Insertion of an element in a linear array, Data Structure & Algorithms

Assignment Help:

To delete an element in the list at the end, we can delete it without any difficult. But, assume if we desire to delete the element at the straining or middle of the list, then, we ought to rewrite all the elements after the position where the element that ought to be deleted exists. We ought to shift (r+1)th element to rthposition , where 'r' refer for position of deleted element in the list, the (r + 2)th element to (r + 1)th position,  and it will continue till the (n)th element to ( n-1 )th position, where n refer to the number of elements in the list, and after that the count is decremented.

From the above instance, if we desire to delete an element '44' from the list. We ought to shift 55 to the 4th position, 66 to the 5th position, and 77 to the 6th position.

Before deletion

 

Count  1      2         3               4         5           6            7

11

22

33

44

55

66

77

 

Step 1

Count     1       2            3       4               5           6            7

11

22

33

55

55

66

77

 

Step 2

Count     1     2            3          4           5             6            7

11

22

33

55

66

66

77

 

Step 3

Count     1        2         3          4             5            6

11

22

33

55

66

77

 

 


Related Discussions:- Insertion of an element in a linear array

Algorithm of decorated graph, As we talked in class, a program with two int...

As we talked in class, a program with two integer variables is universal. Now, we consider a special form of four variableprograms. Let G = (V; E) be a directed graph, where V is a

Non-recursive algorithm, Q .  Write down the non-recursive algorithm to tra...

Q .  Write down the non-recursive algorithm to traverse a tree in preorder. Ans: T he Non- Recursive algorithm for preorder traversal is written below: Initially i

State the term access restrictions - container, What is Access Restriction...

What is Access Restrictions Structured containers with access restrictions only allow clients to add, remove and examine elements at certain locations in their structure. For

Hash table, Programming for hash table?

Programming for hash table?

Searching techniques, Searching is the procedure of looking for something. ...

Searching is the procedure of looking for something. Searching a list containing 100000 elements is not the similar as searching a list containing 10 elements. We discussed two sea

Define the external path length, Define the External Path Length The Ex...

Define the External Path Length The External Path Length E of an extended binary tree is explained as the sum of the lengths of the paths - taken over all external nodes- from

Explain about the structured types - built-in types, Explain about the Stru...

Explain about the Structured types - Built-In Types Values of the carrier set are not atomic, consisting rather than several atomic values arranged in some way. Common illu

ALGORITHMS, WRITE AN ALGORITHM TO READ TWO NUMBERS AND PRINT THE LOWER VALU...

WRITE AN ALGORITHM TO READ TWO NUMBERS AND PRINT THE LOWER VALUE

Write the algorithm to find input and output value, This algorithm inputs 5...

This algorithm inputs 5 values and outputs how many input numbers were positive and how many were negative. Data to be used: N = 1, -5, 2, -8, -7

Explain time complexity, Time Complexity, Big O notation The amount of ...

Time Complexity, Big O notation The amount of time needed by an algorithm to run to its completion is referred as time complexity. The asymptotic running time of an algorithm i

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd