Free

Introducation to computer science assingment - Assignment Example

Comments (0) Cite this document
Summary
The array of the pointers that are capable of being inter-linked to different structures helps the programmer to avoid having…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.8% of users find it useful
Introducation to computer science assingment
Read TextPreview

Extract of sample "Introducation to computer science assingment"

Introduction to computer science Q5. The multi stage programming language enables the programmers to use the mechanism of abstraction such as the modules, functions and the objects. The array of the pointers that are capable of being inter-linked to different structures helps the programmer to avoid having accidental captures as the bound variables are always renamed(Finkel,1996). The interlinking of the arrays in the structure enhances the reasoning on the quoted terms even in the settings that is untyped.This makes it easy for the programmers to access the elements that are in the array.
Q6. The value that can be retrieved from the table by the pop instruction is 11 C. this is because it is possible to get the pointer in to the first element of the vector through incrementing this pointer in order to access the second pointer. The value that will be found in the pointer after the pop operation is 12 A. on the other hand, the deque is not a guarantee of a contiguous storage which contains the same elements (10, 11 12) and getting the pointer to the first element does not guarantee that you will get access to the second pointer by incrementing the pointer (Finkel, 1996)
.
Q7. Assuming that the stricture above represents a queue, the value that will be removed from the queue is 14.this is because it is obtained after several increments of 10. The head pointer will next point at 13 which will be the value before 14.
The queue will appear as follows when Z is introduced.
Address Contents
10 Z
11 F
12 C
13 A
14 B
15 E
Q8. This is a complete tree and the value 54 is the valid value for the tree.
55
/ \
56 59
/ \ / \
60 54 62 65
When the value 54 is null, the binary diagram of the tree will be,
55
/ \
111 112

Q9. A binary tree without the pointers will look like this;
* 55 is the root node.
*In order to obtain the left child of a certain index, we multiply the current index 2 and we add 1. *for us to get the right child on this specific index, we multiply the current index by 2 and then we add 2.
*to obtain the parent of a certain index, we subtract one and divide by two. The remainder is then thrown away.
Q10. The reference data types are used to refer to objects while the primitive data types usually contain some values. Some of the example of primitive data type includes the byte, int Boolean and the float.
Q11. When writing a chessboard structure that has an 8-by-8 grid, the programmer can consider using arrays that contains chess like structure which is a two dimension array. In order to store the position of the chess piece. The two dimension array is used in pinpointing individual elements in the array (Finkel, 1996)
Reference
Finkel, R. A. (1996). Advanced programming language design. Menlo Park, Calif. [u.a.: Addison-Wesley. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Introducation to computer science assingment Assignment”, n.d.)
Introducation to computer science assingment Assignment. Retrieved from https://studentshare.org/information-technology/1665952-introducation-to-computer-science-assingment
(Introducation to Computer Science Assingment Assignment)
Introducation to Computer Science Assingment Assignment. https://studentshare.org/information-technology/1665952-introducation-to-computer-science-assingment.
“Introducation to Computer Science Assingment Assignment”, n.d. https://studentshare.org/information-technology/1665952-introducation-to-computer-science-assingment.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Introducation to computer science assingment

Computer Science

...Personal Statement - Computer Science I always fancied myself with computers since my childhood. Because I grew up in a small town in Vietnam, a place where computers were not introduced to the fullest at the time of its inception and were considered wholly as a luxury instead of a necessity, it was curiosity plus a self-driven need to learn about this new technology. My interest in computer sciences dates back to my school days. My first instance with a computer was in my mid-school where I got a chance to play games on it. High schools in my town at that time did not offer computers as...
4 Pages(1000 words)Personal Statement

Assingment

...Contribution of Women to the Development of Home Economics in Education They all campaigned for expanded educational opportunities for women. Sarah Hale campaigned continually for women to have opportunities to enroll for higher education. She further fought for household science to be incorporated into the higher education curriculum (Gunn 4). Similarly, Catherine Beecher campaigned for the inclusion of domestic science into the higher education curriculum. She distinctly pushed for the subject to be an exclusive branch of school education. Sarah Hale is attributed for increasingly pushing for women empowerment through education. Mary E. Cripps helped in developing the home economy discipline in women’s...
3 Pages(750 words)Assignment

Computer Science Information System

...Case Study: of the Situation: From the case study of a fitness center, we derive at the following assumptions There are 5 centers around the metropolitan. 2. There are in total 650 members and 30 members at each location. 3. This system will be used by both members and fitness consultants to track participation in various fitness activities, such as free weights, volleyball, swimming, stair climbers, and yoga and aerobic classes. The DSS system will be implemented in the form of a client server model with an interface, possibly a computer visual display unit, at all the five centers and will act as a platform to the prospective and current members and consultants. They are able to access the required information...
3 Pages(750 words)Essay

Computer Science

.../321957-321957-64295-306995-306995-3355644.html HP Pavilion a6500z series .http://www.shopping.hp.com/webapp/shopping/computer_can_series.dostoreName=computer_store&category=desktops&a1=Category&v1=Everyday+computing&series_name=a6500z_series Choosing a PDA versus a Laptop. (2007). Retrieved july 30, 2008, from http://www.googobits.com/articles/1019-choosing-a-pda-versus-a-laptop.html roseberry, catherine. (2008). Laptop or PDA for Business Trips. Retrieved july 30, 2008, from http://mobileoffice.about.com/cs/packyourgear1/a/laptoppda.htm Heather, booth., & Brown, murray. (n.d.). Basics of computer science. Retrieved july 30, 2008, from http://www.cs.utk.edu/modules/acknowledgements.html... 1. Write a short report with examples to show how a...
13 Pages(3250 words)Essay

Computer Science

... of Large Software Systems’, Proc. IEEE Westcon, 1970; reprinted in Proc. 9th Int’l Conf. Software Eng. (ICSE 87), IEEE Press. pp. 328–338. 4. Ambler, S. 2007. ‘Agile/Lean Documentation: Strategies for Agile Software Development’, Ambysoft, http://www.agilemodeling.com/essays/agileDocumentation.htm 5. Cockburn, A. and Highsmith, J. 2001. ‘Agile Software Development: The People Factor’, IEEE Computer 34, 11, 131-133. 6. Cohn, M. and Ford, D. 2003. ‘Introducing an Agile Process to an Organization’; IEEE Computer 36, 6 (June 2003), 74-78. 7. Paetsch F., Eberlein A. and Maurer F. 2003. ‘Requirements Engineering and Agile Software Development’, Proceedings of the IEEE International Workshops on Enabling 8. Technologies: Infrastructure... changes...
10 Pages(2500 words)Essay

Assingment

...Assignment Financial accounting involves collection, ification, recording, summarizing, and communication financial information, about a enterprise, to relevant stakeholders. The income statement and the balance sheet are some of the tools that are used to communicate the financial information. This paper develops statement of income and a balance sheet for a case scenario. The income statement determines and communicates the relationship between generated revenues in an enterprise’s ventures and the incurred costs towards generation of such revenues. Its major components include revenues, cost of revenues, gross profit, net profit and net income. The balance sheet however illustrates an enterprise’s financial position... Financial...
1 Pages(250 words)Assignment

Computer Science

... ≥ 0.5 then y = y + 1 error = error - 1.0 THE PIXEL DUPLICATION This is the simplest approach to solving the resolution problem. It is majorly used for drawing curves with slopes between −1 and 1. Each pixel both below and above are drawn thus resulting in a curve that has a thickness of 2n+1 pixel in the y axis (Drawing Lines and Curves (Introduction to Computer Graphics Using Java 2D and 3D). It works better for thinner lines. In this algorithm the pixels are duplicated in columns for the lines with – 1 < slope < 1 and in rows for all other lines . This results in lines that are vertical or horizontal towards the end thus displeasing for thicker lines as illustrated below... ...
4 Pages(1000 words)Lab Report

Computer Science

.... (1128 words) References Brown.edu, (2015). A Framework for Making Ethical Decisions | Science and Technology Studies. [online] Available at: http://www.brown.edu/academics/science-and-technology-studies/framework-making-ethical-decisions [Accessed 3 May 2015]. Velasquez, M., Andre, C., Shanks, T. and Meyer, M. (2015). Calculating Consequences: The Utilitarian Approach to Ethics. [online] Scu.edu. Available at: http://www.scu.edu/ethics/practicing/decision/calculating.html [Accessed 3 May 2015].... and Morality Introduction Morals and Ethics can have a philosophical impact on thechoices individuals make on ...
4 Pages(1000 words)Coursework

Computer Science

...COMPUTER SCIENCE Dos/DDos Dos attack ification is vital in understanding the attacked protocols so as to avoid the worms on suitable platforms. Over the last decades there has been no study on the DDos attacks and therefore there is not much understanding on the same. This is because there is insufficient data at the backscatter. According to Kumar, there are some articles that have scrutinized the hosts that have been contaminated with the worms. This has been done through examination of the structure and the properties of the worms. This has been instrumental in the classification.Mandia and Prosise categorized the DDos attack into three distinct groups. These groups include Destructive, Resource...
2 Pages(500 words)Essay

Computer Science and IT

...Computer Science and IT A computerised accounting system is an accounting information system that processes the financial transactions and events as per the accounting principles and standards to generate reports as per user requirements. The computerised accounting system has two main aspects that include accounting principles and a user defined structure for the upkeep of records and production of reports. (Kiely, 2015).There is a requirement to create innovative products and services to respond to the variable customer routines and their demographics. The intense competition among banks calls for a steady refurbishment of the banking activities to ensure customers enjoy quick and efficient services. An improved service through... ...
4 Pages(1000 words)Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Introducation to computer science assingment for FREE!

Contact Us