Sorting-stacks, and queues, Database Management System

Assignment Help:

1. Identify the comparisons and exchanges made to sort the following array using the selection exchange sort technique. Note: you may not need all columns.

Original

Array

1st

Pass

2nd

Pass

3rd

Pass

4th

Pass

5th

Pass

6th

Pass

7th

Pass

8th

Pass

9th

Pass

12

 

 

 

 

 

 

 

 

 

63

 

 

 

 

 

 

 

 

 

45

 

 

 

 

 

 

 

 

 

5

 

 

 

 

 

 

 

 

 

18

 

 

 

 

 

 

 

 

 

40

 

 

 

 

 

 

 

 

 

32

 

 

 

 

 

 

 

 

 

2. Use the table below to show the values in a stack after executing each of the following instructions. What is the value of the stack pointer after all of the executions have been completed?  Note: There is only 1 stack. You are showing the changes in the stack values as each number is pushed onto or popped from the stack. 

Push 12; Push 45; Push 47; Push 21; Pop X; Push 83; Pop X; Pop X; Push 32

3. Use the table below to show the values in a queue after executing each of the following instructions. Note: There is only 1 queue. You are showing the changes in the queue values as each number is added to or deleted from the queue.

Add 12; Add 45; Add 47; Add 21; Delete X; Add 83; Delete X; Delete X; Add 32


Related Discussions:- Sorting-stacks, and queues

What disadvantage of odbc does ole db overcome, What disadvantage of ODBC d...

What disadvantage of ODBC does OLE DB overcome? By breaking the features and the methods of a DBMS into COM objects, OLE DB characteristic overcomes a main disadvantage of ODBC

Modelling and normalisation, Task Part A. Create an ERD from a business pro...

Task Part A. Create an ERD from a business problem. (50 marks) Read the following problem and complete the tasks listed below. THE ABS Blood Bank Australian Blood Services (ABS) i

What is a name, What is a Name? A user-supplied name is used for identi...

What is a Name? A user-supplied name is used for identity. This form of identity is used for files in file systems. The user gives every file a name that uniquely identifies it

Explain about foreign key, What is Foreign Key Foreign Key: Sometimes...

What is Foreign Key Foreign Key: Sometimes we may have to work with an attribute that does not have a primary key of its own. To recognize its rows, we have to use the primar

Database schemas and dependencies, 1. Staff(staffID, firstName, lastName, a...

1. Staff(staffID, firstName, lastName, availabilityID, experience, phone, mobile, email); 2. Availability(availabilityID, Monday, Tuesday, Wednesday, Thursday, Friday, Saturday,

Explain different types of keys and relational model., Relational Model: T...

Relational Model: The relational model uses a collection of tables to represent both data and the relationships among those data. Each table has multiple columns and each column h

Differentiate between static hashing and dynamic hashing, Differentiate bet...

Differentiate between static hashing and dynamic hashing.  Ans: Static Hashing comprises the number of primary pages in the directory fixed. So, while a bucket is full, we requ

Define physical and logical data independence, Define physical and logical ...

Define physical and logical data independence. How does this architecture help in achieving these? Data independence entails that change in one view must not need a change in t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd