Determine if a number is factor or not

Assignment Help Basic Computer Science
Reference no: EM13996601

Question:The objective ofthis exercise is to implement a multithreaded solution to find if a givennumber is a perfect number.Nis a perfect number if the sum of all its factors, excluding itself, isN;examples are 6 and 28. The input is an integer,N.The output istrue if the number is a perfect number and false otherwise.The main program will read the numbersNandPfrom the command line.The main process will spawn a set ofPthreads. The numbers from 1 toNwill be partitioned among these threads so that twothreads do not work on the name number.For each number in this set, the thread will determine if the number is a factor ofN.Ifitis, it adds the number to a shared buffer that stores factors ofN.The parent process waits till all the threads complete. Use the appropriate synchronization primitive here. Theparent will then determine if the input number is perfect, that is, ifNis a sum of all its factors and then report accordingly.(Note:You can makethe computation faster by restricting the numbers searched from 1 to the square root ofN).

Question:Implement a program to count the frequencyofwords in a text file. Thetext file is partitioned intoNsegments. Each segment is processed by a separate thread that outputs the intermediate frequencycount for its segment. The main process waits until all the threads complete; then it computes the consolidated word-frequencydata based on the individual threads' output.

Reference no: EM13996601

Questions Cloud

Determine the corresponding decimal equivalent and ratio : What was the average number of hospitalized days for this group-correct to one decimal place and what was the daily average-correct to one decimal place - What was the average number performed monthly-correct to the nearest whole number?
Convert pseudocode program into javascript : Use notepad to write a pseudocode program that allows a student to enter a percentage and the number of absences and then displays the display the grade and explanation if an adjustments were made. Save the file as gradeReporter.txt .... Also conv..
What is the velocity of the wave in the beam : A student strikes a metal rail (L = 22 m) at one end and uses a piezoelectric gauge at the other end to determine that the beam produces a λ= 2 kHz sound wave that takes t = 0.0071 s to reach the end of the beam within the metal. Input an expressio..
Explain how sex offenders need to be treated : State the issues that are associated with offenders who have tuberculosis, Hepatitis C, and HIV/AIDS. Explain how sex offenders need to be treated and supervised differently than other offenders. Describe how DWI/DUI offenders strain the corrections ..
Determine if a number is factor or not : Implement a program to count the frequencyofwords in a text file. Thetext file is partitioned intoNsegments. Each segment is processed by a separate thread that outputs the intermediate frequencycount for its segment. The main process waits until ..
What is the amplitude of oscillation of the mass : A student is studying a 100.0g mass oscillating on a horizontal spring of spring constant k=18N/m. At t=0, the object was at rest and its position was x= 2.55cm from its equilibrium position. What is the amplitude of oscillation of the mass?
What are the magnitudes of the momenta of the photons : Explain why the electron and positron cannot annihilate to become a single photon. What are the magnitudes of the momenta of the photons?
Determine the magnitude of the balloon initial velocity : The target is located a horizontal distance d = 7.5 m from the student's feet. Assume that the balloon moves without air resistance. Use a Cartesian coordinate system with the origin at the balloon's initial position. What is the position vector,..
Is commodities liable to e-products under the sales : Is Commodities liable to E-Products under the sales contract for the computers, printers and scanners? Why or why not? Is Brenda personally liable to E-Products to pay for the computers, printers and scanners? Why or why not

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Compare among different types of high-availability solutions

Compare and contrast among different types of high-availability solutions

  How many data in the number of bytes can be hold in cache

What is the size of the cache, i.e., how many data in the number of bytes can be hold in the cache?

  Assignment rock paper scissors

This problem will be a fun application of interfaces. It revolves around  the game of Rocks, Paper, Scissors (also known in some parts of the world as RoShamBo).

  Innovation in info technology

innovation in info technology

  What is achievable steady-state throughput

The receiver uses a conservative flow control policy and updates its credit allocation at every opportunity. What is the achievable steady-state throughput?

  What is average seek time

Tracks traversed Disk receives a request to access a random sector on a random track. Assume the head starts at track 0. What is the average seek time?

  New century develop a new information system

New Century Wellness Group offers a holistic approach to health care with an emphasis on preventive medicine as well as traditional medical care. In your role as an IT consultant, you will help New Century develop a new information system

  Computers and the internet becomes more prevalent

As the use of computers and the internet becomes more prevalent, ethical issues related to computer usage will continue to make a larger impact on people's lives and the way that society functions. Computer ethics involves the moral principles an..

  Preventing or mitigating dos or distributed dos

Topic of the Paper: Technique(s) or scheme(s) or method(s) for detecting, preventing or mitigating DoS or Distributed DoS (DDoS) attacks. Assignment Guidelines

  Define two primary approaches in developing signatures

Identify and briefly describe the two primary approaches to developing signatures for network-based IDS tools. Is one technique preferred over the other? Explain why.

  Design a plan for email content which was leaked

Suppose that you feel that your (or your boss's) email content was always leaked (e.g., some confidential information in your email was known to many others). Design a plan for this investigation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd