Description
Using C++
Lab 5 - Binary Search Trees
- Declare and implement a BSTNode ADT with a data attribute and two pointer attributes, one for the left child and the other for the right child. Implement the usual getters/setters for these attributes.
- Declare and implement a BST as a link-based ADT whose data will be Currency objects - the data will be inserted based on the actual money value of your Currency objects as a combination of the whole value and fractional value attributes.
- For the BST, implement the four traversal methods as well as methods for the usual search, insert, delete, print, count, isEmpty, empty operations and any other needed.
- Your pgm will have at least 10 Currency objects created from data in an input text file - one per line in the right form as for Lab 1A.
- Also, create an output file to write program output as specified in one or more instructions below.
- The data files can be anywhere on the machine, so prompt the user for the full path of the file.
- Perform adequate data validation when reading data from the file - if any data item is invalid, ignore the data item and continue to next item but print a message to output (both screen and output file ) to indicate which data items were ignored.
- Read the data to create your Currency database using the BST.
- Provide interactivity for the user to add/search/delete nodes from the console after the data has been seeded into the application.
- Once the user selects the option to print data or exits the program, the data in the BST should be printed out to both screen and output file in all four traversal methods in the specific sequence of breadth-first, in-order, pre-order, post-order.
- Ensure I can run the programs by using my own input file without having to fix your code for file locations - the file name and location is unknown to you.
Lab 6 Makeup - Hash Tables
Write a program to do the following:
- Use the input data file you provided for Lab 5 (your BST homework) as input to enter data into a hash table.
- Declare a hash table of size 29 elements.
- To hash your currency objects into the hash table, use the pseudorandom hash scheme - (m*w + n*f) % size - where size = 29, m = 2, n = 3, w = whole value, f = fractional value.
- For collision resolution, use quadratic probing in the same direction always. Remember to circle around to the start of the array if needed.
- Your main will first load the data file into the hash table and print the number of data items loaded, load factor and number of collisions.
- Then it will ask the user in a loop to enter a Currency to search for. If the Currency object is found in the hash table, it will print the index where found, otherwise it will print 'Invalid Data'. Then it will ask the user if they want to check again or end the program.
- I will test your program with my own version of the data file which may exist in any folder on my machine and the number of entries in the file are unknown to you when coding.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Very useful material for studying!
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
1 page
Avakimov Go16 Wd Ch02 Grader 2e Hw
Florida Port Community College Career Center has new jobs available for both part-time and full-time positions in Computer ...
Avakimov Go16 Wd Ch02 Grader 2e Hw
Florida Port Community College Career Center has new jobs available for both part-time and full-time positions in Computer Science. Some of these jobs ...
Golden Gate University San Francisco IT Infrastructure Asset List Paper
Check for detailed questions in the attachment An Asset’s Finer Points
A domain is not the same as an asset. And a piec ...
Golden Gate University San Francisco IT Infrastructure Asset List Paper
Check for detailed questions in the attachment An Asset’s Finer Points
A domain is not the same as an asset. And a piece of hardware does not always equate to one asset. Many
assets can be in one domain, such as the System/Application Domain. A single hardware firewall might present
itself as two assets, one in two different domains, for example, a Local Area Network-to-Wide Area Network (LAN-
to-WAN) firewall and a Wide Area Network (WAN) firewall. In your own environments, ask yourself, “What function
does this perform?”In your Lab Report file, use the following table to identify three to five IT assets and
insert them into the table. Indicate in which of the seven domains of an IT infrastructure
the asset resides. Indicate if the asset accesses customer privacy data or contains customer
privacy data. Finally, classify the IT asset as Critical, Major, or Minor, where the
following defines each:
Critical: Generates revenues or represents intellectual property asset of organization
Major: Contains customer privacy data
Minor: Required for normal business functions and operationsIn your Lab Report file, explain how a data classification standard is related to customer
privacy data protection and security controls.
ISSC 411 American Public University System PCI DSS Report
In 1-2 pages, Identify what tools you would use, along with the testing procedures provided, to evaluate Requirement 6 of ...
ISSC 411 American Public University System PCI DSS Report
In 1-2 pages, Identify what tools you would use, along with the testing procedures provided, to evaluate Requirement 6 of the PCI DSS. Make sure to identify a tool (as applicable) for testing procedure and state the tool you would use to verify compliance.
Southern Arkansas University ER Model for MS Visio Project
Summary:Produce an ER Model for the following scenario (presented in Step 1 below) and business need, for the Pythagoras M ...
Southern Arkansas University ER Model for MS Visio Project
Summary:Produce an ER Model for the following scenario (presented in Step 1 below) and business need, for the Pythagoras Math Academy. Deliverables:ER Model for the scenario presented.You have the option to use MS Visio (if you have the software) to produce your ER Model. Alternatively, if you do not have MS Visio, you can use the ERD PLUS (Open source ER Modeling Software) and produce your ER Model.Required Software:MS Visio by MicrosoftORERD PLUS, Open Source Offering. This offering is cloud-based, and you do not need to download any clients. You will need to create an account (username and password), link to this offering follows: https://erdplus.comSteps:Step 1: Read and understand the Scenario and Business needs presented below. Define and document the ENTITIES, and RELATIONSHIPS, required to address the business needs. The nouns in the scenario below will give the ENTITIES that you will need. Finally, the verbs will describe the RELATIONSHIPS.Scenario and Business Need:The Pythagoras Math Academy is in need to develop a database to keep track and control of his students, teachers, and classes offered.Teachers are able to teach multiple courses. But they are required to be certified on the course they are teaching. For example, only a group of teachers are certified to teach Algebra, and other Geometry.Students can take multiple courses. Courses are taught by teachers with the proper certification and have multiple certs as needed. Courses are taught in one of the classrooms at one of the School’s several sites.Each classroom is optimized to serve the needs for a course (for example some courses might require computer labs and whiteboards). The school needs to keep track of the math courses delivered in each of the sites.Step 2: For this project, you are required to use MS Visio or ERD PLUS to produce the deliverables.Open MS VisioClick on the Software Database Template in the main windowSelect the Database Model Diagram Template to open a new file.Save the File and ensure to have in your file name PROJECT2_LastName_FirstInitial.If you are using ERD PLUS.From the ERD PLUS main interface, select DOCUMENTS --> NEW DIAGRAM (NAME YOUR DIAGRAM) -->ER DIAGRAM --> CREATEStep 3: Define and Database ENTITIESAdd an entity for each Table you identified in the Scenario and Business Need.You will use the MS Visio tool, or the ERD PLUS open source offering to complete this step.Step 4: ADD the required ENTITY ATTRIBUTES Add the required Attributes for each Entity that you feel would help to define each Entity as needed.Select one of the attributes to be PRIMARY KEY (PK)Step 5: Define RELATIONSHIPSUse the Crow’s Feet Notation.Drag and drop (draw) relationships between the entities you defined.Connect the ends to the two entities for each relation.Defined the Primary Key for the parent entity.Step 6: Define CARDINALITY RELATIONSHIPSet the cardinality for each of your relationships defined in Step 5. For MS Visio: select a relationship line in the drawing area that is connecting two entities. In the Database Properties window, select the miscellaneous category. Select the cardinality for the selected relationship.
Assignment using Microsoft access 16
Doing only tasks 1 through using 4 Microsoft access 16Project Background:
Irrigation Equipment Specialists employs 100 em ...
Assignment using Microsoft access 16
Doing only tasks 1 through using 4 Microsoft access 16Project Background:
Irrigation Equipment Specialists employs 100 employees who specialize in purchasing parts and
supplies (inbound logistics), shipping products to customers (outbound logistics), order
fulfillment (sales and marketing), product support (service), and the administrative functions of
information technology infrastructure / systems development, planning, research and
development, human resources, and financial management.
IES’s management recognizes that its employees have different health care needs, and thus,
provides them with a flexible benefits plan. For medical insurance, an employee must enroll
with either a preferred provider organization (PPO) or a health maintenance organization
(HMO). IES currently pays the monthly medical premiums for its employees. However, if an
employee enrolls in a dental or vision plan, the employee must pay a small monthly premium for
the optional plan. An employee may carry, medical, dental, and/or vision coverage for one or
more of its family members. In order to carry insurance on a family member, the employee must
carry the same coverage for himself/herself. For example, to carry a vision insurance on a child
(or a spouse), the employee must also carry vision insurance on himself/herself.
In the past, the Human Resources Department of IES administered health benefits enrollment
and analysis functions manually, with a minimal support of Excel spreadsheets and Word
documents. The manual process was time-consuming, error prone, and inefficient.
2
The health benefits enrollment process at IES will begin in several months, and Mr. David
Andrews, the Human Resource Director of IES, has hired you, as a database consultant, to
design, develop, and implement a relational database that will keep track of the health benefits
information on IES employees. Your consulting assignment consists of several tasks, including
the design, development, and implementation of a health benefits database for IES, using MS
Access software. You will also design, test and implement queries and report to assist Mr.
Andrews in the analysis of benefits enrollment information.
National University Wireless Security Scenario Questions Essay
Q1. You, as the lead consultant of WeKnowNetworks (WKN) Consulting, have been given a design proposal (linked below) and ...
National University Wireless Security Scenario Questions Essay
Q1. You, as the lead consultant of WeKnowNetworks (WKN) Consulting, have been given a design proposal (linked below) and have been asked to evaluate the wireless network security and to make recommendations to ensure that the clinic protects its PII and has a secure and reliable wireless network.Review the document and discuss if it is adequate. If it is explain why. If not explain what is missing.Explain both assumptions and solutions. Project Plan Linked as attachmentQ2. You are asked to define a hand held mobile device security policy for your company, specifically, you need to ensure your policy helps mitigate the loss of intellectual property and confidential data via cell phone or smartphone functionality such as camera's, texting, email, bluetooth transmissions or any other handheld device capability (e.g., is there a custom App for that?). Discuss what should be included in the policy including justification.Your company requires BYOD so you need to include it in your policy along with recommendations to reduce the risk of BYOD.Your answer should be written in essay form with a clear intro, body, and conclusion. Use examples as applicable. There is no minimum length but you should clearly answer all parts of each question. Your answer should be in your own words. Short quotes can be used as needed. Cite any references used in APA format.Assignment Formatting Requirements:APA Standard 1-inch margins all aroundStandard font (e.g., Arial, Times Roman, Calibri, Tahoma, etc.)12-pt font sizeDouble-spacedNo cover page - use a simple heading at the top of the first page with Course #/Title, Exam Name, Your Name, and Date (this heading can be left-justified, centered or right-justified)No AbstractIdentify the question number for each response (e.g., "Essay Question #1") - do not repeat the actual question text.When using external sources, list the references immediately following the end of the essay question where used (do not put all references at the end of the document)Start Q2 on a new page
Similar Content
SEU E Learning Materials & Techniques for Cyber Security Behaviour Change Summary
Hi, I want to ask you to help me for this assignment, you help my friend for same assignmentYou are requested to make an a...
Missouri Western State University Climate Change in the Agricultural Sector PPT
Table of Contents
Climate Change in the Agricultural Sector .................................................................
SI311 Grantham Reviewing and Analysing Incident Response Plans Paper
Incident Response PlanReview and analysis the provided Incident Response Plan in comparison to what you have read in the I...
User Training Enforcement and Disciplinary Activities Cyber Security Questions
Universities and other educational institutions are subject to a variety of legal requirements including FERPA and HIPAA, ...
Cumberland University CIA Triad Essay
Discuss the C-I-A Triad. Initial posts should be 200 to 300 words. own words are enough no copy paste....
Assess the best practices for securing Microsoft Windows (500 words - 1 to 2 pages)
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outsid...
Learning Binary Code To Detect Software Weakness
Summary: The paper presents a data-driven technique for vulnerability detection through machine learning, mainly used for ...
Sec 435 Week 10 Paper Complete
Explain the tests you would run and the reason(s) for running them (e.g. to support the risk Testing is a process covered ...
R Vs Python
R and Python are the main programming languages used to analyze data. The two entail numerous software communities and eco...
Related Tags
Book Guides
The Restless Wave
by John McCain
Team of Vipers
by Cliff Sims
One Flew Over the Cuckoos Nest
by Ken Kesey
The English Patient
by Michael Ondaatje
Salt To The Sea
by Ruta Sepetys
The Awakening
by Kate Chopin
Twilight
by Stephenie Meyer
Notes from Underground
by Fyodor Dostoyevsky
Uncle Tom's Cabin
by Harriet Beecher Stowe
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
1 page
Avakimov Go16 Wd Ch02 Grader 2e Hw
Florida Port Community College Career Center has new jobs available for both part-time and full-time positions in Computer ...
Avakimov Go16 Wd Ch02 Grader 2e Hw
Florida Port Community College Career Center has new jobs available for both part-time and full-time positions in Computer Science. Some of these jobs ...
Golden Gate University San Francisco IT Infrastructure Asset List Paper
Check for detailed questions in the attachment An Asset’s Finer Points
A domain is not the same as an asset. And a piec ...
Golden Gate University San Francisco IT Infrastructure Asset List Paper
Check for detailed questions in the attachment An Asset’s Finer Points
A domain is not the same as an asset. And a piece of hardware does not always equate to one asset. Many
assets can be in one domain, such as the System/Application Domain. A single hardware firewall might present
itself as two assets, one in two different domains, for example, a Local Area Network-to-Wide Area Network (LAN-
to-WAN) firewall and a Wide Area Network (WAN) firewall. In your own environments, ask yourself, “What function
does this perform?”In your Lab Report file, use the following table to identify three to five IT assets and
insert them into the table. Indicate in which of the seven domains of an IT infrastructure
the asset resides. Indicate if the asset accesses customer privacy data or contains customer
privacy data. Finally, classify the IT asset as Critical, Major, or Minor, where the
following defines each:
Critical: Generates revenues or represents intellectual property asset of organization
Major: Contains customer privacy data
Minor: Required for normal business functions and operationsIn your Lab Report file, explain how a data classification standard is related to customer
privacy data protection and security controls.
ISSC 411 American Public University System PCI DSS Report
In 1-2 pages, Identify what tools you would use, along with the testing procedures provided, to evaluate Requirement 6 of ...
ISSC 411 American Public University System PCI DSS Report
In 1-2 pages, Identify what tools you would use, along with the testing procedures provided, to evaluate Requirement 6 of the PCI DSS. Make sure to identify a tool (as applicable) for testing procedure and state the tool you would use to verify compliance.
Southern Arkansas University ER Model for MS Visio Project
Summary:Produce an ER Model for the following scenario (presented in Step 1 below) and business need, for the Pythagoras M ...
Southern Arkansas University ER Model for MS Visio Project
Summary:Produce an ER Model for the following scenario (presented in Step 1 below) and business need, for the Pythagoras Math Academy. Deliverables:ER Model for the scenario presented.You have the option to use MS Visio (if you have the software) to produce your ER Model. Alternatively, if you do not have MS Visio, you can use the ERD PLUS (Open source ER Modeling Software) and produce your ER Model.Required Software:MS Visio by MicrosoftORERD PLUS, Open Source Offering. This offering is cloud-based, and you do not need to download any clients. You will need to create an account (username and password), link to this offering follows: https://erdplus.comSteps:Step 1: Read and understand the Scenario and Business needs presented below. Define and document the ENTITIES, and RELATIONSHIPS, required to address the business needs. The nouns in the scenario below will give the ENTITIES that you will need. Finally, the verbs will describe the RELATIONSHIPS.Scenario and Business Need:The Pythagoras Math Academy is in need to develop a database to keep track and control of his students, teachers, and classes offered.Teachers are able to teach multiple courses. But they are required to be certified on the course they are teaching. For example, only a group of teachers are certified to teach Algebra, and other Geometry.Students can take multiple courses. Courses are taught by teachers with the proper certification and have multiple certs as needed. Courses are taught in one of the classrooms at one of the School’s several sites.Each classroom is optimized to serve the needs for a course (for example some courses might require computer labs and whiteboards). The school needs to keep track of the math courses delivered in each of the sites.Step 2: For this project, you are required to use MS Visio or ERD PLUS to produce the deliverables.Open MS VisioClick on the Software Database Template in the main windowSelect the Database Model Diagram Template to open a new file.Save the File and ensure to have in your file name PROJECT2_LastName_FirstInitial.If you are using ERD PLUS.From the ERD PLUS main interface, select DOCUMENTS --> NEW DIAGRAM (NAME YOUR DIAGRAM) -->ER DIAGRAM --> CREATEStep 3: Define and Database ENTITIESAdd an entity for each Table you identified in the Scenario and Business Need.You will use the MS Visio tool, or the ERD PLUS open source offering to complete this step.Step 4: ADD the required ENTITY ATTRIBUTES Add the required Attributes for each Entity that you feel would help to define each Entity as needed.Select one of the attributes to be PRIMARY KEY (PK)Step 5: Define RELATIONSHIPSUse the Crow’s Feet Notation.Drag and drop (draw) relationships between the entities you defined.Connect the ends to the two entities for each relation.Defined the Primary Key for the parent entity.Step 6: Define CARDINALITY RELATIONSHIPSet the cardinality for each of your relationships defined in Step 5. For MS Visio: select a relationship line in the drawing area that is connecting two entities. In the Database Properties window, select the miscellaneous category. Select the cardinality for the selected relationship.
Assignment using Microsoft access 16
Doing only tasks 1 through using 4 Microsoft access 16Project Background:
Irrigation Equipment Specialists employs 100 em ...
Assignment using Microsoft access 16
Doing only tasks 1 through using 4 Microsoft access 16Project Background:
Irrigation Equipment Specialists employs 100 employees who specialize in purchasing parts and
supplies (inbound logistics), shipping products to customers (outbound logistics), order
fulfillment (sales and marketing), product support (service), and the administrative functions of
information technology infrastructure / systems development, planning, research and
development, human resources, and financial management.
IES’s management recognizes that its employees have different health care needs, and thus,
provides them with a flexible benefits plan. For medical insurance, an employee must enroll
with either a preferred provider organization (PPO) or a health maintenance organization
(HMO). IES currently pays the monthly medical premiums for its employees. However, if an
employee enrolls in a dental or vision plan, the employee must pay a small monthly premium for
the optional plan. An employee may carry, medical, dental, and/or vision coverage for one or
more of its family members. In order to carry insurance on a family member, the employee must
carry the same coverage for himself/herself. For example, to carry a vision insurance on a child
(or a spouse), the employee must also carry vision insurance on himself/herself.
In the past, the Human Resources Department of IES administered health benefits enrollment
and analysis functions manually, with a minimal support of Excel spreadsheets and Word
documents. The manual process was time-consuming, error prone, and inefficient.
2
The health benefits enrollment process at IES will begin in several months, and Mr. David
Andrews, the Human Resource Director of IES, has hired you, as a database consultant, to
design, develop, and implement a relational database that will keep track of the health benefits
information on IES employees. Your consulting assignment consists of several tasks, including
the design, development, and implementation of a health benefits database for IES, using MS
Access software. You will also design, test and implement queries and report to assist Mr.
Andrews in the analysis of benefits enrollment information.
National University Wireless Security Scenario Questions Essay
Q1. You, as the lead consultant of WeKnowNetworks (WKN) Consulting, have been given a design proposal (linked below) and ...
National University Wireless Security Scenario Questions Essay
Q1. You, as the lead consultant of WeKnowNetworks (WKN) Consulting, have been given a design proposal (linked below) and have been asked to evaluate the wireless network security and to make recommendations to ensure that the clinic protects its PII and has a secure and reliable wireless network.Review the document and discuss if it is adequate. If it is explain why. If not explain what is missing.Explain both assumptions and solutions. Project Plan Linked as attachmentQ2. You are asked to define a hand held mobile device security policy for your company, specifically, you need to ensure your policy helps mitigate the loss of intellectual property and confidential data via cell phone or smartphone functionality such as camera's, texting, email, bluetooth transmissions or any other handheld device capability (e.g., is there a custom App for that?). Discuss what should be included in the policy including justification.Your company requires BYOD so you need to include it in your policy along with recommendations to reduce the risk of BYOD.Your answer should be written in essay form with a clear intro, body, and conclusion. Use examples as applicable. There is no minimum length but you should clearly answer all parts of each question. Your answer should be in your own words. Short quotes can be used as needed. Cite any references used in APA format.Assignment Formatting Requirements:APA Standard 1-inch margins all aroundStandard font (e.g., Arial, Times Roman, Calibri, Tahoma, etc.)12-pt font sizeDouble-spacedNo cover page - use a simple heading at the top of the first page with Course #/Title, Exam Name, Your Name, and Date (this heading can be left-justified, centered or right-justified)No AbstractIdentify the question number for each response (e.g., "Essay Question #1") - do not repeat the actual question text.When using external sources, list the references immediately following the end of the essay question where used (do not put all references at the end of the document)Start Q2 on a new page
Earn money selling
your Study Documents