Question 33 of QuestionList-2
Select one of the following circuits that represents F = yz + x (~y~z + ~x~y)
Solution:
The first diagram only yields the given function and the other diagrams are generating some
other function. In the following the yields a
2001Fall CS147
Prof. Sin-Min Lee
Midterm 3
Name:_
Grade:_/10
Q1 Q2 Q3 Q4 Q5 Q6 Q7 Q8 Q9 Q10 Total
1
1
1
1
1
1
0.5 1.5 1
1
10
1.(0.4+ 0.3+0.3=1 points) Consider a memory with three page frames, initially empty.
Given the following reference string, how man
614947-1-11E
AID: 1825 | 06/08/2016
Invocation of getShotsFired () method
Steps to open a scenario:
The steps to open asteroids1 scenario are as follows:
Click on the menu Scenario from the menu bar.
Choose Open option in the menu.
Select asteroids1 sc
614947-1-15E
AID: 1825 | 06/08/2016
Making rocket fire faster by modifying its code
Steps to open a scenario:
The steps to open asteroids1 scenario are as follows:
Click on the menu Scenario from the menu bar.
Choose Open option in the menu.
Select ast
614947-1-14E
AID: 1825 | 06/08/2016
Making huge asteroid
Steps to open a scenario:
The steps to open asteroids1 scenario are as follows:
Click on the menu Scenario from the menu bar.
Choose Open option in the menu.
Select asteroids1 scenario from the c
Question 16 of QuestionList-2
Consider the array called myArray declared below that contains positive and negative integers.
Write a loop statement to count and display the number of positive integers in the array. That is,
your loop should display the me
Question 11 of QuestionList-2
C+
1. Create a Boolean function which can tell if a user has created a proper password. You consider
a proper password to be between 8 and 16 characters long, contains at least one number, at least
one lower case letter, at l
Question 18 of QuestionList-1
data structure
1. Describe how a depth first search of a binary tree works.
2. Describe a use of a weighted directed graph.
3. What is the recursive algorithm for a pre-order search of a binary tree?
Solution:
1st Part
A bina
Question 47 of QuestionList-1
Draw and explain the AVL tree for the following :
12 16 50 40 79 8 58 9 43
Solution:
An AVL tree is a self-balancing binary search tree where the heights of the two child sub-trees of
any node differ by at most one (i.e, it m
Question 17 of QuestionList-2
Suppose we wish to create a hamming code that contains 30 bits of data what is the minimum
number of bits you must include in order to form a valid hamming code.
Solution:
The key to the Hamming Code is the use of extra parit
Numerical Summarization of Data
OPRE 6301
Motivation. . .
In the previous session, we used graphical techniques to
describe data. For example:
While this histogram provides useful insight, other interesting questions are left unanswered. The most importan
I‘m using SWI-Prolog for the following project.
Define a predicate secondMian with the signature secondMinlList, MinZ} where MinZ is the
second lowest unique valued element in some list of numbers, List. If the list has fewer than two
unique elements. the
Question:
Hidden surface removal is a problem in computer graphics that scarcely
needs an introduction: when Woody is standing in front of Buzz, you
should be able to see Woody but not Buzz; when Buzz is standing in
front
of
Woody,
well,
you
get
the
idea.
Question:
We can define the average data rate to be the size of the file transferred divided by the time it
takes to transfer the file. Of course, this data rate will depend on the size of the file. Suppose that
a client connects to a server and uploads d
Question:
How much time does the following "algorithm" require as a function of n? Answer in big theta
notation.
Answer:
n
i
n
i1
1
k j
j1
This is simplified as,
n
i1
n
i
k j
j1
It can be written as,
n
i1
n
k j
n
i
k j
n( n 1)
2
=
n (n 1)
2
2
=
1 3
(n n2
Complete the program by writing and calling a method that converts a temperature from Celsius
into Fahrenheit.
import java.util.Scanner;
public class CelsiusToFahrenheit cfw_
/ FINISH: Define celsiusToFahrenheit method here
public static void main (String
Question 1:
System software is used for tasks such as word processing, calculations and playing
games.
Answer:
False
Explanation:
Application software is used for tasks such as word processing, calculations, and playing
games not system software.
Question
Create a 2-D data array using lines below
Show transcribed image text
Often, certain data entries in a data set can be missings corrupted, or invalid. Computers often
assign such entries with value of NaN (which stands for not-a-number). In MATLAB, the Na
Question:
We want a data structure that supports the operations: Insert(S, x), Delete
Max(S) and Add(p, S) that increases all numbers (thus the priority) of items
that are now in the heap by p. Give an efficient algorithm to simulate such a
data structur
Question:
a) Consider the incomplete StringIterator class below that represents an indirect access
iterator used to step through the characters in a string. For this question, assume Java's
Iterator interface is non-generic as shown:
public class StringIt
Question:
As introduced in the lecture notes, the vector class is C+'s answer to the limitations of arrays.
As compared with arrays, vectors protect the user from accessing out-of-bounds ranges, they
resize dynamically on demand, and they know and can rep
*8.10 (Largest row and column) Write a program that randomly fills in 0s and 1s into a 4-by-4
matrix, prints the matrix, and finds the first row and column with the most 1s. Here is a sample
run of the program: 0011 0011 1101 1010 The largest row index: 2
Determine whether the following binary relations are reflexive, symmetric, antisymmetric and
transitive:
a. x R y
xy 0
x, y R
b. x R y
x>y
c. x R y
|x| = |y|
x, y R
x, y R
For each of the above, indicate whether it is an equivalence relation or a partial
Question:
1. The nearest Google server from UNT DP is located in Dallas, TX. The optic fiber cable
connection between UNT DP and the Google server is 45 miles long and the propagation speed
through the optic fiber cable is that of light. The transmit rate
C+
Write a function that counts the number of elements in an array that are less than a specified
value. Use the below function name : int Numberofelements(int A[],int length,int value)
Example: 1) A[5] = cfw_1,2,3,4,5 length = 5 value = 3 No. of elements
*PHP*
*HTML*
Create your own Web page that uses both HTML and PHP to create
several different tables providing specific information. You will get a
chance to use most of the concepts you studied so far in this course
as you will apply both HTML and PHP co
Assignment #5
Introduction to C Programming COP 3223
Objectives
1. To reinforce the use of loops.
2. To learn how to read information from files.
Introduction: Ninja Academy
Ninjas are awesome! Your friend has not stopped talking about how cool ninjas and
QUESTION:
40. int []matrix = new int [4] [6];
In ONE statement sum all the inetegers in the 3rd column
Sum all the integers in the 2nd column with a loop
SOLUTION:
import java.util.Scanner;
public class ArraySum
cfw_
public static void main(String[] args)
Question:
1. this is a c+ question. just need to do the part that says student code.
Complete the do-while loop to output 0 to countLimit. Assume the user will only input a positive
number.
Sample program:
#include
using namespace std;
int main() cfw_
int
1.
The following are types of multi-media networking applications except
A) text messaging and web page downloads (live, real-time texting and data transfer)
B) streaming, stored audio and video (YouTube, Netflix, Hulu)
C) conversational voice/video over