Explain how the binary tree, Database Management System

Assignment Help:

QUESTION

(a) Give two advantages of using Linked List as compared to arrays.

(b) (i) You are working as programmer at the Orange Mauritius branch. You have been asked to create a linked list to store and manipulate data about Sim cards for Orange. By choosing appropriate data types for each member element, write a piece of code to declare a linked list structure for the following table with some sample data provided.

                                845_table.jpg

Where Fname is first name of customer Lname is last name of customer SimCard_Id is the ID of the sim card owned by the customer Amt_spent is the amount in Rupees and cents Credit is the amount left on the Sim Card in Rs and cents.

(ii) Declare two members (i.e. two nodes) variables for the above structure you just declared and write codes to allocate memory to the first node.

(c) Write a function definition to create the linked list you declare in part (a(i). Your code should include a mechanism (for e.g. a sentinel value) to stop the user from entering data.

(d) Explain how the binary tree below can be traversed in each of the following ways:

(i) preorder

(ii) inorder

(iii) postorder.

                                                           2494_table3.jpg


Related Discussions:- Explain how the binary tree

Processing arrays, 1. A company wants a report containing a breakdown of pa...

1. A company wants a report containing a breakdown of payroll by department. Input, which should be stored in 3 parallel arrays, includes each employee's department number, hourly

Write short notes on schema diagram, Write short notes on Schema diagram. ...

Write short notes on Schema diagram. A database schema along with primary key and foreign key dependencies can be depicted pictorially by schema diagram. Every relation appears

Why we use delegation to share implementation, Use Delegation to Share Impl...

Use Delegation to Share Implementation The delegation " Delegation comprises of catching an operation on one object and sending it to other object which is part, or related to

System error-database errors, System error :These contain errors in databas...

System error :These contain errors in database system or the OS, example, deadlocks.Such errors are fairly hard to detect and need reprogramming the erroneous components of the sys

Using literal character string-data manipulation language, Using Literal Ch...

Using Literal Character String Example: To print IS A as one string with column name employee SELECT ENAME || ' IS A ' || JOB AS "EMPLOYEE" FROM EMP;

What do you understand by raid, What do you understand by RAID? Explain RA...

What do you understand by RAID? Explain RAID Level 4 and Level5? RAID - It is stands for Redundant Array of Inexpensive Disks (as named by the inventor), or alternatively Re

Why like predicate used for, Why Like predicate used for? LIKE predicat...

Why Like predicate used for? LIKE predicate: The LIKE predicate searches for strings in which have a certain pattern.

Explain the log based recovery method, Explain the Log Based Recovery Metho...

Explain the Log Based Recovery Method? The system log that is generally written on stable storage consists of the redundant data required to recover from volatile storage failu

What is deadlock, What is deadlock? Neither of the transaction can ever...

What is deadlock? Neither of the transaction can ever proceed with its normal implementation. This situation is known as deadlock.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd