Examples of procedural programming language?
Note: Some of these languages, such as PHP, Perl, Caml/OCaml, and IDL also support object oriented programming. Others on the list (C++, JavaScript, C# ) are primarily object-oriented languages which can also (though less commonly) be used to program procedurally.
Some are macro or scripting languages (Rexx, Awk, m4) which, while they do support some procedural concepts, aren't really procedural languages, but rather interpreted streams.
Also note that Assembly is NOT a high-level language, and generally is not considered a procedural language, as it doesn't have enough abstraction.
Finally, traditional COBOL is NOT a procedural language (in fact, one of the long-standing criticism of it is that it lacks any structured programming characteristics). Current-day COBOL has some ability to use procedural programming concepts, but, overall, should not be considered a real procedural language. SNOBOL is similar, in that the original version were certainly not procedural in nature, but modern versions are much more structured programming friendly (and can be considered a procedural language).
computer-based system(it contains both hard ware and software) that can process data that are incomplete or only partially correct
Fuzzy logic was introduced as an artificial intelligence technique, when it was realized that normal boolean logic would not suffice. When we make intelligent decisions, we cannot limit ourselves to "true" or "false" possibilities (boolean). We have decisions like "maybe" and other shades of gray. This is what is introduced with fuzzy logic: the ability to describe degrees of truth.
Example:
in fuel station if you stop a fuel injecting motor at 1.55897ltrs.it can be done with the help of fuzzy logic.fuzzy has a meaning like accurate.
Implementation of index sequential file organization?
Indexed sequential file organization. =In indexed sequential file organization, the records arestored in sequence according to a primary key and an index is created to allow random access of the file. This type of organization also allows the file to be accessed sequentially. Indexed sequential is the most commonlyused type of file organization. writer-k.k.b -montanna
What are sequential access files?
The file(s) (data) which are accessed in a sequential or a orderly manner is called as a sequentially accessing a file.
5 steps of the program development process?
Programming is a problem-solving activity. A person with good problem solving skills will tend to be a good programmer. To develop this skill, a programmer must practice the following steps:
The differences between the three approaches Table 1: A Comparison of Database Management Systems Criteria RDBMS ODBMS ORDBMS Defining standard SQL2 ODMG-2.0 SQL3 (in process) Support for object-oriented features Does not support; It is difficult to map program object to the database Supports extensively Limited support; mostly to new data types Usage Easy to use OK for programmers; some SQL access for end users Easy to use except for some extensions Support for complex relationships Does not support abstract datatypes Supports a wide variety of datatypes and data with complex inter-relationships Supports Abstract datatypes and complex relationships Performance Very good performance Relatively less performance Expected to perform very well Product maturity Relatively old and so very mature This concept is few years old and so relatively mature Still in development stage so immature. The use of SQL Extensive supports SQL OQL is similar to SQL, but with additional features like Complex objects and object-oriented features. SQL3 is being developed with OO features incorporated in it Advantages Its dependence on SQL, relatively simple query optimization hence good performance It can handle all types of complex applications, reusability of code, less coding Ability to query complex applications and ability to handle large and complex applications Disadvantages Inability to handle complex applications Low performance due to complex query optimization, inability to support large-scale systems Low performance in web applications Support from vendors It is considered to be highly successful so the market size is very large but many vendors are moving towards ORDBMS Presently lacking vendor support due to vast size of RDBMS market All major RDBMS vendors are after this so has very good future
Write a program to remove left recursion?
#include"stdio.h"
#include"conio.h"
int fabo(int);
void main()
{
int result=0,a=1,b=1,c;
printf("enter upto which you want to generate the series");
scanf("%d",&c);
result=fabo(c);
printf("%d\n%d\n",a,b);
printf("the fabonnaci series is %d\n",result);
getch();
}
int fabo(int n)
{
if (n==1);
return 1;
else if(n==2);
return 1;
else
return fabo(n-1)+fabo(n-2);
}
What is the advantage of a binary search tree over an array based structure?
In a binary search tree, insertion, deletion and lookup are O(log n) (i.e. fast) when balanced.
With unsorted arrays, insertion and deletion are O(1) (i.e. very fast) but lookup is O(n) (i.e. slow).
With sorted arrays, insertion and deletion are O(n) (i.e. slow) and lookup is O(log n) (i.e. fast).
Binary search trees are good if you do all three operation (insertion, deletion, lookup) often and have enough data to justify the added burden of more complex structures and algorithms.
Time space trade off in data structure?
IN COMPUTER SCIENCE, A SPACE-TIME OR TIME-MEMORY TRADEOFF IS A SITUATION WHERE THE MEMORY USE CAN BE REDUCED AT THE COST OF SLOWER PROGRAM EXECUTION (OR, VICE VERSA, THE COMPUTATION TIME CAN BE REDUCED AT THE COST OF INCREASED MEMORY USE). AS THE RELATIVE COSTS OF CPU CYCLES, RAM SPACE, AND HARD DRIVE SPACE CHANGE HARD DRIVE SPACE HAS FOR SOME TIME BEEN GETTING CHEAPER AT A MUCH FASTER RATE THAN OTHER COMPONENTS OF COMPUTERS. THE APPROPRIATE CHOICES FOR SPACE-TIME TRADEOFFS HAVE CHANGED RADICALLY. OFTEN, BY EXPLOITING A SPACE-TIME TRADEOFF, A PROGRAM CAN BE MADE TO RUN MUCH FASTER.
THE MOST COMMON SITUATION IS AN ALGORITHM INVOLVING A LOOKUP TABLE: AN IMPLEMENTATION CAN INCLUDE THE ENTIRE TABLE, WHICH REDUCES COMPUTING TIME, BUT INCREASES THE AMOUNT OF MEMORY NEEDED, OR IT CAN COMPUTE TABLE ENTRIES AS NEEDED, INCREASING COMPUTING TIME, BUT REDUCING MEMORY REQUIREMENTS. A SPACE-TIME TRADEOFF CAN BE APPLIED TO THE PROBLEM OF DATA STORAGE. IF DATA IS STORED UNCOMPRESSED, IT TAKES MORE SPACE BUT LESS TIME THAN IF THE DATA WERE STORED COMPRESSED (SINCE COMPRESSING THE DATA REDUCES THE AMOUNT OF SPACE IT TAKES, BUT IT TAKES TIME TO RUN THECOMPRESSION ALGORITHM). DEPENDING ON THE PARTICULAR INSTANCE OF THE PROBLEM, EITHER WAY IS PRACTICAL. ANOTHER EXAMPLE IS DISPLAYING MATHEMATICAL FORMULAE ON PRIMARILY TEXT-BASED WEBSITES, SUCH AS WIKIPEDIA.
Storing only the LaTeX source and rendering it as an image every time the page is requested would be trading time for space - more time used, but less space. Rendering the image when the page is changed and storing the rendered images would be trading space for time - more space used, but less time. Note that there are also rare instances where it is possible to directly work with compressed data, such as in the case of compressed bitmap indices, where it is faster to work with compression than without compression. Larger code size can be traded for higher program speed when applying loop unrolling. This technique makes the code longer for each iteration of a loop, but saves the computation time required for jumping back to the beginning of the loop at the end of each iteration. Algorithms that also make use of space-time tradeoffs include:
BABY-STEP GIANT-STEP ALGORITHM FOR CALCULATING DISCRETE LOGARITHMS.
RAINBOW TABLES IN CRYPTOGRAPHY, WHERE THE ADVERSARY IS TRYING TO DO BETTER THAN THE EXPONENTIAL TIME REQUIRED FOR A BRUTE FORCE ATTACK. RAINBOW TABLES USE PARTIALLY PRECOMPUTED VALUES IN THE HASH SPACE OF A CRYPTOGRAPHIC HASH FUNCTION TO CRACK PASSWORDS IN MINUTES INSTEAD OF WEEKS. DECREASING THE SIZE OF THE RAINBOW TABLE INCREASES THE TIME REQUIRED TO ITERATE OVER THE HASH SPACE.
THE MEET-IN-THE-MIDDLE ATTACK USES A SPACE-TIME TRADEOFF TO FIND THE CRYPTOGRAPHIC KEY IN ONLY 2N + 1 ENCRYPTIONS (AND O(2N) SPACE) VERSUS THE EXPECTED 22N ENCRYPTIONS (BUT ONLY O(1) SPACE) OF THE NAIVE ATTACK.
DYNAMIC PROGRAMMING, WHERE THE TIME COMPLEXITY OF A PROBLEM CAN BE REDUCED SIGNIFICANTLY BY USING MORE MEMORY.
InsertNode(NODE **q,int num)
{
NODE *r,*temp ;
temp = *q;
r= malloc(sizeof(NODE));
r->data = num;
//if it's fisrt node to be inserted
if ( *q == NULL num < (*q)->data)
{
*q = r ;
(*q)->link=temp;
}
else
{
while(temp)
{
if ( (num > temp->data) && (num < temp->link->data ) )
{
r->link = temp->link;
temp->link = r;
return;
}
temp = temp->link;
}
r->link = NULL;
temp->link = r;
}
}
How do you connect Visual Basic with SQL server database?
It depends on what version of VB you are using, and what version of SQL Server you're attempting to connect to. Also, there are several ways to connect from each version of VB to each version of SQL Server (ODBC, ADODB, DSN-less, etc.). Since your question does not provide enough specifics to answer adequately, I refer you to the "Connection Strings" link at the bottom of this page (or you may just type in www.connectionstrings.com in your browser).
What is the difference between Business Analysis and System Analysis?
Let's start by differentiating the role from the job title. Many organizations have Systems Analysts as a job title, but often the role of performing systems analysis is often assigned to employees with other job titles, like Architect, Business Analyst, Developer or, I even know a few companies where the person with the Project Manager title performs systems analysis activities.
Systems Analysis Role
For sake of making this easy to understand, let's focus only on the role, taking for granted that different organizations may create a formal Systems Analyst job title to perform all of the system analysis activities; or they may split these activities and shove them here and there with other job titles.
System Analysis activities focus around the translation of the business requirements into systems requirements. Business requirements have to be analyzed and decomposed into a series of smaller requirements for different components, providing directions for the engineering team.
Example
Let's say that the business requirement is to add a new optional "Where did you hear about us?" drop down on the Register page for a trade organization. Possible values are {"TV", "Radio", "Marc's List", "The New York Times", "The PMI Newsletter", and "Other"}
This would typically be written by the Business Analyst.
Systems analysis activities would decompose this requirement into:
- New fields or a new table required to capture the user's selections.
- A new table required to capture the drop down values.
- A change in the user interface to add the drop down control.
- etcetera
2 Aspects of System Analysis
The first step is to look at everything that is needed to make the new requirement work. Look at what is required in the database area, the local session information, the middleware layers, connectivity requirements, the user interface, or perhaps a new system interface, a new web service or something of the sort.
After analyzing what is required, the systems analyst must look into what can break if the requirement is implemented. This implies analyzing each and every system component to ensure compatibility, and that there are no conflicts.
The activities of the system analyst border those of the Business Analyst at the start of the analysis and those of the Architect towards the end of the analysis.
For modern SDLC methodologies (RUP, Agile, XP, EssUP, etc.) system analysis also defines the scope of the system under consideration and models requirements by taking the black box view and whitening it. (if this is obscure, stay tuned for an upcoming blog entry on black box versus white box.)
Should Analysis be performed by Analysts?
I have encountered several IT Managers who believe that analysis is not necessary. My answer to them: "Whether known or not, system analysis is performed somewhere in the organization. The question is... Is it done by the Analyst, the Architect, the Developer, or if not done before deployment, then, done after deployment when the defects are analyzed? It is, by far, less costly to have the Analyst perform system analysis."
How many simple data types are there?
There are a total of 8 simple or primitive data types in Java. They are:
What are the different tree methodologies in data structure?
The question itself is a bit vague since it doesn't suggest whether you're asking about the types of trees or the operations which can be performed on trees.
A tree is a data structure which stores information in a logical way that typically is ideally suited for searching quickly, often by ordering the nodes or items of the tree, also ideally, nodes should be able to be added to or removed from a tree quickly and efficiently. Often, trees are chosen as a means of simply structuring data in a meaningful way with no concerns as to their performance.
When trees are chosen as an alternative to a list, the reason for this is to gain the benefits of rapid insertion, searching and deletion of nodes. Common tree structures for this purpose are the binary tree and the black and red tree. A binary tree has an extremely simple and extremely fast method of searching for data, but it is highly dependent on nodes being added in an order which is somewhat random. If ordered data is added to a tree, the depth of the tree will be linear, thereby providing no benefits over a linked list in addition, removal of nodes can cause a binary tree to have to be rebuilt as all the nodes beneath the deleted node will have to be re-added to the tree, typically under different nodes, commonly causing linear branches of the tree and slowing down application performance.
R&B trees were designed to address many of the issues of a binary tree. By developing a data structure which intentionally keeps the depth of the tree shallow, high speed searching and node removal can be achieved, but at a cost to the insertion algorithm which is designed to "shake things up" a little. R&B trees are far beyond the scope of this answer.
General trees are used less as a means of providing ideal performance but instead are intended as a means of providing structure for data. General trees store information in a way which reflects the data format itself. An example of a general tree is the file system of a disk drive. The root directory contains zero or more children which each contain zero or more children which each contain zero or
more... you get the point. This structure is also used for things like the abstract syntax tree of a compiler. Source code is parsed into "tokens" which are the structured as nodes of a tree which are then "walked" when optimizing and producing binary code.
There are many more types of trees. Many of which ate covered by Donald Knuth in extensive, if not insane detail in "The Art of Computer Programming".
Among the operations you'd perform on the tree are insertion, deletion, searching, walking, reduction, simplification and more.
Difference between conventional OS and embedded OS?
Conventional OS aim to give users the ability to run other software that are interactive in nature to perform different tasks. On the other hand, embedded OS only run fixed set of tasks and deliver the expected results in real time.
Examples of programming language?
There are hudreds of Programming languages out there.
Examples: C++, GWbasic, C#, C++, HTML , Ruby etc.
They're further categorized as "Low Level language" and "High Level Language".
Low level languages are those languages which are closer to the binary language or in another words machine language. These are difficult for us to learn but it's easy for machine to execute quickly.
Example of a low level language is assembly language.
High level languages are those languages which are close to human language/natural language and are easy for us to learn.
Examples of high level language are Python, Ruby, C++ , Java etc.
Having an unsigned integer means that the integer is positive, and not negative; literally, the integer is unsigned and assumed to be positive. The unsigned integer 8 is positive-eight, not negative-eight.
What are system variable in management information system?
is quantity or item controlled by the decision maker.
How many different binary trees can be made from three nodes?
As far as i Know, just one.
Do you know any formula to calculate how many binary search trees are possible?
--
answer:
(2n C n) / (n+1) = ( factorial (2n) / factorial (n) * factorial (2n - n) ) / ( n + 1 )
where 'n' is number of element (integer/string)
like:
N Number of BST
1 1
2 2
3 5
4 14
5 42
6 132
and so on
What are object oriented Programs?
There are two types of programmes related to objects that i know.
Pradip: object base means : realted only with object where u can find the encapsulation ,abstraction data hiding is possible but Inheritance,polymorphism, wil not be possible in case of object base programme. all are core object oriented programming.
A relational database management system (RDBMS) is a database management system (DBMS) that is based on the relational model as introduced by E. F. Codd. Most popular databases currently in use are based on the relational database model.
A short definition of an RDBMS is: a DBMS in which data is stored in tables and the relationships among the data are also stored in tables. The data can be accessed or reassembled in many different ways without having to change the table forms...
- Sagar Verma
Quite simply, an inner class is one class within another. Typically the inner class will be a private inner class, and will only be used by the outer class.
class MyOuterClass {
class MyInnerClass {
}
}
A procedural language is a programming language in which everything is processed in the order it appears to the computer.
In contrast, an object-oriented language is a language in which everything is processed depending on what happens in the program -- user input, errors, or other events.
PHP is both a procedural and object-oriented language, depending on the way it is used.