Briefly describe the behaviour of the delete operation

Assignment Help Operating System
Reference no: EM13944770

1) (a) Consider the following axioms from the Unsorted List ADT:
Delete(Create, i1) = Create
Delete(Make(L1, i2), i1) =
IF i1 = i2 THEN
L1
ELSE
Make(Delete(L1, i1), i2)
END IF

Briefly describe the behaviour of the Delete operation as defined by these axioms.

What changes would you make to the above axioms in order to carry out the other two types of deletion discussed in class?

(b) The interface file for a linked list implementation of the Unsorted List ADT offers the following methods:

public void make(Object item);
public void delete(Object item);
public ListReferenceBased concat(ListReferenceBased list2);
public ListReferenceBased tail();
public boolean isEmpty();
public boolean isIn(Object item);
public Object head();
public int length();

Write java code for a method that finds the smallest integer in an unsorted list of integers.
This method is to appear in a client program, thus must use methods from the above interface file. You do not need to handle exceptions. Assume the following skeleton:
public static Integer findSmallest(ListReferenceBased list) {
}

Provide appropriate PRE and POST conditions for your method.

(c) Describe and illustrate how items are normally added and removed from an efficient implementation of the queue ADT, as defined in class, which is implemented using an array.

What problems may arise in testing for an empty or a full queue and how might these be overcome?

Give two applications of a queue in computing.

Reference no: EM13944770

Questions Cloud

Introducing and managing the improvements : As a senior manager you are responsible for these changes. How you will go about introducing and managing the improvements. How will you gain support of the retail staff.
How would feminist eve cole : As I learn more about the mind/brain connection, I find myself willing to give up the notion of "mind" as a separate idea. Is this just me, or does someone else feel that way?
The sample data is presented in the following table : Do the data present sufficient evidence to indicate that the mean for the machine 1 is smaller than the mean for the machine 2? Use a 0.05 level of significance.
Cost-estimating equation for total annual operating costs : Assume the local DHL delivery service hub has the following information available about fleet miles and operating costs: Use the high-low method to develop a cost-estimating equation for total annual operating costs. (Let X = annual fleet miles.)
Briefly describe the behaviour of the delete operation : What changes would you make to the above axioms in order to carry out the other two types of deletion discussed in class?
Basis of the confidence interval : A confidence interval for the average age of Walmart shoppers can be found below. On the basis of the confidence interval shown below, you can (or should) conclude that the average age of Walmart shoppers is over 52.
Explaining the creditability of new business venture : The bank has requested from you to submit a business proposal explaining the creditability of your new business venture and how it will succeed.
Explain the idea of a context as it relates to hci design. : Describe the Norman Cycle and apply it to a typical scenario of usage for a librarian using an electronic library catalogue.
How much must be deposited now : If the parent decides instead to deposit a lump sum now in order to attain the goal of $250,000 in 13 years, how much must be deposited now?Amount = __________________________(dollars)

Reviews

Write a Review

Operating System Questions & Answers

  Write a short report on page replacement algorithms

Select one of two possible short reports,  Subject 1. Page Replacement Algorithms and Block Caching,  Subject 2. Storing Blocks and Remembering Where You Stored Them

  What is the average number of machine cycles per instruction

What is the average number of machine cycles per instruction for this microprocessor, including its memory fetch instructions?

  Differences between logical and physical security

With the help of analogy to explain the differences between logical and physical security to a nontechnical person.

  Printf statement to debug an application

There are various ways to debug a program, perhaps most elementary is using a printf() statement to show important pieces of data regarding the program execution point,

  Explanation of it networks

While there are difficult security concerns in any isolated computing environment, addition of a network in geographically distributed facilities.

  Communication of processes and process synchronization

Multi-processes programming - multithread programming and communication of processes and process synchronization

  Article and your own research

Using the above article and your own research, write a 3- to 5-page paper comparing 3-4 of the operating systems you find in the readings and other materials from your research. Compare both technical and non-technical features and explain what you b..

  How operating system is clearly superior for any application

Consider the advantages and disadvantages of each major operating system that Amy might use on the Web server. If you don't think that one operating system is clearly superior for this application, describe why.

  Provide reasons for a slow lan

Provide possible reasons for a slow LAN, fill in why each reason causes a slow LAN and provide your solution. Each reason will take a minimum of 150 words to address thoroughly.

  Show the output of the screen when the program executes

Show the output of the screen when the program executes with a value of 200.

  Question about big oh relationship

Provide witnesses n0 and c that can be used to prove the relationship. Select your witnesses to be minimal, in the sense that n0-1 and c are not witnesses, and if d

  Difference from a firewall to border security

Discuss why is it important for a firm to have firewalls and border security in place? I know that a firewall is to stop intruders from entering your network but when read on it seems border security is very similar.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd