Share
Explore BrainMass

Algorithms

Two's complement numbers: addition, conversion to decimal

1). Assume that the two numbers shown below are in 6-bit 2's complement form. Convert each one to decimal form. A. (110101)base2cm B. (010101)base2cm 2). A. Add the following 8-bit 2's complement numbers, and state your answer in 8-bit 2's complement form: 01001010 + 11110110 B. Has overflow occurred? Answer yes or n

Round Trip Delay

For a 1-Gbps network operating over 5000 km, the delay is the limiting factor, not the bandwidth. Consider a MAN with the average source and destination 20 km apart. At what data rate does the round-trip delay due to the speed of light equal the transmission delay for a 1-KB packet? Assume the speed of light in fibre to be 2/3 t

Big O notation

Use big-O notation to classify the traditional grade school algorithms for addition and multiplication. That is, if asked to add two numbers each having N digits, how many individual additions must be performed? If asked to multiply two N-digit numbers, how many individual multiplications are required?

Iterative and Recursive Algorithms

Solutions to some problems are intrinsically recursive, and writing them in an iterative fashion is difficult. The reverse also holds. Find an example or a recursive procedure and represent it as an iterative procedure. Also, choose an iterative procedure that you would re-write as recursive. What challenges did you face in the

R

Suppose f is a function that returns the result of reversing the string of symbols given as its input, and g is a function that returns the concatenation of the two strings given as its input. If x is the string hrwa, what is returned by g(f(x),x)? Explain your answer - don't just provide the result!

Write a shell script that prints the following menu (Unix)

Write a shell script that prints the following menu Welcome to My Simple Mathematica a) Choose 'a' for Fibonacci Series b) Choose 'b' for Prime Numbers Please make your choice [a or b]: Once the user enters 'a' or 'b' perform the appropriate calculation and print the series. Limit the series by requiring the u

Flow chart and program

1 chocolate delights candy company manufactures several types of candy. Design a flowchart for the following : A programm that accepts a candy name (for exmple, "chocolate-covered blueberries'), price per pound, and number of pounds sold in the average month, and display the item's data values only if it is best-selling item. B

Graph and describe adjacency matrix

Assume that a graph uses and adjacency matrix to represent the edges. Describe how you would update the matrix for the following algorithms. (a). Insert an edge (b). Insert a new vertex (c). Delete and edge (d). Delete a vertex.

Desk Check Algorithm

This problem has three phases I need help with all three. Here is the problem and below the problem is what I have and what I need more assistance with. I specifically need help with the 3rd point and any additional input for point 2. Original problem is at the end of this post: 1. For each program module (component) t

Write a simple program using the given info.

Develop an algorithm in pseudocode that shows the tasks and sub-tasks of the module. o Desk check your algorithms using the following test values: · Leaded gas: $4.00/gallon · Unleaded gas: $4.50/gallon · Federal gas tax: $0.10/gallon · Gas-n-Go service charge: $1.00 ·

Linux: Explain the function

Using the following script: #!/bin/bash #This is a shell script echo $# echo $0 echo $1 echo $2 echo $3 echo $* name1=$1 #name2=$2 echo $name1 "is the first parameter" echo $name2 "is the second parameter" echo $ echo $0 "was executed with" $# "parameters on the command line." Explain the function of each line

2 questions ..

Hello, I need the answer of below questions please: 1) Suppose f is a function that returns the result of reversing the string of symbols given as its input, and g is a function that returns the concatenation of the two strings given as its input. If x is the string hrwa, what is returned by g(f(x),x)? Explain your answer and

Use big-O notation to classify the traditional grade school algorithms for addition and multiplication. That is, if asked to add two numbers each having N digits, how many individual additions must be performed? If asked to multiply two N-digit numbers, how many individual multiplications are required?

Use big-O notation to classify the traditional grade school algorithms for addition and multiplication. That is, if asked to add two numbers each having N digits, how many individual additions must be performed? If asked to multiply two N-digit numbers, how many individual multiplications are required?

Truth Tables

Using the Internet and other resources define and study Truth Tables. How are Truth Tables used in computer programming? Give a short example. Did you find other areas where Truth Tables are used? Explain.

Algorithm Efficiency: Example Problems

Please help with these 2 problems in algorithm efficiency. View attached file. 1. Rank the terms of the following function according to their order of growth. Give explanation. 2. Consider the following algorithm where n is a positive integer. What is the efficiency class of this algorithm? Show your reasoning.

Nyquist Bandwidth question

Please reference this figure for the question: 11. Considering only the Nyquist bandwidth limitation. Determine the bandwidth required of the media (at Point D) given the following: a. 20-analog voice signals digitized using standard G.711 PCM; a TDM multiplexer with an added output overhead of 15%; and a modem that empl

Tax Calculator

I need help with a design flow chart email of the source code of the program. Insert comments in the program to document the program internally.

Prospectors Problem for Lanterns in Mineshafts

Four prospectors with only one lantern must walk through a mine-shaft. At most, two prospectors can travel together and any prospector in the shaft must be with the lantern. The prospectors, named Andrews, Blake, Johnson, and Kelly, can walk through the shaft in one minute, two minutes, four minutes, and eight minutes, respectiv

Normalizing Relations to 3NF

Normalize the following relation to 3NF. Describe all normal forms, and what must be done to achieve each. Make Computer Company Computer Store PC-1 BUSY BUSINESS MACHINES JOYLAND PC-2 BUSY BUSINESS MACHINES DATALAND PINEAPPLE COMPUTERS INFOWORLD WIZ-1

Digital to Analog Translation: Advantage of Schemes like QAM

Digital signals can be translated to analog signals by using relatively simple techniques such as varying the amplitude or frequency between two specified values. What is the advantage of using more complex schemes such as QAM (Quadrature Amplitude Modulation)?

Network, IP

1. Summarize the following address with the most specific mask (e.g 3.3.3.0 /24, 3.3.4.0 /24 3.3.5.0 /24 Summary address = 3.3.0.0 255.255.248.0 or 3.3.0.0/21) a) 172.16.60.0 /24 172.16.61.0 /24 172.16.62.0 /24 2. Given 192.164.10.33 255.255.255.224 determine the subnet and broadcast address. 3. For r

San Juan Sailboat Charters: Entities, Identifying Primary and Foreign Keys

San Juan Sailboat Charters is an agent that leases sailboats to customers for a fee. San Juan does not own any sailboats; it leases boats on behalf of the owners who wish to earn income when they are not using their boats. San Juan charges a fee for its service. San Juan specializes in boats that can be used for multi-day or wee

Changing the Structure for an Ebook: Example Problem

Add a second DTD to the XML program attached that provides a different structure for the ebook. I have attached the 2 XML programs already created. Basically add a second DTD to ebook2.zip and change the structure of the ebook. Do not incorporate an attribute declaration.

Algorithm Verification

Answer the following questions about the information in Appendix J: o What will be printed if the input is 0? o What will be printed if the input is 100? o What will be printed if the input is 51? o What will be printed if the user enters "Wingding"? o Is this design robust? If so, explain why. If not, explain what you can