Given the following array A, answer all questions 58 72 19 41 33 62 84 1) Show the array A when Build Max Heap (A) is called and indexi- 2 is already executed. 2) Show the array after Build_Max_Heap (A) is executed. 3) If we are to insert 95 what is the value of the variable 'i' at line 1 of Max Heapify (A. i) for the initial call? 4) If we are to insert 95. show the array A at line 1 of Max Heapify (A. i) for the initial call? 5) If we are to insert 95. what is the value of the variable i at line1 of Max Heapify (A, i) after the first recursive call? 6) If we are to insert 95. show the array A once the Max_Heapify (A. i) is terminated.
Q: This is a list of the first supercomputers in the world.
A: This is a list of the first supercomputers in the world.
Q: ( Make purchase, View items, Complete check out) Conversion sequence diagram as example
A: answer is
Q: Which AWS service can let us centrally manage billing and security rules across several accounts? (...
A: Introduction: Language is a widely used programming language that has been used to develop a variety...
Q: Consider the int Array below and determine the values of A and B so that Array[0] has an integer in ...
A: The question is to find the values of A and B.
Q: Question :) Buffers are used to minimise access latency between various levels of the memory hierarc...
A: Step 1 The answer is given in the below step
Q: Task 3 Develop a class diagram for following description: Prepare a class diagram for a graphical do...
A: Given The answer is given below
Q: ouble or char) NxN array (N>=2) 2. (char) 1x5 array containing the sort instructions Output: 1. (d...
A:
Q: 4, In most of Europe and Asia annual automobile insurance is detemine Each policyholder is given a n...
A:
Q: Who made the hybrid computer
A: Computer which are based on analog and digital concepts are known as hybrid computers.
Q: Define the term "virtual machine" and explain why it is necessary.
A: Given We know about the virtual machine 1) define virtual machine 2) why it is necessary
Q: Sales Data Program Create a successful running c++ program that meets the following requirements. ...
A: ************* something to note ***************In the program i had created the add function as Sup...
Q: Write a C program containing a recursive function that will get the whole number quotient result of ...
A: Given: To write a C program to find quotient of two numbers.
Q: #include using namespace std; class Box { double width; public: friend void printWidth( Box box );...
A: I have modified the code to count number of objects.
Q: : Write a program to add 50 numbers stored at memory location start at 4400H:0100H then store the re...
A: MOV AX , 4400HMOV DS, AXMOV CX , 0050H ← counterMOV BX , 0100H ← offsetlabel → Again: ADD AL, [BX]IN...
Q: You will create a web application to store inventory for products. Choose your business name, logo, ...
A: Create a DbContext class and DbSet to map model classes to a database Seed data for your product ......
Q: The value of the keyboard flag byte is returned by which INT 16h function?
A: Function INT 16h: INT 16h functions are for BIOS interrupt vectors that take keyboard actions on any...
Q: Question 8 Find value x such that the address of buf[x] equals to the address of p. Both buf and p a...
A: Q8)
Q: Extend DATAVIEW to support some blockchain features, such as the support of Metatask, a new token to...
A: Blockchain can enable Universal Basic Income, (UBI) through a system like Circles, or power local cu...
Q: Write a JAVA program in which the user enters the initial velocity u, time of travel t, and the acce...
A: import java.util.Scanner;//to read inputpublic class Main{ public static void main(String[] args) { ...
Q: ramming Exercise 2.6 Instructions momentum.py 1 # Modify the following code The kinetic energy of a ...
A: The kinetic energy of a moving object is given by the formula KE = ½mv2 where m is the object’s mass...
Q: 1Are functions of Watson available to public, such as you (with charge)? If yes, then how do we acce...
A: 1Are functions of Watson available to public, such as you (with charge)? If yes, then how do we acce...
Q: (a) Show that the following grammar is ambiguous: ::= | [ ::= 0 | 1|2 |3|4|5|6|7|8 | 9 (b) Find...
A: Find the answer below to above question. I hope this will meet your requirement.
Q: Write a JAVA program in which the user enters the initial velocity u, time of travel t, and the acce...
A: Required:- Write a JAVA program in which the user enters the initial velocity u, time of travel t, a...
Q: Create a single SHLD instruction that moves the AX register's highest bit to the DX register's lowes...
A: Given that: Create a single SHLD instruction that shifts the highest bit of the AX register to the l...
Q: Input alphabet = {a,b} 1. write the CFG for the language of palindromes 2. Convert this into PDA (st...
A: 1) CFG of the given palindrome
Q: Buffers are used to minimise access latency between various levels of the memory hierarchy. List the...
A: Let's see the solution in the next steps
Q: Please provide a C++ program in which a min priority queue is declared and the priority queue stores...
A: Required:- Please provide a C++ program in which a min priority queue is declared and the priority q...
Q: construct an NFA that realizes the language L over the alphabet {a, b, c} that consists of all strin...
A: Here is the NFA about the string given:
Q: What is the SI/DH register's code?
A: Introduction: The 16-bit index registers are called SI (Source Index) registers. It is used to condu...
Q: Why would a problem cause the current command to be retried?
A: Page fault is a phrase that refers to the pages that are kept in memory. When a user requests access...
Q: Define the term "virtual machine" and explain why it is necessary.
A: Introduction: A virtual machine is created on a physical hardware system (off-premises) that acts as...
Q: What is the IEEE-754 single precision real number after encodingt the real decimal number -76.0625? ...
A: Here in this question we have given a decimal numbers and we have asked to convert it into IEEE 754 ...
Q: Write C++ program to represent a simple nested case (selector).
A: In this question, we are asked to write a program so that nested cases would be used in C++ Explaine...
Q: Define Turing Machine. Describe its capabilities. Also write short notes on Universal Turing Machine...
A: Given The answer is given below
Q: Help me with the coding. 1.find the sum of elements for the array named number which contains data {...
A: According to the Question below the Solution: Output:
Q: Which INT 21h operations are necessary to acquire the system date, show it, and then alter it?
A: Introduction: Within this range, some calls have sub functions that expand the scope of operations. ...
Q: Which field in the FPU control word allows you to modify the rounding mode of the processor?
A: Rounding Control Field or RC field controls how floating point instructions are rounded. See below ...
Q: chy. List the probable buffers required between the L1 and L2 caches, as well as between the L2 cach...
A: L1 is "level-1" cache memory, usually built onto the microprocessor chip itself. L2 (that is, level-...
Q: What decimal value does the 8-bit binary number 10110110 have if it is represented using two's compl...
A: 1) We have 8-bit bianary number 10110110 which is represent in two's complement 2) We need to find ...
Q: When invoking INT 21h, which register contains the function number?
A: Answer: INT: 21 h A subdirectory may be created using the function 39h. INT: 21 h Function The curre...
Q: d) Why will anything will be able to use an lP address or any other form of addressing scheme in the...
A: In a computer network, there is a requirement for communication which is fulfilled by an addressing ...
Q: Which of the following instructions inserts an integer operand into ST(0
A: SUMMARY: - Hence, we discussed all the points.
Q: Total = a +b + c; Average = Total / 6; А. Logic Errors В. Run-time Errors С. None of the above Synta...
A: A programming language must follow rules and regulations to execute task successfully. Logical erro...
Q: Salesforce/SOQL/Developer Please create a simple SOQL query to check the permission granted on a obj...
A: The code is given below
Q: Let E (0,1). Let A and B be the lists of three strings each, defined as List A List B W, 1 1 111 2 1...
A: Given that wi = (w1, w2, w3) = (1,10111,10) xi = (x1,x2,x3) = (111,10,0) let us consider the sequen...
Q: In which register does a local descriptor table's base location reside?
A: Answer:
Q: Consider the int Array below and determine the values of A and B so that Array[0] has an integer in ...
A: The question is to find the values of A and B.
Q: What UNIX utility can read an Execution and Linkable Format file's contents?
A: Executable and linkable format : In processing, the Executable and Linkable Format (ELF, previously ...
Q: e char datatype is OASCI O EBCDIC O MORSE Any of the choice
A: The char datatype is based on what standard?OASCII O EBCDICOMORSEOAny of the choice
Q: show your work text not a picture -35 (base 10) = ____________________________ (8-bit Excess-M bi...
A: Converting -35 to base 10. -*102=0 3*101=30 5*100=5 Adding all to get Ans=3510
(Please do your own work. Don't copy from other solutions)
Trending now
This is a popular solution!
Step by step
Solved in 3 steps with 1 images
- Given an Array M of 99 int values, and int *pit: 1. Declare two pointers p1 and p2 2. Make p1 point to the first odd value in M. 3. Make p2 point to the last negative value in M. 4. Make p1 and p2 point to array locations index 15 and index 33 5. Use pointer pit to print all elements in the array in reverse. 6. Find the count elements between p1 and p2 inclusive. 7. Find the product of values between p1 and p2. 8. Use pointer pit to print all odd values between p1 and p2 exclusively. 9. Use pointer pit to print all values between p1 and p2 inclusive that are odd and divisible by 5. 10. Use pit to replace all even and negative values in M with 7.program in hash/associative Write a the choice that language array/dictionary hash/associative array/dictionary. For example, store people's names and their ages. could be used to create three-character names and ages, which could of your and uses a large number of operations on the a the hash could A random-number generator be added to the hash/associative array/dictionary. When a duplicate name was generated, it would cause an access to the hash but not add a new element.Extend the Array project to include:16. Define a pointer to a double, pdArray.17. Assign the pointer, pdArray, to contain the address of the double array, dArr:18. Use the array name, dArr, to print out the array elements with subscript notation, [ ]. All on 1 line a space between each.19. Use the pointer to print out the array elements with pointer notation while not changing the pointer itself. Use a for loop. *( pdArray + Cnt1) would be an example. All on 1 line a space between each.20. Use the pointer to print out the array elements with pointer notation but change the pointer to point to the actual array element rather than the method in 18. All on 1 line.*pdArray would do this if the loop has the following post loop operation: pdArray++21. Use the array name for the double array and pointer notation to print the entire array, all on one line.22. Using a different pointer, piArray, allocate enough memory for 100 int's and assign the address to the pointer.23. In a for loop…
- DESIGN YOUR OWN SETTING Task 5: Devise your own setting for storing and searching the data in an array of non-negative integers redundantly. You may just describe the setting without having to give an explicit algorithm to explain the process by which data is stored. You should explain how hardware failures can be detected in your method. Once you have described the setting, complete the following: Write a pseudocode function to describe an algorithm where the stored data can be searched for a value key: if the data is found, its location in the original array should be returned; -1 should be returned if the data is not found; -2 should be returned if there is a data storage error Include a short commentary explaining why your pseudocode works Describe the worst-case and best-case inputs to your search algorithm Derive the worst-case and best-case running times for the search algorithm Derive the Theta notation for the worst-case and best-case running times Maximum word…1. The sorted values array contains 16 integers 5, 7, 10, 13, 13, 20, 21, 25, 30,32, 40, 45, 50, 52, 57, 60. Indicate the sequence of recursive calls that are made tobinaraySearch, given an initial invocation of binarySearch(32, 0, 15).show only the recursive calls. For example, initial invocation is binarySearch(45,0,15)where the target is 45, first is 0 and last is 15.Write the procedure called Kstrcpy with the following comment block. Source array of characters // Given: // Task: // Return: destination array. Kstrcpy should work the same as strcpy. example Kstrcpy (destination, source) ; **** Copy the source array to the destination array. Write the function called Kstrlen with the following comment block. // Given: (Array of characters). // Task: // Return: length Kstrlen should work the same as strlen. example len = strlen (firstname); calculate the length of the array of characters ***************** // Given: Write the procedure called Average_Sum with the following comment block. (Array of integers) and (number of elements in the array). // Task: Compute the Average and the Sum // Return: Average and Sum Example Input: Input name -> Fred Input number 1 -> 10 Input number 2 -> 20 Input number 3 -> 30 Input number 4 -> 40 Input number 5 -> 50 Example output: Copy of your name Fred. Length of your name 4. The sum of your numbers (150). The average…
- Answer in java script Create a function that returns true if the first array can be nested inside the second. arr1 can be nested inside arr2 if: 1. arr1's min is greater than arr2 's min. 2. arr1's max is less than arr2 's max. Examples canNest([1, 2, 3, 4], [0, 6]) true canNest ([3, 1], [4, 0]) → true canNest ([9, 9, 8], [8, 9]) → false canNest([1, 2, 3, 4], [2, 3]) - falseImplement ONE array of the English alphabet (26 characters). a) Use a loop to cast and generate the array. b) Use a loop to output the array. c) Create a swap function for swapping character variables. d) Use a loop and the swap function to reverse all array elements. e) Use a loop to Output the updated array. Hint: Set a variable for the first and last indices. Swap those values. Gradually move the first/last pointers to the middle of the array, swapping as you go. When the middle is reached, the array will be reversed. Example Output Original: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Reversed: Z Y X W V U T S R Q P O N M L K J I H G F E D C B A its c++ do it in a easy way thankyouPart 3: JavaScript - Program Outline, and Startup Function We are going to use a function, startup(), that we can consider an entry point into our running JavaScript. Below is your startup code. // Entry point startup() function startup() { } // Step 1 (Required): Populate the config array with three objects to be used for each of the three // prompts, each object with the following properties: // prompt: String property to hold prompt() text // prop: String property that is the property to be used when storing user input for this prompt const config = [ ]; // Empty data array to hold prompt input const data = []; // Step 2: Use a for loop to collect user input using config array prompt for prompt(), storing all three // data points using the config prop value as the property, and all three prop: value stored in a single object // as a single array item // Step 3: Use console.log to display each data property and value on // a single line, with each property: value separated by a comma…
- Assignment Write a program that reads a 2D array of chars, checks, and corrects each char within this array, and print out the corrected 2D array. First the program will read the row count (rowCount) and column count (columnCount) of the 2D array, both as int values. Then, the chars constituting the 2D array will be read on a row-by-row basis. After reading the 2D array, the program will check and correct each char within the 2D array according to the rules below. This process MUST be done by using a void function by sending the appropriate cell of the 2D array with a call-by-reference fashion. • If the row index is an even number, a char can only be a lowercase English value. • If the row index is an odd number, a char can only be ?, 7', or X'. • Any incorrect value MUST be changed into Finally, the checked and corrected 2D array will be printed out to the screen. NOTE: Checking the correctness of a char and correcting it (if necessary) MUST be done in the function with a…9. Implement an array with values 1, 5, 14, 23, 45, 52, 58, 81, 82 91. a) Create a getindex( function which does a linear search upon the array for a specific value n. Return the index of n, or -1 ifn does not exist, b) Print the array. c) Search the array for the values 23, 58, 11, rint the reaults. Qutpur Examnle 15 14 23 45 52 58 71 82 91 Number 23 is located at index Number 58 As located at index C Number 11 i looated at index -1TASK 2 Write, Compile and Execute a Java program that meets the following requirements: Creates an array with 100 randomly chosen integers. Prompts the user to enter the index of the array, then displays the corresponding element value. If the specified index is out of bounds, display the message Out of Bounds. You should use ArrayIndexOutoFBoundsException to detect cases when the index is out of bounds.