You have been hired to analyze a hacked database. The data is stored in a linked lis constructed from nodes described as follows: struct node{ char *fname; char *lname; struct node *next; }; The list has a sentinel node, which is accessible with the already-initialized variable struct node *sent:

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
You have been hired to analyze a hacked database. The data is stored in a linked list,
constructed from nodes described as follows:
struct node{
char *fname;
char *Iname;
struct node *next;
};
The list has a sentinel node, which is accessible with the already-initialized variable
struct node *sent;
The hacker created a series of records where the first name and the last name are the same. Your
goal is to determine how many hacked records exist.
(a) write a function with the protoype
int hackCount(struct node *);
whose purpose is to count the number of nodes where the first name is equal to the last name,
and return that value.
(b) write a function with the prototype
tag(struct node*);
that accepts a sentinel node, and inserts a new node at the beginning of the list (immediately after
the sentinel) with fname and Iname each set to the string "hacked"
Transcribed Image Text:You have been hired to analyze a hacked database. The data is stored in a linked list, constructed from nodes described as follows: struct node{ char *fname; char *Iname; struct node *next; }; The list has a sentinel node, which is accessible with the already-initialized variable struct node *sent; The hacker created a series of records where the first name and the last name are the same. Your goal is to determine how many hacked records exist. (a) write a function with the protoype int hackCount(struct node *); whose purpose is to count the number of nodes where the first name is equal to the last name, and return that value. (b) write a function with the prototype tag(struct node*); that accepts a sentinel node, and inserts a new node at the beginning of the list (immediately after the sentinel) with fname and Iname each set to the string "hacked"
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Hash Table
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education