Download presentation

Presentation is loading. Please wait.

1
**Data Structures: A Pseudocode Approach with C**

Chapter 5 List Objectives Upon completion you will be able to: Explain the design, use, and operation of a linear list Implement a linear list using a linked list structure Understand the operation of the linear list ADT Write application programs using the linear list ADT Design and implement different link-list structures Data Structures: A Pseudocode Approach with C

2
**Data Structures: A Pseudocode Approach with C**

5-1 Basic Operations We begin with a discussion of the basic list operations. Each operation is developed using before and after figures to show the changes. Insertion Deletion Retrieval Traversal Data Structures: A Pseudocode Approach with C

3
**Data Structures: A Pseudocode Approach with C**

4
**Data Structures: A Pseudocode Approach with C**

5
**Data Structures: A Pseudocode Approach with C**

6
**Data Structures: A Pseudocode Approach with C**

7
**Data Structures: A Pseudocode Approach with C**

8
**Data Structures: A Pseudocode Approach with C**

9
**Data Structures: A Pseudocode Approach with C**

10
**Data Structures: A Pseudocode Approach with C**

11
**Data Structures: A Pseudocode Approach with C**

12
**Data Structures: A Pseudocode Approach with C**

13
**Data Structures: A Pseudocode Approach with C**

14
**Data Structures: A Pseudocode Approach with C**

15
**Data Structures: A Pseudocode Approach with C**

16
**Data Structures: A Pseudocode Approach with C**

17
**Data Structures: A Pseudocode Approach with C**

18
**Data Structures: A Pseudocode Approach with C**

List Search A list search is used to locate data in a list To insert data, we need to know the logical predecessor to the new data. To delete data, we need to find the node to be deleted and identify its logical predecessor. To retrieve data from a list, we need to search the list and find the data. Data Structures: A Pseudocode Approach with C

19
**Data Structures: A Pseudocode Approach with C**

List Search We must use a sequential search because there is no physical relationship among the nodes. The classic sequential search returns the location of an element when it is found and the address of the last element when it is not found. Because the list is ordered, we need to return the location of the element when it is found and the location where it should be placed when it is not found. Data Structures: A Pseudocode Approach with C

20
**Data Structures: A Pseudocode Approach with C**

List Search Given a target key, the ordered list search attempts to locate the requested node in the list. To search a list on a key, we need a key field. For simple lists the key and the data can be the same field. If a node in the list matches the target value, the search returns true; if there are no key matches, it returns false. Data Structures: A Pseudocode Approach with C

21
**Data Structures: A Pseudocode Approach with C**

22
**Data Structures: A Pseudocode Approach with C**

23
**Data Structures: A Pseudocode Approach with C**

Traversals Algorithms that traverse a list start at the first node and examine each node in succession until the last node has been processed. Traversal logic is used by such types of algorithms as changing a value in each node, printing a list, summing a list, calculating the average, etc. To traverse a list, we need a walking pointer that moves from node to node Data Structures: A Pseudocode Approach with C

24
**Data Structures: A Pseudocode Approach with C**

Doubly Linked List A doubly linked list is a linked list structure in which each node has a pointer to both its successor and its predecessor. Data Structures: A Pseudocode Approach with C

25
**Data Structures: A Pseudocode Approach with C**

26
**Data Structures: A Pseudocode Approach with C**

ADT Structure There are three pieces of metadata in the head structure: a count, a position pointer for traversals, and a rear pointer: Data Structures: A Pseudocode Approach with C

27
**Circularly Linked List**

In a circularly linked list, the last node’s link points to the first node of the list. Circularly linked lists are primarily used in lists that allow access to nodes in the middle of the list without starting at the beginning. Data Structures: A Pseudocode Approach with C

28
**Data Structures: A Pseudocode Approach with C**

29
**Data Structures: A Pseudocode Approach with C**

Homework Chapter 5 Exercises 1-3, pp Problem 10, p. 251 Data Structures: A Pseudocode Approach with C

Similar presentations

OK

Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 5 Author: Julia Richards and R. Scott Hawley.

Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 5 Author: Julia Richards and R. Scott Hawley.

© 2017 SlidePlayer.com Inc.

All rights reserved.

Ads by Google

Ppt on impact of information technology in banking sector Pdf to ppt online convertor Ppt on united nations agencies Ppt on english language learning Ppt on pi in maths what is the range Ppt on db2 mainframes Ppt on trial and error method Ppt on oil circuit breaker Ppt on wifi technology free download Ppt on file system in unix what is