm Analysis TO DO WELL: Before you work on this section, write down what W(N) means, and the F(N)s of sorting and searching. 1) What is the purpose of using asymptotic notation such as O, Ome ...

Assume alice the client creates a tcp connection with bob

Assume Alice, the client, creates a TCP connection with Bob, the server. They exchange data and close the connection. Now Alice starts a new connection with Bob by sending a new SYN segment. The server responds with the ...

1 in ftp a user jane wants to retrieve an ebcdic file named

1. In FTP, a user (Jane) wants to retrieve an EBCDIC file named huge from /usr/ users/report directory using the ephemeral port 61017. The file is so large that the user wants to compress it before it is transferred. Sho ...

1 in sctp the value of the cumulative tsn in a sack is 23

1. In SCTP, the value of the cumulative TSN in a SACK is 23. The value of the previous cumulative TSN in the SACK was 29. What is the problem? 2. Answer the following questions: a. What is the minimum size of a UDP user ...

1 what is security and information security what is the

1. What is security and information security? What is the difference? 2. It has been stated that security is a continuous process; what are the states in this process? 3. What are the differences between symmetric and as ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen