1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zheka24 [161]
3 years ago
6

Function _one(array)

Computers and Technology
1 answer:
dsp733 years ago
6 0

Answer:

function removeRepeaters(list){

   var goodList = [], badList = {}, used = {}, n;

   // ensure that the argument is indeed an array

   if(!Array.isArray(list)){

        throw "removeRepeaters: Expecting one argument of type Array";

   }

   // loop through the array and take note of any duplicates

   for(n in list) used[list[n]] == true ? badList[list[n]] = true : used[list[n]] = true;

   // now loop through again, and assemble a list of non-duplicates

   for(n in list) if(badList[list[n]] == undefined) goodList[] = list[n];

   return goodList;

}

Explanation:

I assume you're familiar with trinary operators, but just in case, that's what's happening in this first for loop:

for(n in list) used[list[n]] == true ? badList[list[n]] = true : used[list[n]] = true;

this is the same as saying:

for(n in list){

   if(used[list[n]] == true){

       badList[list[n]] = true;

   } else {

       used[list[n]] = true;

   }

}

This loop flags all of the values in the list that are duplicated.  Note that both "badList" and "used" are declared as objects instead of arrays.  This allows us to compare keys in them with an == operator, even if they're not defined, making it a convenient way to flag things.

Note that I haven't tested it, so I may have overlooked something.  I suggest testing it before handing it in.

You might be interested in
Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently long such tha
kvv77 [185]

Answer and Explanation:

a)

For Go-Back-N:

  Host A sent total number of segments is 9.The initial segment numbers are 1,2,3,4,5 and re-sent the segemnts 2,3,4 and 5 because 2nd segment was lost.

Host B sent the number of ACKs are 8.Host B sent ACKs 1 by four times because 2nd segment was lost and sent 4ACKs with sequence numbers 2,3,4 and 5

selective repeat:

 Host A sent total number of segments is 6.The initial segment numbers are 1,2,3,4,5 and re-sent the segemnts 2 because 2nd segment was lost.

Host B sent the number of ACKs are 5.Host B sent four ACKs with sequence numbers 1,3,4,5 and re-sent ACK2 with sequence number 2 because 2nd segment was lost.

TCP :

Host A sent total number of segments is 6.The initial segment numbers are 1,2,3,4,5 and re-sent the segemnts 2 because 2nd segment was lost.

Host B sent the number of ACKs are 5.Host B sent four ACKs with sequence number 2 and There is one ACK with sequence number 6.TCP always send an ACK with expected sequence number

b) If the timeout values for all three protocol are much longer than 5*RTT,then TCP protocol successfully delivers all five data segments in shortest time interval.

 

4 0
4 years ago
Which feature of the Excel window should I use to perform an action
Ne4ueva [31]
It depends on which action. 
5 0
3 years ago
Vadik is creating a program where the user inputs their grade level and the program tells them which sports teams they are allow
Lelechka [254]
He should use if, elif, else
4 0
3 years ago
Read 2 more answers
Hotels and motels that are part of a ________ share a centralized reservation system and a common image, logo or advertising slo
hoa [83]
It is company , I think .
8 0
3 years ago
4 types of system software
Elina [12.6K]
Operating systems.
Device drivers.
Middleware.
Utility software.
8 0
3 years ago
Read 2 more answers
Other questions:
  • 4. Discuss the advantages and disadvantages of using the same system call interface for both files and devices. Why do you think
    5·1 answer
  • What is credibility in the often-used framework of quality criteria?
    9·1 answer
  • The code segment below uses the procedure IsPartOf (list, item), which returns true if item appears in list and returns false ot
    13·1 answer
  • Which element in the PowerPoint application is not available in the Microsoft Word application?
    12·2 answers
  • In this question, you must create a function in C++ using an external editor. When satisfied with your work, you shall attach it
    10·1 answer
  • Which is the purpose of adding B-Roll footage to a sequence?
    10·1 answer
  • What is the 3 different storage requirements a computer has to process data​
    12·1 answer
  • Phishing (pronounced fishing) is malware sent through e-mail that looks like a legitimate message from a trusted sender. The goa
    10·2 answers
  • What is Data rate?<br> What is BAUD RATE?<br> What is bandwidth?
    8·1 answer
  • Complete the code to finish this program to analyze the inventory for a store that sells purses and backpacks. Each record is co
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!