Browse All
Alphabetical listing with fast deep pagination.
1197283 items • Page 209 / 23946
(In C++ if possible.) 2. Create a binary tree structure that is populated by nod
(In C++ if possible.) 2. Create a binary tree structure that is populated by nodes that consist of a random integer and a frequency. The key is the integer value, the frequency is…
(In C++ language please)Write a simulation program of the lines at a grocery sto
(In C++ language please)Write a simulation program of the lines at a grocery store. The program will be similar to the car wash simulation, except that there are multiple queues i…
(In C++) For this assignment create a simple double linked structures consisting
(In C++) For this assignment create a simple double linked structures consisting of Node objects. Each node will have a pointer to the next node and a pointer to the previous node…
(In C++) The following function accepts objects by reference and indicates the r
(In C++) The following function accepts objects by reference and indicates the result of the operation by storing a value in the variable pointed to by result. Implement the funct…
(In C++)I need help implementing the following functions: int binary_to_decimal_
(In C++)I need help implementing the following functions: int binary_to_decimal_signed(string b); // precondition: b is a string that consists of only 0s and 1s // postcondition: …
(In JAVA) (Use Binary Search Tree) Programming Steps: 1) Generate 20 random numb
(In JAVA) (Use Binary Search Tree) Programming Steps: 1) Generate 20 random numbers from 1 to 100 inclusive. Write them to a text file called “p9in.txt”. 2) Read “p9in.txt” into a…
(In Java This will require that you use the ‘SetInterface’ of Chapter 1 instead
(In Java This will require that you use the ‘SetInterface’ of Chapter 1 instead of the ‘BagInterface’ of Chapter 2. You will add the methods of the interface to the existing class…
(In Java With Comments) (Project: Phishing Scanner) Phishing is a form of identi
(In Java With Comments) (Project: Phishing Scanner) Phishing is a form of identity theft in which, in an e-mail, a sender posing as a trustworthy source attempts to acquire privat…
(In Java please) 1) modify BinarySearchTree to: a) Extend the Binary Search Tree
(In Java please) 1) modify BinarySearchTree to: a) Extend the Binary Search Tree ADT to include a basic public method getRoot that returns a reference to the root of the tree. If …
(In Java) 19.5 (Bubble Sort) Implement bubble sort—another simple yet inefficien
(In Java) 19.5 (Bubble Sort) Implement bubble sort—another simple yet inefficient sorting technique. It’s called bubble sort or sinking sort because smaller values gradually “bubb…
(In Java) An n X n matrix is called a positive Markov matrix if each element is
(In Java) An n X n matrix is called a positive Markov matrix if each element is positive and the sum of the elements in each column is 1. Write the following method to check wheth…
(In Java) Create an application containing an array that stores 10 integers. The
(In Java) Create an application containing an array that stores 10 integers. The application should call five methods that in turn (1) display all the integers, (2) display all th…
(In Java) Design a class named Queue for storing integers. Like a stack, a queue
(In Java) Design a class named Queue for storing integers. Like a stack, a queue holds elements. In a stack, the elements are retrieved in a last-in first-out fashion. In a queue,…
(In Java) Design and implement a Java class (name it SummerStats.java) that enca
(In Java) Design and implement a Java class (name it SummerStats.java) that encapsulates statistics for summer job salaries for a group of people over several years. The only data…
(In Java) Write a complete definition of a piggy bank class conforming to the fo
(In Java) Write a complete definition of a piggy bank class conforming to the following requirements. -Define a constructor which accepts the number of quarters, dimes, and nickle…
(In Java) Write a program that converts a number entered in Roman numerals to a
(In Java) Write a program that converts a number entered in Roman numerals to a decimal. Your program should consist of a class, say, Roman. An object of type Roman should do the …
(In Java): The assignment is... Write a TrieSpellChecker class that supports the
(In Java): The assignment is... Write a TrieSpellChecker class that supports the same functionality as your BSTSpellChecker. Specifically, it should include the following methods:…
(In MatLab) Write a function RevertString.m that accepts a string as its argumen
(In MatLab) Write a function RevertString.m that accepts a string as its argument and returns a string that’s areverted version of that string (string obtained by flipping the arg…
(In Matlab) 2. Dowload the Excel file data.xlsx from the course website. There a
(In Matlab) 2. Dowload the Excel file data.xlsx from the course website. There are 3 sheets i tlie file: x data, y data and z data. Write a script that imports these three sets of…
(In Matlab) Write a script file (i.e. a non-function) “simpson.m” that computes
(In Matlab) Write a script file (i.e. a non-function) “simpson.m” that computes the integral of this “f(x)=24sin(10x)+2x^2+4” using the “Multiple-Application” Simpson’s 1/3 Rule w…
(In Matlab) Write a script file (i.e. a non-function) “trapezoid.m” that compute
(In Matlab) Write a script file (i.e. a non-function) “trapezoid.m” that computes the integral of this “f(x)=24sin(10x)+2x^2+4” using the “Multiple-Application” Trapezoid Rule wit…
(In Parallel circuit) In procedure 2, trial 1, if you measure the following valu
(In Parallel circuit) In procedure 2, trial 1, if you measure the following values: Resistor # Current (mA) Voltage(V) …
(In Parallel circuit) In procedure 2, trial 1, if you measure the following valu
(In Parallel circuit) In procedure 2, trial 1, if you measure the following values: Resistor # Current (mA) Voltage(V) …
(In Pyhton): Write a function generateRSAKeys(p, q) that returns the public key
(In Pyhton): Write a function generateRSAKeys(p, q) that returns the public key (n, e) and the private key d, given parameters for the two prime factors p and q. Your function can…
(In Pyhton): Write a function modInv(a, b) that returns the multiplicative inver
(In Pyhton): Write a function modInv(a, b) that returns the multiplicative inverse of a, mod b (i.e., it should return an integer x {1, 2, 3, … , b – 1} such that (ax) mod b = 1).…
(In Python) Write a program that uses all of your functions from above to carry
(In Python) Write a program that uses all of your functions from above to carry out an RSA key generation, encryption, and decryption. Your program should get user input for two p…
(In Python): Write a function gcd(a, b) that returns the greatest common divisor
(In Python): Write a function gcd(a, b) that returns the greatest common divisor of the parameters a and b. You can use the Euclidean algorithm, which is based on the fact that gc…
(In Python): Write a function modExp(x, y, n) that computes and returns the valu
(In Python): Write a function modExp(x, y, n) that computes and returns the value of x^y mod n. Use the fast modular exponentiation algorithm given in Figure 9.7.4 of the zyBook. …
(In R) Use the built-in data set `VADeaths`. Part 1 Which demographic (in terms
(In R) Use the built-in data set `VADeaths`. Part 1 Which demographic (in terms of sex, age, and rural or urban residence) has the highest death rate? Which has the lowest? The `a…
(In SQL) Write a SQL query using the following tables to find the names of the c
(In SQL) Write a SQL query using the following tables to find the names of the companies which have employees residing in all cities where employees of Bank of America live. (So i…
(In c++) Developing secret codes has interested people for centuries. A simple c
(In c++) Developing secret codes has interested people for centuries. A simple coding scheme can be developed by replacing each character in a text file by another character that …
(In cobol) For this assignment you will produce a sequential update program usin
(In cobol) For this assignment you will produce a sequential update program using techniques similar to those in SS3. You are given two files, a "master" file with dealer informat…
(In hurry) Import file (day.txt) Note: customer1,item1;customer2,item2;customer3
(In hurry) Import file (day.txt) Note: customer1,item1;customer2,item2;customer3,item3; 1. Create a class called "Purchase", this class will have two member variables: a. Customer…
(In java language) 1. Use recursion in implementing the binarySearch method 2. U
(In java language) 1. Use recursion in implementing the binarySearch method 2. Use Generics in implementing different methods 3. Use the attached driver. Do not modify the driver …
(In java, and please writes comment)Suppose we want to implement a drawing progr
(In java, and please writes comment)Suppose we want to implement a drawing program that creates various shapes using keyboard characters. Implement an abstract base class Drawable…
(In matlab) write a function which outputs the base 3 logarithm of the input num
(In matlab) write a function which outputs the base 3 logarithm of the input number. if the number is less than or equal to zero, the function is to output a message saying th (In…
(In some of the exercises that follow, we must make assumptions such as the exis
(In some of the exercises that follow, we must make assumptions such as the existence of normal distributions with equal variances.) Say X and Y are independent random variables w…
(In the book, The Hunger Games) In the 74th Hunger Games, once Katniss leaves th
(In the book, The Hunger Games) In the 74th Hunger Games, once Katniss leaves the starting platform, she runs toward the cornucopia to grab something, but Clove chases her followe…
(In the book, The Hunger Games) When only 3 tributes are left, the game keepers
(In the book, The Hunger Games) When only 3 tributes are left, the game keepers send in some creatures that.. A. are not as vicious as they first appear to be. B. Katniss realizes…
(In the experiment on teacher incentives in India (Muralidharan & Sundararaman),
(In the experiment on teacher incentives in India (Muralidharan & Sundararaman), the incentive scheme implemented in the treatment goup can be described in the following figur…
(In this problem, we are going to treat the electron as a point particle, and as
(In this problem, we are going to treat the electron as a point particle, and assume that the proton, which has a much greater mass, does not move.) An electron is in a circular o…
(In this problem, we are going to treat the electronas a point particle, and ass
(In this problem, we are going to treat the electronas a point particle, and assume that the proton, which has a muchgreater mass, does not move.) An electron is in a circular orb…
(In this problem, you must create the flexible budget and flexible budget varian
(In this problem, you must create the flexible budget and flexible budget variances for two cost items. I suggest the following steps for each item: determine the cost function fo…
(In this problem, you must create the flexible budget and flexible budget varian
(In this problem, you must create the flexible budget and flexible budget variances for two cost items. I suggest the following steps for each item: determine the cost function fo…
(In this problem, you must create the flexible budget and flexible budget varian
(In this problem, you must create the flexible budget and flexible budget variances for two cost items. I suggest the following steps for each item: determine the cost function fo…
(In your own words) 1. What is your understanding of the term Inertia ? How is i
(In your own words) 1. What is your understanding of the term Inertia ? How is it applied in common speech to things other than the physical ? 2. Give an example of Newton's first…
(Include explainations please) 3) How has the Internet most likely affected dire
(Include explainations please) 3) How has the Internet most likely affected direct and digital marketing? A) The time taken by marketers to reach customer segments has increased. …
(Income Statement, EPS) Presented below are selected ledger accounts of McGraw C
(Income Statement, EPS) Presented below are selected ledger accounts of McGraw Corporation as of December 31, 2010. Cash $50,000 Administrative expenses 100,000 Selling expenses 8…
(Incremental earnings from lowering product prices) Apple\'s (AAPL) iPad jump st
(Incremental earnings from lowering product prices) Apple's (AAPL) iPad jump started the touchscreen computer market to levels few analysts had ever dreamed possible. Moreover, th…
(Indifference Curves) Holly loves dogs, hates cats and is completely indifferent
(Indifference Curves) Holly loves dogs, hates cats and is completely indifferent to rabbits. For each of the following set of goods, draw and label two indifference curves, U1 and…