Demonstrate a function in scheme language

Assignment Help Computer Engineering
Reference no: EM132198926

Write and fully demonstrate a function in "Scheme language" named super-duper, with this interface:

(super-duper source count)

The function returns a copy of the list source, with every element duplicated count times. If source is an atom, it is immediately returned, without duplication.

For example:

(super-duper 123 1)

123

(super-duper 123 2)

123

(super-duper '() 1)

()

(super-duper '() 2)

()

(super-duper '(x) 1)

(x)

(super-duper '(x) 2)

(x x)

(super-duper '(x y) 1)

(x y)

(super-duper '(x y) 2)

(x x y y)

(super-duper '((a b) y) 3)

((a a a b b b) (a a a b b b) (a a a b b b) y y y)

Reference no: EM132198926

Questions Cloud

Write a short program to test your function : Write a function in C that takes three parameters: the address of a two-dimensional array of type int, the number of rows in the array.
Management perspective for data-mining software project : Discuss the major risk management functions from a project management perspective for the data-mining software project.
Minimum average total cost curves : Companies can typically maximize their profits by operating at the minimum average total cost curves, independent of the economic environment.
What is the implied risk premium : Does uncovered interest parity hold in this example? If so, how do you know? If not, what is the implied risk premium? Which deposits pay a higher expected.
Demonstrate a function in scheme language : Write and fully demonstrate a function in "Scheme language" named super-duper, with this interface.
Write a function that takes two parameters : Write a function called findMedian that takes two parameters - an array of int and the size of the array.
Find all subgame nash equilibria of finitely repeated game : Find all of the game's pure-strategy Nash equilibria. Now suppose that the players play this game twice in a row. They observe what each other did in the first.
What is the situation of the private sector in each period : In 2009 country has a fiscal deficit of 4.2% of its GDP and it has a deficit in the external sector of 2.6% of its GDP.
Write a function called truncate : Write a function called truncate. It is passed 2 parameters, a float f and an integer d.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What are the two largest gui implementations for linux

What are the two largest GUI implementations for Linux? Explain how it can crack the password so quickly using hash values when you don't have a supercomputer.x

  In how many ways can this be done if professor blue refuses

In how many ways can this be done if Professor Blue refuses to chair the discrete mathematics committee?

  Research the history of specification languages

Research the history of specification languages, and write a report on the successes or failures of some of these languages.

  Write a program that is supposed to read data from a file

You have a program that is supposed to read data from a file. The file contains products and their quantities.

  Why was the distribution of the scores on the exam symmetric

Why was the distribution of the scores on this exam symmetric? If not, what shape would you expect this distribution to have? Explain your reasoning.

  Under what conditions should an entrepreneurial firm develop

Under what conditions should an entrepreneurial firm develop it's own: And when should it outsource/subcontract/partner for them?

  What is the minimum number of access point do you need

You are going to implement a wireless network to the Wolfgang Concern Hall using access points with an effective range of 14 meters. What is the minimum number of access point do you need?

  What your relationship would be like with the technical

What instances of collaberation and communications do you and the technical staff explore.

  How to add and use a menu control on the form

How to add and use a menu control on the form. Develop a "Grade Report" project, which allows user to create a sequential file or open an existing file, then save test scores in this file.

  Show the encryption and the decryption diagram for crc mode

Show the encryption and the decryption diagram for CRC mode (only the last two blocks) when cipher text stealing (CTS) is used.

  Solve the problem using python programming

Solve the problem using PYTHON Programming

  Explain what is e-commerce and mobile technology

Your company is experiencing decline in business because of competition. Your manager thinks they may be able to turn the company around if they can get help.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd