Give the pseudocode of a data structure that supports the stack push and pop operations, and a third operation findMin, which returns the smallest element in the data structure, all in O(1) worst-case time.

Answers

Answer 1

Answer:

start Stack push:

IF stack is full

   return NULL

ENDIF

stack_top = stack_top + 1

stack[ stack_top] = data

end

start stack pop:

IF stack is empty

   return NULL

ENDIF

data = stack[ stack_top]

stack_top = stack_top - 1

end

start stack findMin:

SORT stack in ascending order

min = stack[0]

RETURN min

end

Explanation:

Pseudocode is the description of an algorithm to be used to implement a program code. The pseudocode above describes the step by step implementation of the stack data structure 'push', 'pop', and a new 'findMin' function. The findMin function sorts and gets the minimum value of the elements in the stack. The push and pop operators add and remove items from a stack.

The pseudocode of all three functions does not iterate over the stack element, but gets the constant values of an item in the stack, giving it a time complexity of 1 (O(1) in big-O notation).


Related Questions

Write an if-else statement for the following: If user_tickets is less than 5, assign 1 to num_tickets. Else, assign user_tickets to num_tickets

Answers

Solution :

function tickets(user_tickets){

var num_tickets;

if (user_tickets < 5) {

num_tickets = 1;

return ('num_tickets: '+ num_tickets);

}

else {

num_tickets = user_tickets;

 return('num_tickets: '+ num_tickets);

}

}

// Testing the tickets function

// With user_tickets = 3, 5, 8, and 1

console.log(tickets(3));

console.log(tickets(5));

console.log(tickets(8));

console.log(tickets(1));

For an indirect reference, what happens if there is no list of limited values authorized for a user in the direct reference?

a. SQL Injection
b. Brute Forcing of stored encrypted credentials
c. XML Injection
d. Access to sensitive data possible

Answers

Answer: Access to sensitive data possible

Explanation:

A reference is a value that allows a particular datum to be accessed indirectly by a program.

It should be noted that when there is no list of limited values authorized for a user in the direct reference, this will lead to a possibility for an access to sensitive data. Therefore, in order for this to be prevented, there should be a list of limited values that will be authorized for a user.

The absence of a list of limited values which would restrict access to certain files or data will lead to vulnerability of sensitive data. Hence, access to sensitive data possible.

The possibility of data being assessed by an unauthorized user is very likely when there is no restriction.

The reference is supposed to be key as a key to control the level of access given to users by providing a list of limited authorized values.

Hence, when these list is absent, then, access to sensitive data possible becomes very likely.

Learn more : https://brainly.com/question/16666220


To identify a document as a template, you will need to change the file type in the_____ dialog box.

A. Options

B. Save As

C. References

D. Template

Answers

Answer:

A) options this is correct

Explanation:

Answer:

The answer is definitely option A

Explanation:

_____, a quality system standard is a three-part, continuous cycle of planning, controlling, and documenting quality in an organization.

a. Seven run rule
b. ISO 9000
c. ASQ
d. Six Sigma

Answers

Answer:

b. ISO 9000

Explanation:

ISO 9000 can be defined as a quality system standard is a three-part, continuous cycle of planning, controlling, and documenting quality in an organization.

This ultimately implies that, the ISO 9000 is a set of standards that typically guides an organization in ensuring that they meet both the stakeholders and consumer requirements or needs with respect to their products and services under statutory and regulatory requirements at a specific period of time.

Users can customize their Windows device by going to the Control Panel under __________.

Answers

Answer:

The Settings app

Explanation:

The control panel on windows can be accessed by going into the settings app, or by going to the side bar and clicking the gear icon.

Answer:

hmmmm i would say system preferences but i may be incorrect

Explanation:

Which two statements are true about an OS?

translates the user’s instructions into binary to get the desired output
-needs to be compulsorily installed manually after purchasing the hardware
-is responsible for memory and device management
-delegates the booting process to other devices
-is responsible for system security

Answers

The correct answers are A and C
Please give me brainless

Answer:

See answers below :)

Explanation:

-is responsible for memory and device management

-is responsible for system security

Out-of-order instruction execution can cause problems because a later instruction may depend on the results from an earlier instruction. This situation is known as a ______ or a________

a. risk, reliance
b. hazard, reliance
c. risk, dependency
d. hazard, dependency

Answers

Answer:

C

Explanation:

Which of the following tools can be used to aggregate relational data from multiple sources?
A.)Power Pivot
B.)PivotTables
C.)Get & Transform

Answers

Answer:

ApOWER PIVOT

Explanation:

The tools that can be used to aggregate relational data from multiple sources is Power Pivot.

Data aggregation is the known as putting or gathering of data and presenting a summary form of it.

The data can be gathered from multiple data sources with the intent of combining these data sources into a summary for data analysis.

conclusively, Data warehouses gives users room to run queries, compile reports, generate analysis, and retrieve data in a consistent format.

Learn more from

https://brainly.com/question/21263038

Write a C++ program that reads a temperature value and the letter C for Celsius or F for Fahrenheit. Print whether water is liquid, solid, or gaseous

Answers

Answer:

(1) #include<iostream>

(2) #include<conio.h>

(3) using namespace std;

(4) void main()

(5) {  

(6) float temp;

(7) char sel;

(8)    cout<<“Select a temperature value in Celcius or Fahrenheit.\n”;

(9)   cout<<“Press C for Celcius.\n”;

(10)   cout<<“Press F for Fahrenheit.\n”;

(11)  cin>>sel;

(12) switch (sel)

(13){

(14)case ‘C’:

(15) cout<<“Enter a temperature value in Celcius: “;

(16)cin>>temp;

(17) if(temp<=0)

(18)   {

(19)   cout<<“Water is solid at “<<temp<<” degree C.”;

(20)   }

(21)  else if(temp>=100)

(22)   {

(23)  cout<<“Water is gaseous at “<<temp<<” degree C.”;

(24) }

(25) else

(26)    {

(27)   cout<<“Water is liquid at “<<temp<<” degree C.”;

(28)  }

(29)         break;

(30)  case ‘F’:

(31)     cout<<“Enter a temperature value in Fahrenheit: “;

(32)   cin>>temp;

(33)   if(temp<=32)

(34)  {

(35)  cout<<“Water is solid at “<<temp<<” degree F.”;

(36)    }

(37)    else if(temp>=212)

(38)  {

(39)   cout<<“Water is gaseous at “<<temp<<“degree F.”;

(40)  }

(41)    else

(42)   {

(43)  cout<<“Water is liquid at “<<temp<<” F.”;

(44)    }        

(45)    break;

(46)  }  

(47)   getch();

(48) }

Which of the following should be implemented when there is a period of high employee turnover?

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The question is about which of the following should be implemented when there is a period of high employee turnover?

The options to this question are given below.

A review of NTLM hashes on the domain servers A review of group policies A review of user access and rights A review of storage and retention policies

The correct option to this question is-3:

A review of user access and right.

Other options are not correct because these options are not related to review when employee turnover is going high etc.

write an if statement to Test if a number stored in y is between 6 and 10 inclusive. only an if statement.

Answers

y = whatever value you want

if 5 < y < 11:

   print("Your number is between 6 and 10")

What is the character missing in the line of code below that is part of the pseudocode outline of a program?
______ Get the user's height.

Answers

Answer:

# Get the user's height.

Explanation:

The answer is #

Answer: #

Explanation: got it right on edgen


This the code from the last post I did

Answers

import java.util.Scanner;

public class JavaApplication86 {

   

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       int x = 0, c = 0, sum = 0;

       while (true){

           x = scan.nextInt();

           System.out.println("You entered: "+x);

           if (x == -1){

               break;

           }

           sum += x;

           c++;

       }

       System.out.println("The sum is "+sum);

       System.out.println("You entered "+c +" numbers");

   }

   

}

This works for me. Instead of subtracting one from c and adding one to sum, I used an if statement to break away from the while loop if the entered number is -1.

write a program to Test if mold is stored in the variable word.

Answers

word = whatever value you want.

if "mold" in word:

   print("Mold is in the variable word.")

else:

   print("Mold is not in the variable word.")

Which of these is not an application software?
A. Control and Measurement
B. APPS
C. Spreadsheets
D. Utilities​

Answers

A; control and measurment

Answer:

D. utilities should be the answer

What will be the output of the given code?

class BookName {
public void book() {
System.out.println(“new book”);
}
}
public class Check{
public static void main(String args[]) {
BookName c1[] = new BookName [5];
for (int i = 0; i<10 ;i++) {
c1[i] = new BookName();
c1[i].book();
}
}
}

A. to print new book five times
B. to print the numeral 5 five times
C. a runtime error
D. to print new book 10times

Answers

Answer:

B

Explanation:

A manufacturer of scented candles is preparing to produce five new candles with fragrances of peppermint, cinnamon, lemon, spice pumpkin, and pine scents to sell for the holiday season. To track the sale of the new scented candles you will need to create a program that should use two parallel element arrays. An array that will hold the names of the 5 new scented candles and another array that holds the count of the 5 new scented candles that are sold over the next couple of months. The program will track the fragrance type of the candle purchased and the number of candles sold for each fragrance. The program should also generate a report that displays the fragrance type of the 1.largest number and 2.smallest number of candles sold and the 3.total sales of all candles purchased.

Answers

Answer:

Why are you asking someone to create a program

Explanation:

Declare report candle fragrance_]{459.’~

How is the two point formula used to find the equation of a line when 2 points are known?

Answers

y-y1=((y2-y1)/(x2-x1))(x-x1)
Here (x1,y1) and (x2,y2) are the given points
taking the change in y over the change in x

PLEASE HURRY AND BE SERIOUS

Which of the following statements is true of a hierarchical addressing scheme? Check all of the boxes that apply.

It includes different parts that represent the location of a computer or device on a network.

It presents numbers in a randomized format.

It is used for IP addresses.

Answers

Answer:

It is used for IP addresses.  It includes different parts that represent the location of a computer or device on a network.

Explanation: My dad is a professional engineer

Answer:

Its A and C

Explanation:

I did it on ed2020

Spyware is malicious software installed on a computer without the owner’s knowledge. It is designed to monitor data and allow unauthorized remote access.

Question 6 options:

True

False

Answers

Answer:

True

Explanation:

Why is body language an important indicator in business meetings? A. You will be able to communicate more strongly. B. You will know if your audience is engaged. O C. You will know how you look to your peers. O D. You will be a better oral presenter. SUB​

Answers

Answer:

you will know if your audience is engaged.

Explanation:

Answer:B

Explanation:

I just took the test

Phishing (pronounced fishing) is malware sent through e-mail that looks like a legitimate message from a trusted sender. The goal is to convince the recipient into submitting personal information, such as passwords or bank account numbers.

Question 9 options:
True
False

Answers

Answer:

this is true

Explanation:

the answer is true

The answer is true .

I need help with my previous question please

Answers

I can’t find your previous question :(

With _____, rather than automation, humans are in the decision loop, with machines rapidly executing the approved tasks.

Answers

Answer:

artificial intelligence

Explanation:

Remember, the term Artificial intelligence in simple words refers to a technology that enables machines (such as computers) to make decisions, plan activities, and execute tasks.

So in a sense, with widespread usage of artificial intelligence, humans would no longer play active roles in executing tasks but the machines will; doing so rapidly.

What solicits online input such as product ratings from consumers?
A qiuck response code
Computer forensics
Crowdsourcing
Or Crowdfunding?

Answers

Answer:

Crowdsourcing I think is the correct answer. "A quick response code" and "Computer Forensics" both don't make sense as answers, and Crowdfunding is specifically for money.

Question 1 of 20 Gus has decided to organize his inbox on June 26 by using folders and deleting irrelevant messages. He creates a folder called "Project XYZ" for all relevant emails related to this project. Which of the following emails should he save in this folder instead of deleting or moving it to another folder? O A. Schedule Update for Project XYZ B. Update: New Time and Location for May 20 Meeting for Project XYZ C. Time and Location for May 20 Meeting for Project XYZ D. New Project EFG to Launch Next Week SUB​

Answers

Answer: Schedule Update for Project XYZ

Explanation:

Answer:

A. Schedule Update for Project XYZ

Why is it so important to adhere to principles that have been put forth by reputable organizations to ensure that you are maintaining your firewall and network security configuration correctly?

Answers

Explanation:

It is extremely important for organizations to adopt the principles of network security and firewall configuration according to the highest security parameters and requirements, because through vulnerabilities in an organization's network system, attacks by hackers and criminals can occur. they take advantage of some system failure to steal data and information, which can be detrimental to companies that may have stolen sensitive information, organizational performance data, bank account intrusion and asset theft, etc.

In order to avoid such problems, it is necessary to have a constant management of the network systems and organizational software, in order to maintain the control, prevention and security of the systems.

A file named numbers.txt contains an unknown number of lines, each consisting of a single positive integer. Write some code that reads through the file and stores the largest number read in a variable named maxvalue.
** PYTHON**

Answers

f = open("numbers.txt", "r")

lst = [int(x) for x in f.read().splitlines()]

maxvalue = max(lst)

This works for me. Best of luck. If you want to test the code in an ide, use print(maxvalue) at the end of the code to see the value of your maxvalue variable.

What game is this ?? Helpp mee??

Answers

Answer:

GTA 5

Explanation:

__init__(self, features, phones): create/initialize instance variables for features and the list of phones (optional) in the plan. When phones is not provided, use an empty list as its initial value. Create an instance variable

Answers

Answer:

class Phone(object):

   def __init__(self, features, phones=[]):

       self.features = features

       self.phones = phones

Explanation:

In python object-oriented programming, an instance variable of a class object is created in the "__init__()" method. the "self" is a convention name used to represent the instance of an object class. The input values are assigned to the object variable with the self.'argument_name' statement.

When the phone argument is not given, the self.phones variable is initialized as an empty list.  

Other Questions
Scientists can determine the absolute age of rocks thorugh: aThe Law of Superposition bIndex fossils cRadioactive dating dFault lines Your body processes brown sugar, sugar in the raw, white sugar and syrup differently. A. True B. False in the west frica how a civilization makes money through the buying and selling of goods and service. ATES / EXERCISESACTIVITY 1: Where is your skill?irections. Identity what type of shooting online and resignctures Wire your answers in your activity notebookN23rade5badi.passing the chest past Whats the setting of wish bone valley ? And the evidence what is the slope of the linear graph in simplest form? SHOW WORK PLEAS!!! which statement describes an exothermic reaction Can anyone tell me whats the answer to this? Which element rarely reacts because it has 8 electrons in its outer shell?A. BromineB. XenonC. ArsenicD. Potassium * 25. a. Write 3 3/4, as an improper fraction.(10)b. Write the reciprocal of answer a.c. Find the product of answers a and b. HELP ASAP 30 POINTSIm getting a bit desperate now so i raised the price. please answer this:Suppose there is a 1.9F drop in temperature for every thousand feet that an airplane climbs into the sky. If the temperature on the ground is 54.7F, what will be the temperature when the plane reaches an altitude of 4,000 ft? 10. If f(x) = { 2x-5 if x < 4and f(x) {-2/3 x + 2 when x > 4 What is f(3)?A.) 1B.) 3C.) -1D.) 3E.) None of these Read the excerpt from How I Learned English.I fell back,Dazed, clutching my brow,Groaning, Oh my shin, oh my shin,And everybody peeled away from meAnd dropped from laughter, and there we were,All of us writhing on the ground for one reasonOr another.Readers can tell that this is the climax of the poem, because itA.gives information about what the speaker thinks and feels.B.adds to the idea that the speaker feels like an outsider.C.changes the speakers struggle to fit in with the other boys.D.shows how the speakers problems with the boys are solved. Bob and Lisa went to the movies. They each bought popcorn and one drink. Lisa had a $12 giftcertificate to put toward the cost, and Bob paid the rest, which came to $13. A movie ticket costs $7and popcorn costs $4. How much is one drink? a compass needle acts as a(n) Which effect is common in both sexual harassment and sexual assault victims?STDsinternal traumapregnancydepression ~ soda is ...A. ElementB. CompositeC. Homogeneous mixturesD. Heterogeneous mixtures about childhood by using verb 2 1 page plzzzz what does the word 'latent' means PLEASE HELP!!! ILL MARK BRAINLYEST!!!The church began in the city of Rome.TrueFalse