Premium Essay

Pt1420 Final Exam

Submitted By
Words 1249
Pages 5
Final: Algorithms Spring 2016

I _(your name)____________ did not collaborate with any person on this exam. I understand that doing so will result in a 0 for the Final Exam.

• You can use online references, but write answers in your own words! Cite any references used. Answer the question in your own words, no credit will be given for answers copied from any source.
• No collaborating with other people; a 0 will be given if any collaboration evidence is found. Ask me for a hint if you are stuck on any particular problem.
• I am looking for very specific, detailed, correct, and complete answers.

• Most answers found on the Internet (especially Wikipedia) are generic answers for people without a networking background and …show more content…
How could RSA encryption be used with it.

2 (6 Points) Divide and Conquer
a) Explain the Divide and Conquer strategy

b) How is recursion connected to Divide and Conquer

c) How does Master Method connect to Divide and Conquer 3) Dynamic Programming (10 Points)
a) Explain Dynamic Programming.

b) What advantages does Dynamic Programming give over Divide and Conquer? Give an example.

c) (Dynamic Programming Problem: Shortest Path) Give the table to find the shortest path from node 9 to every other node.

d) Part c was Dijkstra algorithm. Was it a Breath First Search Algorithm or Depth Search First Algorithm? What heap from #6 on this test is commonly used for Dijkstra’s Algorithm.

e) (Dynamic Programming Problem: LCS) Suppose you have the sequence: 3, 1, 4, 7, 9, 2, 11, 13, 14. The largest increasing subsequence is 1 4 7 9 11 13 14. Use LCS to find the largest increasing subsequence.

4) (20 Points) a) Using 3c, formulate the shortest path from node 9 to node 6. Solve with Lindo.
b) Using 3c, with the edges as capacity, formulate the max flow of the network. Solve with Lindo. …show more content…
There are other types of heaps; two other common heaps are Binomial Heaps and Fibonacci Heaps. Give an example of a Binomial Heap and a Fibonacci heap. Below are the answers we found in class for binary heap. Find the amortized time (average over n operation) for Binomial and Fibonacci heaps (cite the textbook or online reference).

Proc Binary Heap
(worst-case) Binomial
(worst-case) Binomial
(amortized) Fibonacci
(amortized)
MakeHeap Q(1) Q(1) Q(1) Q(1)
Insert Q(lg n) O(lg n) _____ _____
Minimum Q(1) O(1) Q(1) Q(1)
Extract-Min Q(lg n) O(lg n) ______ ______
Union (Merge) Q(n) O(lg n) ________ ______
Decrease Key Q(lg n) Q(lg n) ______ _____
Delete Q(lg n) Q(lg n) ______ _____

7) ( 6 points) Currently what is the fastest for the following. Give the name and running time.
a) Matrix Multiplication Algorithm?

b) Integer Multiplication Algorithm?

c) Polynomial Multiplication Algorithm?

d) Minimal Spanning Tree Algorithm?

e) Shortest Path?

f) Factoring?

8 (6 points) For shortest path we discussed BFS, Floyd-Warshall, Bellman Ford, and Dijkstra.
a. What is the running time of each?

b. What is the running time of Dijkstra on a sparse graph versus a dense

Similar Documents

Free Essay

Pt1420 Final Exam

...FINAL EXAM STUDY GUIDE 1. A decision structure. case structure is a a. Single-alternative b. Dual-alternative d. Triple-alternative What is the expected output of the following flowchart? elrH?Xe*$le#s# ,,&.k$ry]ffilit*i+ My age is 31 and your age is less than that b. Our ages do not qualify c. Nothing d. Syntax error a. { FINAL EXAM STUDY GUIDE 3. What is the expected output of the following flowchart? My age is between 32 and 35 b. My age is not within that range c. Nothing a. d. Syntax error FINAL EXAM STUDY GUIDE 4. What is the expected output of the f'ollowing flowehart? You canvoto You carurot vote Nolhing d. Syntax error a. b. c. FINAL EXAM STUDY GUIDE 5. What is the expected output of the following flowchart? a. One of our numbers is 83 b. 83 is not our numbers c. Nothing d. Syntax error 6. Which operator would make the following expression true? False_Jrue a. b. AND NOT ffi d. OTHER 7. Which operator would make the following expression false? False True b. NOT d. OTHER c. OR 4 FINAL EXAM STUDY GUIDE 8. If the expression is false, the a. AND operator will return true. ffiOR c. d. 9. OTHER What type of operators are the following? d. 10. The Mathematical first line of the case structure starts with the word CASE followed by the test expression. a. True I l. Which a. b. c. structure causes...

Words: 761 - Pages: 4

Premium Essay

Nt1230 Syllabus

...Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...

Words: 1834 - Pages: 8

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10

Premium Essay

Nt2640

...associated services. Planning and deployment of network addressing structures, as well as router and switch configurations, are also examined. IP Networking Syllabus Where Does This Course Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming Technology Courses General Education/ General Studies 1 Date: 7/18/2011 IP Networking Syllabus Mobile Communications Technology MC2799 MCT Capstone Project NT2640 IP Networking MC2560 Mobile Wireless Communication I MC2660 Mobile Wireless Communication II MC2665 Mobile...

Words: 2573 - Pages: 11

Premium Essay

Final Study

...Pt1420 Final Exam Guide Boolean Expressions and Relational Operators – Named after English mathematician George Boole. In 1800s Boole invented a system of mathematics in which the abstract concepts of true and false can be used in computations. If-Then statement is formed with a relational operator, which determines whether a specific relationship exists between two values. (>) Greater than operator. (==) Equal to operator. (<) Less than operator. (>=) Greater than or equal to. (<=) Less than or equal to. (!=) Not equal to. The case structure is a multiple alternative decision structure. It allows you to test the value of a variable or an expression and then use that value to determine which statement or set of statements to execute. The testExpression is usually a variable, but in many languages it can also be anything that gives a value (such as a math expression). Short-Circuit Evaluation – In many languages both the AND and OR operators perform short-circuit evaluation. If the expression on the left side of the AND operator is false, the expression on the right side will not be checked. Because the compound expression will be false if only one of the sub-expressions is false, it would waste CPU time to check the remaining expression. So, when the AND operator finds that the expression on its left is false, it short-circuits and does not evaluate the expression on its right. With the OR operator if the expression on the left side...

Words: 1700 - Pages: 7

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18

Premium Essay

Nt 1210

...conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18

Premium Essay

Nothing

...interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580 | | | NT2670 | NT2640 | | PT2520 | | Introduction to | | | | | | | | | | | Email and Web | | | | | Information | | | | IP Networking | | Database Concepts | | | | | Services | | | | | Security | | | | | | | | | | | | | | | | NT1330 | | | NT1230 | NT1430 | | PT1420 | | Client-Server | | | Client-Server | | | Introduction to |...

Words: 10839 - Pages: 44