Sorting-stacks, and queues, Database Management System

1. Identify the comparisons and exchanges made to sort the following array using the selection exchange sort technique. Note: you may not need all columns.

Original

Array

1st

Pass

2nd

Pass

3rd

Pass

4th

Pass

5th

Pass

6th

Pass

7th

Pass

8th

Pass

9th

Pass

12

 

 

 

 

 

 

 

 

 

63

 

 

 

 

 

 

 

 

 

45

 

 

 

 

 

 

 

 

 

5

 

 

 

 

 

 

 

 

 

18

 

 

 

 

 

 

 

 

 

40

 

 

 

 

 

 

 

 

 

32

 

 

 

 

 

 

 

 

 

2. Use the table below to show the values in a stack after executing each of the following instructions. What is the value of the stack pointer after all of the executions have been completed?  Note: There is only 1 stack. You are showing the changes in the stack values as each number is pushed onto or popped from the stack. 

Push 12; Push 45; Push 47; Push 21; Pop X; Push 83; Pop X; Pop X; Push 32

3. Use the table below to show the values in a queue after executing each of the following instructions. Note: There is only 1 queue. You are showing the changes in the queue values as each number is added to or deleted from the queue.

Add 12; Add 45; Add 47; Add 21; Delete X; Add 83; Delete X; Delete X; Add 32

Posted Date: 3/12/2013 3:38:36 AM | Location : United States







Related Discussions:- Sorting-stacks, and queues, Assignment Help, Ask Question on Sorting-stacks, and queues, Get Answer, Expert's Help, Sorting-stacks, and queues Discussions

Write discussion on Sorting-stacks, and queues
Your posts are moderated
Related Questions
Question: This form represents one of a number used for each sailing of a range of boats. A passenger may go on many sailings and will have the same passenger number for each.

Compute the closure (F+) for the following set of the functional dependencies defined on R(a,b,c,d), where F - {c→ a, ab → d, a → b, d → c}, i.e. what are all of the FDs implied b

What are partial, alternate,, artificial, compound and natural key? Partial Key: It is a set of attributes that can uniquely recognize weak entities and that are related to s

Submit the table creation statements (including constraints) for the Database Model. Submit them all in a single script file. Also submit a document explaining what test data yo

What is a view? How it is related to data independence? A view might be thought of as a virtual table, that is, a table that does not really exist in its own right but is inste

What is Asterisk in SQL? Asterisk (*): In SQL, the columns for all the tables and views in the FROM clause will be displayed.

Security: Data not needed by local applications is not stored at the site, therefore no unnecessary security violations may exist. But how can we carry out fragmentation? Fragm

Australian Bureau of Statistics (ABS) provides retail data for different groups and different states as well as the aggregate numbers. Table 11 " Retail Turnover, State by Industry

Determine the steps of path in association network You can analyse use of paths in association network in the following steps:  Examine every operation and see what asso

Describe Data Manipulation language ? Data Manipulation Language (DML) - A data manipulation language is a language which enables users to access or manipulate data as organize