Interpreting another algorithm can be challenging

Assignment Help Basic Computer Science
Reference no: EM131386714

Developing algorithms does not always require you to write something from nothing. A significant portion of the time, you will adapt existing algorithmic work, interpreting what other software engineers have done before you, breaking down the purpose of each instruction, in the algorithm, they developed. Moreover, since every software engineer tends to have a unique style of problem-solving, the deciphering of existing functions can vary from algorithm to algorithm.

Though interpreting another's algorithm can be challenging, cultivating skills in reverse engineering algorithms is invaluable, as it always has the potential of showing you new ways to solve problems. For this Hand-In Assignment, your task is to solve the following problem:

Suppose f is a function that returns the result of reversing the string of symbols given as its input, and g is a function that returns the concatenation of the two strings given as its input. If x is the string abcd, what is returned by g(f(x),x)?

To prepare for this Assignment:

  • Review your Weekly Learning Resources with a focus on programming concepts and paradigms.
  • Carefully analyse each part in the presented program.
  • Identify a programming paradigm, and write the problem out using pseudo-code that would support that paradigm.

To complete this Assignment:
Submit a 2-3 paragraph paper in which you address the following:

  • Based on the information provided in the presented problem, identify what is returned by g(f(x),x) if x is the string 'abcd'.
  • Explain how you reached your answer.
    • Include your pseudo-code.
    • Explain the programming paradigm(s) your pseudo-code supports and why/how.
  • Fully state and justify any choices, assumptions or claims that you make using the suggested Learning Resources for this Week and/or your own research.
    • Include references to any sources you have used.
    • All sources should be cited using Harvard Liverpool Referencing Style.

Your document should have 2-3 paragraphs (not including the list of works cited), but it is the quality of the answer that matters, not the number of words. Cite and reference all sources use the Harvard Liverpool Referencing System.

Reference no: EM131386714

Questions Cloud

Should calvin prevail in a lawsuit against boone : These defects could not be completely cured by repair. Should Calvin prevail in a lawsuit against Boone for breach of warranty to recover damages for the loss in value?
How did the colonists justify their action before revolution : How did the colonists justify their actions before and during the American Revolution? EXPLAIN.You must include at least 2 direct primary source quotations/evaluations of primary source material.
Draw the extensive form for the following game : Does the negative value of Xtmake economic sense? What is the underlying economic theory?
Describe a high-level timeline that includes key tasks : BUS-390: Describe a high-level timeline that includes key tasks and deadlines. Estimate the project's overall cost and any key staffing and non-staffing resources needed.
Interpreting another algorithm can be challenging : Though interpreting another's algorithm can be challenging, cultivating skills in reverse engineering algorithms is invaluable, as it always has the potential of showing you new ways to solve problems. For this Hand-In Assignment, your task is to ..
What are the rights of the parties : The machines cannot readily be resold for a reasonable price because they are a special kind used only in Terry's manufacturing processes. Robert sues Terry to recover the agreed price of the machines. What are the rights of the parties?
Calculate net profits and losses per share at expiration : compute net profits and losses per share (actual dollar profits and losses, not rates of return) at expiration (February 1994) for the following investment strategies: buying a call on Lotus's stocks and Writing a call option on Lotus's common stoc..
Discuss about the post given below : Catalina says her only virtue is being a Spaniard. Although she tries to hide her identity as a woman for a long time, she never tries to hide her identity as a Spaniard; she is proud of where she comes from. Hiding her womanhood is not necessaril..
What should the xyz railroad company do : ABC Company was informed of this at once and immediately telegraphed XYZ Railroad Company to withhold delivery of the television sets. What should the XYZ Railroad Company do?

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Define the internal path length for a tree

Prove by induction that if tree T is a full binary tree with n internal nodes, I is T's internal path length, and E is T's external path length, then E = I + 2n for n ≥ 0.

  Work for all lists of numbers

You may assume that the user will always enter at least two elements, but your function two_length_run should work for all lists of numbers including those of length 0 and 1.

  Payment card industry

In 2004 the Payment Card Industry Security Standard Council was formed and subsequently created the Payment Card Industry Data Security Standard.

  Explain the uses and advantages of the chips

Explain the uses and advantages of the chips. Mention likely privacy objections and refute them - making a presentation to a large retail chain to convince them to buy the chips to install in their products.

  Macro to move to a particular cell

1.Get the macro to move to a particular cell (the Range statement) 2. Fill that cell with a value 3. Store the value in a variable (call it x)

  Write identifying and describing how information is used

1. Write, identifying and describing how  information is used and how it flows in an  organization

  Fix it to allow us to extract the text table

Consider whether you want to drop font>s or close them properly. Once you have fixed the problem so that the tag contains the text table, pass your corrected HTML to html Parse(). You may want to use a text connection to do this rather than writin..

  Cobol within the international symbol

Manifestations of this movement included the slogan to "Kill the COBOL programmer" (not literally, of course) and T-shirts bearing the word COBOL within the international symbol for not permitted (a red circle with a red line diagonally across the..

  Estimate the nusselt number

Steam at 1 atm and 100°C is flowing across a 5-cmOD tube at a velocity of 6 m/s. Estimate the Nusselt number, the heat transfer coefficient, and the rate of heat transfer per meter length of pipe if the pipe is at 200°C.

  Develop an encryption program

Your employer, SGA (Secretive government Agency), want you to develop an encryption program. After doing some research you have two candidate algorithms. According to your research, Algorithm 1 has cost Θ(n3), while algorithm 2 is listed as Ο(n4) a..

  Find the marginal distribution of blood pressure level

Write a brief description of the association between age and blood pressure among these employees.

  What capabilities should a wireless security toolkit include

Are any biometric recognition characteristics considered more reliable than others? Which are the most reliable?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd