What is the difference between array linklist?
Linked list consists of data nodes each pointing to next in the list .An array consist of contiguous chunk memory of predetermined size
/* Discrete Fourier Transform and Power Spectrum Calculates Power Spectrum from a Time Series Copyright 1985 Nicholas B. Tufillaro */ #include #include #define PI (3.1415926536) #define SIZE 512 double ts[SIZE], A[SIZE], B[SIZE], P[SIZE]; main() { int i, k, p, N, L; double avg, y, sum, psmax; /* read in and scale data points */ i = 0; while(scanf("%lf", &y) != EOF) { ts[i] = y/1000.0; i += 1; } /* get rid of last point and make sure # of data points is even */ if((i%2) == 0) i -= 2; else i -= 1; L = i; N = L/2; /* subtract out dc component from time series */ for(i = 0, avg = 0; i < L; ++i) { avg += ts[i]; } avg = avg/L; /* now subtract out the mean value from the time series */ for(i = 0; i < L; ++i) { ts[i] = ts[i] - avg; } /* o.k. guys, ready to do Fourier transform */ /* first do cosine series */ for(k = 0; k <= N; ++k) { for(p = 0, sum = 0; p < 2*N; ++p) { sum += ts[p]*cos(PI*k*p/N); } A[k] = sum/N; } /* now do sine series */ for(k = 0; k < N; ++k) { for(p = 0, sum = 0; p < 2*N; ++p) { sum += ts[p]*sin(PI*k*p/N); } B[k] = sum/N; } /* lastly, calculate the power spectrum */ for(i = 0; i <= N; ++i) { P[i] = sqrt(A[i]*A[i]+B[i]*B[i]); } /* find the maximum of the power spectrum to normalize */ for(i = 0, psmax = 0; i <= N; ++i) { if(P[i] > psmax) psmax = P[i]; } for(i = 0; i <= N; ++i) { P[i] = P[i]/psmax; } /* o.k., print out the results: k, P(k) */ for(k = 0; k <= N; ++k) { printf("%d %g\n", k, P[k]); } }
What is an example of how an embedded object in software works?
For example, a spreadsheet object can be brought into a word-processing document. Any time the spreadsheet object is updated in the original spreadsheet software, the object is automatically updated in the destination document.
OSS is the Apple processing unit found in iPhones, Macs, and other apple devices. Sprint doesn't carry for Apple products so it does not have an OSS version.
A passive threat to computer security is?
passive threat of a data or information processing system, a threat of disclosureof information without changing the state of the system.For example of a passive threat is one that could result in the recoveryof sensitive information through the unauthorized interception of a data transmission.
Draw functional decomposition diagram with an example?
Functional is another word for workable. Decomposition is another word for falling apart. diagram is another word for drawing. I hope you can find someone who understands your question better than I have
UniversityofCAMBRIDGE
University of OXFORD
IMPERIAL College London
UCL (University College London)
KING'S College London
University of EDINBURGH
University of MANCHESTER
University of BRISTOL
LONDON School of Economics and Political...
University of WARWICK
University of GLASGOW
University of BIRMINGHAM
University of SHEFFIELD
University of YORK
University of ST ANDREWS
University of NOTTINGHAM
University of SOUTHAMPTON
University of LEEDS
DURHAM University
University of SUSSEX
University of LIVERPOOL
CARDIFF University
University of BATH
University of ABERDEEN
QUEEN MARY, University of London
NEWCASTLE University, NEWCASTLE Upon Tyn...
University of LANCASTER
University of LEICESTER
University of READING
QUEEN'S University of Belfast
University of DUNDEE
University of SURREY
LOUGHBOROUGH University
University of EXETER
School of Oriental and African Studies, ...
University of ESSEX
University of STRATHCLYDE
BRUNEL University
University of EAST Anglia (UEA)
ROYAL HOLLOWAY University of London
ASTON University
SWANSEA University
University of BRADFORD
GOLDSMITHS, University of London
BANGOR University
HERIOT-WATT University
ABERYSTWYTH University
University of KENT
The OPEN University
University of HULL
Why do you use a b c d e f in hexadecimal number system why don't p q r s t u or anything else?
The use of a b c d e f, along with 0 1 2 3 4 5 6 7 8 9, in representing hexadecimal numbers is simply a matter of accepted convention. You could certainly use p q r s t u, or something else, but you would need to understand the rules of arithmetic when doing so, and you would be flying in the face of established convention.
How is a context diagram used by software engineers?
System context diagrams (SCD) are used by software engineers to show how software based systems act as a whole and what the input and output factors would be. SCDs are used early in a project to show users what is available and the scope of the project.
Which command displays amount of total and available memory?
You can use the DOS command MEM to show total and available memory, but it only shows the memory for the process that is running the command shell. It will not show the memory in terms of Windows, nor will it work at all for Windows 7.
What is a good example of a software development management?
Software development management is the process of overseeing work that encompasses five areas. These areas are risk, requirement, change, software configuration, and release.
What is the diffference between waterfall model and modified waterfall model?
Modified waterfall model verified and validate the user requirements for every phase. Meanwhile, waterfall did not, it only verify and validate user requirement at the end of the phase.
6 What is the role of a Micro sequencer in Microprogramming Control Unit?
In computer architecture and engineering, a sequencer or microsequencer is a part of the control unit of a CPU. It generates the addresses used to step through themicroprogram of a control store.
Usually the addresses are generated by some combination of a counter, a field from a microinstruction, and some subset of the instruction register. A counter is used for the typical case, that the next microinstruction is the one to execute. A field from the microinstruction is used for jumps, or other logic.
Since CPUs implement an instruction set, it's very useful to be able to decode the instruction's bits directly into the sequencer, to select a set of microinstructions to perform a CPU's instructions.
Most modern CPUs are considerably more complex than this description suggests. They tend to have multiple cooperating micromachines with specialized logic to detect and handle interference between the micromachines.
Blood bank management system-UML diagram?
The UML are behavioral diagram used to describe a set of actions that some systems(s) should or can perform in collaboration with one or more external users of the system. In this case, blood bank management systems.
Discuss the advantages of waterfall model?
Advantage: -
1-You get the software according to your demand.
2-It is best for small projects.
3-It is very much sequential & systematic.
What is information hiding in software engineering?
The Modules should be designed specifically so that no information(Algorithm and data) contained within the module is not accessible to the other module that have no need of that information.
Hiding implies that Effective modularity can be achieved by defining a set of independent modules that communicate with one another only through information necessary to achieve software function.
What ways can object oriented systems be considered cure to the software crisis?
It isn't clear what you mean by the "software crisis". The benefits of object oriented systems are usually in the re-use of code (not having to write the same type of code over and over again), which leads to a better ROI (return on investment).
This means you can leverage what you already have done to get a product to market faster.
What are the four p's of software engineering?
There four p's in software engineering. The four p's are people , product, process, project.
Why do you think software development is risky?
Not all models of software engineering are risky. The spiral model takes care of risk in every phase.
Provide three examples of software development projects that would be amenable to prototyping?
What is meant by a well-engineered software product?
A well-engineered software product is one that is designed and developed with a focus on quality, performance, maintainability, and scalability. It adheres to best practices in software development, including proper architecture, coding standards, and thorough testing. Additionally, it is user-friendly, meets the needs of its target audience, and is adaptable to future changes. Overall, it strikes a balance between functionality and reliability, ensuring a positive user experience.
The three most common software development methods used by the Department of Defense (DoD) are the Waterfall Approach, the Incremental Approach, and Agile development. The Waterfall Approach is a linear and sequential model where each phase must be completed before the next begins, making it suitable for well-defined projects. The Incremental Approach allows for partial implementation and delivery of software in stages, enabling early testing and feedback. Agile development emphasizes flexibility, iterative progress, and collaboration, accommodating changes throughout the project lifecycle.