Demonstrate a function in scheme language

Assignment Help Computer Engineering
Reference no: EM132198926

Write and fully demonstrate a function in "Scheme language" named super-duper, with this interface:

(super-duper source count)

The function returns a copy of the list source, with every element duplicated count times. If source is an atom, it is immediately returned, without duplication.

For example:

(super-duper 123 1)

123

(super-duper 123 2)

123

(super-duper '() 1)

()

(super-duper '() 2)

()

(super-duper '(x) 1)

(x)

(super-duper '(x) 2)

(x x)

(super-duper '(x y) 1)

(x y)

(super-duper '(x y) 2)

(x x y y)

(super-duper '((a b) y) 3)

((a a a b b b) (a a a b b b) (a a a b b b) y y y)

Reference no: EM132198926

Questions Cloud

Write a short program to test your function : Write a function in C that takes three parameters: the address of a two-dimensional array of type int, the number of rows in the array.
Management perspective for data-mining software project : Discuss the major risk management functions from a project management perspective for the data-mining software project.
Minimum average total cost curves : Companies can typically maximize their profits by operating at the minimum average total cost curves, independent of the economic environment.
What is the implied risk premium : Does uncovered interest parity hold in this example? If so, how do you know? If not, what is the implied risk premium? Which deposits pay a higher expected.
Demonstrate a function in scheme language : Write and fully demonstrate a function in "Scheme language" named super-duper, with this interface.
Write a function that takes two parameters : Write a function called findMedian that takes two parameters - an array of int and the size of the array.
Find all subgame nash equilibria of finitely repeated game : Find all of the game's pure-strategy Nash equilibria. Now suppose that the players play this game twice in a row. They observe what each other did in the first.
What is the situation of the private sector in each period : In 2009 country has a fiscal deficit of 4.2% of its GDP and it has a deficit in the external sector of 2.6% of its GDP.
Write a function called truncate : Write a function called truncate. It is passed 2 parameters, a float f and an integer d.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Give the assembly language code of microcontroller

For each of the logic statements, give the assembly language code of your microcontroller to set the condition code register and to branch to the ELSE.

  Discuss the elements of change and patch management

Suggest the elements of change and patch management that are most difficult to audit in a large corporate environment with multiple IT issues.

  Creating program that accepts infix expression as input

The left and right sub trees of an operator explain a sub expression that is evaluated and utilized as one of the operands for operator. Write down a program that inputs an infix expression and generates an expression tree. Output prefix expressi..

  Security and privacy issues in cloud computing

Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Discuss why you view this issue/these issues as important - Discuss the impact of the above mentioned issues and their application/i..

  Discuss internet for information security standards

the Internet for Information Security Standards to include the ISO 27000, NIST and IETF

  What factors are important in your decision

Decide what factors are important in your decision as to which computer to buy and list them. After you select the system you would like to buy, identify which terms refer to hardware and which refer to software.

  Have you ever been offered a free virus alert program

Have you ever been offered a free virus alert program? If so, describe the offer and whether you accepted the offer.

  What activities does it typically include

The development of expert systems is often described as a tedious process. What activities does it typically include ?

  Create a custom multi-converter

There will be eight text boxes. Four of them will represent the decimal values of the current color (each between 0 and 255 inclusive).

  Implement a java application that reads tweets

Description: The goal of this assignment is to implement a Java application that reads tweets from both the Twitter Streaming API and preloaded log file and finds the trending topics for a given set of languages and periods

  Define a brief discussion of the technical aspects

Plagiarism is "cheating." It will not be tolerated and will be dealt with in accordance with University policy. Automated tools will be used to detect plagiarism and I will make deductions for minor cases, and grade the paper as a zero for major..

  Compare the differences between amd and intel processors

Compare and contrast the differences between AMD and Intel processors for business computing. Why would you chose one over the other? Does it matter?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd