From Twitter

MCA (3rd Semester) SOLVED ASSIGNMENT IGNOU MCA III 3rd Samester Solved Assignment 2013 2014 MCS-031 MCS-032 MCS-033 MCS-034 MCS-035

IGNOU MCA III 3rd Samester Solved Assignment 2013 2014
 (MCS-031, MCS-032, MCS-033, MCS-034, MCS-035 ,MCSL-036)
MCA (3rd Semester) SOLVED ASSIGNMENT IGNOU MCA III 3rd Samester Solved Assignment 2013 2014  MCS-031 MCS-032 MCS-033 MCS-034 MCS-035



MCS SOLVED ASSIGNMENT SOLUTION QUESTION BY QUESTION

Course Code : MCS-031
Course Title : Design and Analysis of Algorithms
Assignment Number : MCA (3)/031/Assign/13


Question 1:
(a) Show, through appropriate examples or otherwise, that the
following three characteristics of an algorithm are independent
of each other: (i.e., a method may have one of these properties,
without having the other two)
(i) finiteness (ii) definiteness (iii) effectiveness


Solution:


Need for studying algorithms: The study of algorithms is the cornerstone of computer
science.It can be recognized as the core of computer science. Computer programs would
not exist without algorithms. With computers becoming an essential part of our professional
& personal life’s, studying algorithms becomes a necessity, more so for computer
science engineers.
Another reason for studying algorithms is that if we know a standard set of important
algorithms ,They further our analytical skills & help us in developing new algorithms for
required applications
An algorithm is finite set of instructions that is followed, accomplishes a particular task. In
addition, all algorithms must satisfy the following criteria:
1. Input. Zero or more quantities are externally supplied.
2. Output. At least one quantity is produced.
3. Definiteness. Each instruction is clear and produced.
4. Finiteness. If we trace out the instruction of an algorithm, then for all cases, the algorithm
                       terminates after a finite number of steps.
5. Effectiveness. Every instruction must be very basic so that it can be carried out, in
                           principal, by a person using only pencil and paper. It is not enough
                            that  each operation be definite as in criterion 3; it also must be feasible.

Question 2:
Let f (n) denote the nth term of a sequence of integers given (5 marks)
by the equation f(n) = f(n-1) +f(n-2) for n > 2 and f(1) = 1
and f(2) = 1, then using principle of mathematical induction, show
that √ 5 f( n ) = {(1+ √ 5) / 2} n -- {(1 -- √ 5) / 2}n for all n > = 1

Solution :





1 comment:

  1. Hi,
    This is a nice post you have provide a nice way to solve this equation.
    Assignment Help

    ReplyDelete

Labels

(MCS-031 (6) 2011 (5) 4nf (1) 5nf (1) ACCESS CONTROL In Relational Database (1) ALGORITHMICS (5) assignment 2014 2015 (1) AVAILABLE TOOLS & ALGORITHMS (5) BCA (1) BINARY SEARCH (1) Block Nested Loop Join (1) Build and Fix Model (1) BUILDING BLOCKS OF ALGORITHMS (1) CHARACTERISTICS OF AN ALGORITHM (2) Core Java (1) Data Communication Network Security (1) DATABASE SECURITY (1) EER tool (1) ELEMEMTARY ALGORITHMICS (2) ENHANCED ER TOOLS (1) EVOLUTION (1) EXAMPLE OF AN ALGORITHM (2) Indexed Nested-Loop Join (1) install servelet engine (1) INTRODUCTION (1) Iterative Enhancement Model (1) Java Server Pages (1) JDBC (1) JSP (2) LEVELS OF DATABASE SECURITY (1) MCA (9) MCA 051 (1) MCA 3rd Semester (8) MCA 4th Semester (1) MCA 5 sem (1) MCS-031 (7) MCS-031 : DESIGN AND ANALYSIS OF ALGORITHM (14) MCS-032 (1) MCS-033 (1) MCS-034 (2) MCS-035 (1) mcs-041 (2) MCS-042 (1) mcs-043 (2) mcs-052 solved assignment (1) MCSL-036 (2) Nested loop join (1) OBJECTIVES (1) Operating System (2) OUTLINE OF ALGORITHMICS (1) Principles of Management and Information Systems (1) PROBLEMS (1) QUERY PROCESSING AND EVALUATION (1) Query processing Optimisation (1) Question Papers (8) Related Topic (9) relational Database (1) SELECT OPERATION Query Processing (1) Servlet (1) Servlet Programme (1) Servlet Programming (1) SOFTWARE DEVELOPMENT MODELS (4) SOFTWARE ENGINEERING (4) Solution (7) Solved Assignment 2013 2014 (6) SOME PRE-REQUISITES AND Asymptotic Bounds ASYMPTOTIC BOUNDS INTRODUCTION (1) STATISTICAL DATABASE SECURITY (1) structure (1) SUMMARY (1) Waterfall Model (1) Write a C program to print the following triangle (1)