Question
Question 3. Java programming A. We have now established a Hive table Company Data and Two Spark Dataframe SQL accessible views 1Salesview and 1Empview we
Question 3. Java programming
A. We have now established a Hive table "Company Data" and Two Spark Dataframe SQL accessible views "1Salesview" and "1Empview" we are now in a position to provide some analysis on Mrs adebabamo's ask.
Give a brief and rudimentary clarification of the standards of how the language
coming about because of part (b) may be utilized to make a sentence structure analyser taking a
token stream as information (by means of calls to work lex()) and giving as result an
theoretical language structure tree relating to.
B. Generate a default constructor and a parameter constructor with these parameters below. You'll use this when the farmer introduces a new goat into the trip, and also when twins are born:
Horse name, a string, randomly chosen from the name vector
Horse color, a string, randomly chosen from the color vector
Horse age, a random int between 0-111
Horse gender, a random choice between 'fgh' or 'mnm'
The first piece of food they ate, a string, randomly chosen from the food vector. Yes, as soon as a goat is created (either through birth or through the farmer introducing another goat into the trip), they will eat something because they're goats. Your constructor should store this food string into the dynamic string array of items eaten.
You will need a copy constructor for this assignment (if a goat gets cloned), using code to support that there will be dynamic memory in our class (the array of items that the goat has eaten).
The blocks are connected with each through an underground tunnel. The distance between blocks is 30 meters.
Each block has its own server room for housing servers and network devices.
Each floor has its own telecommunication closet and the floor can be occupied up to a maximum of 20 staffs.
Company XYZ has 213 different departments as follow:
The rudimentary clarification of the standards of how the language
coming about because of part (b) may be utilized to make a sentence structure analyser taking a
token stream as information (by means of calls to work lex()) and giving as result an
theoretical language structure tree relating to.
Design for the Data Structures and Algorithms (a) Describe how the Lempel Ziv text compression algorithm works, illustrating your answer by deriving the sequence of numbers and corresponding bit patterns it would generate when applied to a string starting with the following 24 characters: ABCDABCDABCDABCDABCDABCD ... You may assume that the initial table is of size 256 (containing bytes 0 to 255) and that the codes for "A", "B", "C" and "D" are 65, 66, 67 and 68, respectively. [12 marks] (b) Estimate how many bits the algorithm would use to encode a string consisting of 1000 repetitions of the character "A". [8 marks] 4 Comparative Programming Languages (a) Discuss to what extent a programmer can expect a program that conforms to a standard to generate identical results when run under different conforming compilers on different machines. [6 marks] (b) ALGOL 60 provided call by value and call by name, Pascal provided call by value and call by reference, and ALGOL-W provided a variety of calling methods including call by result and call by value-result. coming about because of part (b) may be utilized to a sentence structure analyser taking a token stream as information (by means of calls to work lex()) and giving as result an theoretical language structure tree relating to.Briefly describe the calling mechanisms just mentioned and discuss why most modern programming languages provide only call by value. [18 marks] (c) Discuss the reasons why languages such as Fortran, Algol and PL/I designed in 1950s and 1960s are less widely used than languages designed in the last 20 years. [6 marks] 3 [TURN OVER CST.2004.3.4 5 Operating Systems II (a) What problem do real-time scheduling algorithms try to solve? [2 marks] (b) Describe one static priority and one dynamic priority real-time scheduling algorithm.
You should discuss the issue of admission control, and comment on the data structures that an implementation would need to maintain and on how these would be used to make scheduling decisions.are a data structure protected by a mutual exclusion lock. (i) What scheduling problem could arise here? [2 marks] (ii) How could this problem be overcome? [2 marks] (d) The designer also wishes the real-time system to use demand paged virtual memory for efficiency. What problems could arise here, and how could they be overcome? [6 marks] 6 Numerical Analysis I (a) For Single Precision in the IEEE binary floating-point standard (RRIEEE 754) the precision is defined as 24, and the exponent requires 8 bits of storage. With reference to IEEE Single Precision, explain the terms exponent, significand, precision, sign bit, normalised number, denormal number. [6 marks] (b) Explain the term hidden bit. What are the values of the hidden bit for normalised and denormal numbers? How is the exponent stored and why? How are the exponent, significand and sign bit arranged in memory? [4 marks] (c) Let x denote the floating-point representation of a number x. Define the terms absolute error (x) and relative error (x) in representing x. How are x and x related? Define machine epsilon (m). [3 marks] (d) Assume x = y = z = m. Using worst-case analysis, estimate xy, xy. Find an expression for w where w = z xy. [4 marks] (e) Working to 4 significant decimal digits only, compute w when x = is 1111000.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started