Write the routines to perform insertion and deletion

Assignment Help Basic Computer Science
Reference no: EM13849765

Fill in the blank: (1 X 3)

1. Using --------instructions simplifies the process of instruction fetching and decoding.

2. A compiler allocates storage space and makes an entry in the symbol table when it encounters a(n) ------ in source code.

3. The ------- is a collection of resources that can be accessed over the Internet by standard protocols, such as FTP and HTTP.


Short Answer Questions: (2 X 4) (Any two from first, second, and third but fourth and fifth are compulsory).

1. Consider the following binary value:

1000 0000 0010 0110 0000 0110 1101 1001

What number (base 10) is represented if the value is assumed to represent a number stored in twos complement notation?

2. What are some reasons why a thread has separate user-mode and kernel-mode stacks in Windows?

3. Define in your own words the following terms: agent, agent function, agent program,
rationality, autonomy, reflex agent, model-based agent, goal-based agent, utility-based agent, learning agent. ?

4. Write a program to make a simple calculator using Raptor or DrScheme/PLT tool.

5. In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed the capacity of the link to the target organization. Consider an attack using ICMP echo request (ping) packets that are 500 bytes in size (ignoring framing overhead). How many of these packets per second must the attacker send to flood a target organization using a 0.5-Mbps link? How many per second if the attacker uses a 2-Mbps link? Or a10-Mbps link? (Cryptography).

Moderate Problems: (5 X 3) (Any three)

1. Write the routines to perform insertion, deletion, and searching in skip lists. ? (C++)

2. Write a program that reads a sentence and prints out the sentence in reverse order using the reverse method of the StringBuffer class. For example, the method will display

uoy era woH
for the input

How are you?

Repeat the operation until an empty string is entered. (Java Problem).

3. Write an essay on the any one of the following: (Using Harvard style or APA style). (1500 words).

• Big data.

• Cloud computing.

• Ethical and legal issues of security.

4. What's the purpose of the wrun.ini file? Explain data parameterization in WinRunner. (Automata testing).

Complex problems: (12 X 2) (Any two).

Each question must have a program plan, problem definition statement, and sample output with proper explanation and comments.

1. Write a program that plays the game of Fermi. The program generates three distinct random digits between 0 and 9. These digits are assigned to positions 1, 2, and 3. The goal of the game is for the player to guess the digits in three positions correctly in the least number of tries. For each guess, the player provides three digits for positions 1, 2, and 3. The program replies with a hint consisting of Fermi, Pico, or Nano. If the digit guessed for a given position is correct, then the reply is Fermi. If the digit guessed for a given position is in a different position, the reply is Pico. If the digit guessed for a given position does not match any of the three digits, then the reply is Nano. Here are sample replies for the three secret digits 6, 5, and 8 at positions 1,
2, and 3, respectively.

Guess        Hint                             Explanation

 

1 2 5          Nano Nano Pico          The value 5 matches but at the wrong position.

8 5 3          Pico Fermi Nano         The value 5 matches at the correct position.

The value 8 matches but at the wrong position.

5 8 6          Pico Pico Pico             All match at the wrong positions.

Notice that if the hints like the above are given, the player can tell which number did not match. For example, given the hint for the second guess, we can tell that 3 is no one of the secret numbers. To avoid this, provide hints in a random order or in alphabetical order (e.g., it will be Fermi Nano Pico instead of Pico Fermi Nano for the second reply). Implement the program with an attractive and elegant GUI. (Java Problem).

2. Implement the map ADT using a splay tree, and compare its performance experimentally with the STL map class, which uses a red-black tree? (C++ Program)

3. Using Opengl display a rectangle and permit a user to scale, rotate, and translate it using keyboard and mouse events.

Reference no: EM13849765

Questions Cloud

Literature review on recycling in pakistan : Read the information carefully before answering: Literature Review on Recycling in Pakistan: 2000 words on:  Financial perspective i.e potentials in recycling
Analyse information security vulnerabilities : analyse information security vulnerabilities
Overview of the debate-making : Identify the victor and why you feel they "won" the debate. Considering current events, what events experienced today are similar to your selected debated topic -  colonists in response to taxation imposed by the British crown
How the critical ideas of a chosen theorist are impacted : Write a 2- to 3-page paper exploring how the critical ideas of a chosen theorist are impacted by or impacting (positively or negatively) a current contextual issue in learning and schooling
Write the routines to perform insertion and deletion : Write the routines to perform insertion, deletion, and searching in skip lists.
Identify the teams that were playing : Write a 2 pages description of a football game you have attended. Identify the teams that were playing. Describe the setting, the people attending, the activities you observed. At the end give me your interpretation or opinion of this event
Nine building blocks of detachable hood backpack : The idea of operating a business that deals with detachable hood backpack will be able to offer a unique experience to the customers. The detachable backpack hoods are integrated into the backpack to offer a super look. It is also truly differenti..
Description of the disorder and underlying respiratory : Description of the disorder and underlying respiratory alteration associated with the type of cough in your selected scenario. Then, explain the pathophysiology of the respiratory alteration. Finally, explain how the factors you selected might imp..
Why do we say money has time value : 1. Why do we say money has time value? 2. Why is it important for business managers to be familiar with time value of money concepts?

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Important ideas for legislators to get from your testimony

Suppose the legislature in your state is debating the adoption of UCITA. What are the three most important ideas you want your legislators to get from your testimony?

  Wearable computing technology

A REPORT OF WEARABLE COMPUTING TECHNOLOGY IN RESOLVING TIME SHEET ISSUES FOR PAYROLL SYSTEM INPUT TO THE CEO

  Determine the period of the signal

Determine the period of the signal. Be sure to mention the units of the period. Describe this signal in a complex exponential form

  How many students in this group take every one

For any three of these courses, there are precisely 20 students who take each of them. For any four among these courses, there are precisely 10 students who take each of them. How many students in this group take every one among the five courses i..

  Four ring architecture of operating systems

Opinion regarding what security benefit(s) would be seen if modern operating systems followed four ring architecture.

  The envirofacts data warehouse

The Envirofacts Data Warehouse

  When deleting elements from a hash table with linear probing

When deleting elements from a hash table with linear probing, a special marker needs to be inserted in place of each deleted elements. Give an algorithm to perform deletion without the use of a special marker.

  Discuss how encryption relates to storage, network traffic

The command office has asked for a presentation on security mechanisms including access control models, authentication, authorization and encryption. Describe differences between them and identify situations where appropriate. Discuss how encryption ..

  Describe attribute minimization

Describe attribute minimization. Explain what would happen if you tried to validate a page containing instances of attribute minimization. Propose a solution to this problem.There are many reasons to validate your Web design. Select one of these reas..

  Produce a report by salesman

Do a compile-time initialization of the salesperson's names and product list. Produce a report by salesman, showing the total sales per product.

  How does windows and macintosh breakthroughs

How does windows and Macintosh breakthroughs influenced the way operating systems manages, enhance and impact applications and resources?

  What ''are the differences between a policy, a standard

What 'are the differences between a policy, a standard, and a practice? What are the three types of security policies? Where would each be used? What type of policy would be needed to guide use of the Web? E-mail? Office equipment for personal use?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd