Web development and programming
191828 questions • Page 156 / 3837
1) An enum essentially behaves like: a) An array b) A class that contains instan
1) An enum essentially behaves like: a) An array b) A class that contains instance variables. c) A class that contains static constants. 2) Enum constructors cannot be: a) wibbly …
1) An enum essentially behaves like: a) An array b) A class that contains instan
1) An enum essentially behaves like: a) An array b) A class that contains instance variables. c) A class that contains static constants. 2) Enum constructors cannot be: a) wibbly …
1) An object\'s properties are also known as what? 2) What is another name for a
1) An object's properties are also known as what? 2) What is another name for an object? 3) Which of the following statements is FALSE? 4) Which of the following things does this …
1) An organization\'s ______ enables the processing, storing, and transmitting o
1) An organization's ______ enables the processing, storing, and transmitting of data at the organization level. 2) The alignment of _______ is a continuous process of adjusting b…
1) Analyze the running time complexity (in terms of big O notation) of the follo
1) Analyze the running time complexity (in terms of big O notation) of the following code segment: for (i=0; i<a.length-1; i++) { for (j=i+1; j<a.length; j++) { if(a[i] >…
1) Answer the following questions The Parkerian Hexad grew out of the _______ mo
1) Answer the following questions The Parkerian Hexad grew out of the _______ model. Question 1 options: 1) 2) 3) 4) Save Question 2 (1 point) If a computer programmer changes the…
1) Answer the following questions: a) Explain the differences between float x; a
1) Answer the following questions: a) Explain the differences between float x; and float* ptrx; b) Show the output from the following program. If an unknown value ge…
1) Apply Porters 5 forces Model to Cal Poly. 2) Apply the value chain model to c
1) Apply Porters 5 forces Model to Cal Poly. 2) Apply the value chain model to compare one of the following: Netflix (DVDS) VS. Blockbuster (store) or Netflix (DVD’S VS. Redbox, o…
1) Apply the problem-solving process from initial problem analysis through code
1) Apply the problem-solving process from initial problem analysis through code testing 2) Use decomposition to identify main tasks, and determine the correct sequence for the tas…
1) Approximating %u03C0) %u03C0 can computed using the following formula: %u03A0
1) Approximating %u03C0) %u03C0 can computed using the following formula: %u03A0 = 4 x(1-1/3 + 1/5 - 1/7 + 1/9 %u2013 1/11 + 1/13 +%u2026) Write a program that displays the result…
1) Array vs ArrayList. What is the difference? 2) Suppose you have a Hashmap. Th
1) Array vs ArrayList. What is the difference? 2) Suppose you have a Hashmap. There is a list of word and definition in it. The key of the hashmap is "word" and the value is that …
1) Array/File Functions Write a function named arrayToFile. The function should
1) Array/File Functions Write a function named arrayToFile. The function should accept three arguments: the name of a file, a pointer to an int array, and the size of the array. T…
1) As we can see from the text, this image purports to be an example of recursio
1) As we can see from the text, this image purports to be an example of recursion. Justify this by (informally) describing an algorithm that would draw this image. Assume the algo…
1) As you have learned, you can use the input function to accept numbers. For ex
1) As you have learned, you can use the input function to accept numbers. For example, the following code accepts a number and stores it in the variable named coin: coin-input('En…
1) As you know, a single CPU processes one instruction at a time. Adding a secon
1) As you know, a single CPU processes one instruction at a time. Adding a second CPU (or core, in current terminology) allows the system to process two instructions at a time, si…
1) Ask user to enter their name. What is your name? Eric 2) Use the name to repl
1) Ask user to enter their name. What is your name? Eric 2) Use the name to replace world in the greeting message MODEL small .STACK 100h DATA TimePromt DB 'Is it after 12 noon (Y…
1) Assume a company has purchased a class C network using the IP base address of
1) Assume a company has purchased a class C network using the IP base address of 192.168.111.0. The company has five departments containing 20, 25, 30, 35 and 40 user computers ea…
1) Assume an array is declared as int num[15]; Write the code to assign to each
1) Assume an array is declared as int num[15]; Write the code to assign to each location in the array the square of its position Print out the array in reverse order. 2) Giv…
1) Assume that a company database contains only the following fields: item-id, i
1) Assume that a company database contains only the following fields: item-id, item-type, customer-id, customer-city, order-date, price per unit, total sales. Based on the given d…
1) Assume that x is a char variable has been declared and already given a value
1) Assume that x is a char variable has been declared and already given a value . Write an expression whose value is true if and only if x is alphanumeric , that is either a lette…
1) Assume that x is a char variable that has been declared and already given a v
1) Assume that x is a char variable that has been declared and already given a value. Write an expression whose value is true if and only if x is a decimal digit (0-9). 2) Assume …
1) Assume that you have been assigned the 132.45.0.0/16 network block . deck. Yo
1) Assume that you have been assigned the 132.45.0.0/16 network block. deck. You must establish 5 subnets. Specify the minimum number of binary digits (bits) required to define 5 …
1) Assume the variables ptr1 and ptr2 have been declared as pointers to integers
1) Assume the variables ptr1 and ptr2 have been declared as pointers to integers. An array of 100 elements has been allocated, its pointer assigned to ptr1 , and its elements init…
1) Assume we have a file that contains 10 words (assume the word “CCBC”) and eac
1) Assume we have a file that contains 10 words (assume the word “CCBC”) and each word is on a new line. What would the output be with the following code: Scanner fileReader = new…
1) Assume you have the following declaration. double salesData[1000]; Which of t
1) Assume you have the following declaration. double salesData[1000]; Which of the following ranges is valid for the index of the array salesData? (4 points) (A) 0 through …
1) Assuming a Linear Quotient hashing scheme is used and that the size of the pr
1) Assuming a Linear Quotient hashing scheme is used and that the size of the primary storage area, N, is 19 and that the default prime is 2311, calculate the first 3 indices (hom…
1) Assuming integers are represented as 16-bit words and negative numbers are re
1) Assuming integers are represented as 16-bit words and negative numbers are represented using the 2's complimentary method, convert the following hexadecimal numbers to decimal …
1) Based on the classes that we created in lecture named Node and LinkedList (wh
1) Based on the classes that we created in lecture named Node and LinkedList (which we used to make a one-directional linked list) create a method called find which will return th…
1) Based on the classes that we created in lecture named Node and LinkedList (wh
1) Based on the classes that we created in lecture named Node and LinkedList (which we used to make a one-directional linked list) create a method called find which will return th…
1) Based upon the contents of the BOOKS table, write a query which will retrieve
1) Based upon the contents of the BOOKS table, write a query which will retrieve all books published in 2001. Run the query and include the returned results. 2)Based upon the BOOK…
1) Because Java byte code is the same on all computers, compiled Java programs:
1) Because Java byte code is the same on all computers, compiled Java programs: A) Must be re-compiled for each different machine it is run on B) Cannot run on Linux systems C) Ar…
1) Because Word is a part of the Office suite, you can analyze data exported fro
1) Because Word is a part of the Office suite, you can analyze data exported from access just as easily in Word as you can in Excel. True False 2) What is …
1) Bug Class Construct a user-defined object class named Bug that models a bug m
1) Bug Class Construct a user-defined object class named Bug that models a bug moving along a horizontal line. The bug moves either to the right or left. Initially, the bug moves …
1) Build a method which reads 3 integers from the console and returns them as an
1) Build a method which reads 3 integers from the console and returns them as an int array (type a number, then hit enter, 3 times). 2) Call this method twice to store 2 local int…
1) Calculate the angular velocity of a clock\'s second hand. State in r a d / s
1) Calculate the angular velocity of a clock's second hand. State in rad/s. 2) Calculate the angular velocity of a clock's minute hand. 3) Calculate the angular velocity of a cloc…
1) Can a company like Microsoft prevent its products getting used without a vali
1) Can a company like Microsoft prevent its products getting used without a valid license where either they get shared or where I’ve seen registry hacks or even sharing of a VM wi…
1) Can someone give me a recursive algorithm that searches a tree(NOT BINARY) an
1) Can someone give me a recursive algorithm that searches a tree(NOT BINARY) and determines if it contains an element(int). You are given the root node and an int value to search…
1) Charles Mingus\' solo often: A) none of the above B) follow a walking bass ac
1) Charles Mingus' solo often: A) none of the above B) follow a walking bass accompaniment C) break the flow of the music using stops and changes mid-performance D) keep regular t…
1) Check to see if the database exists first and if so, DROP the database. 2) Cr
1) Check to see if the database exists first and if so, DROP the database. 2) Create the database (defining the size as 10MB, maxsize as 10MB, location as c:stage, and file name a…
1) Choose four different companies (Amazon, Youtube. facebook, Yahoo, Google) an
1) Choose four different companies (Amazon, Youtube. facebook, Yahoo, Google) and find out what database systems do they use. See if it is one single database system or a combinat…
1) Choose one disadvantage of RIP routing. Explain the disadvantage, and then ex
1) Choose one disadvantage of RIP routing. Explain the disadvantage, and then explain why OSPF does not have that disadvantage. 2) For each item below, indicate whether it applies…
1) Class grades -Write a program that performs the following: #include
1) Class grades-Write a program that performs the following: #include <iostream> #include <ctime> #include <cstdlib> #include <cmath> using namespace …
1) Classification performance is often measured with the following metrics: Accu
1) Classification performance is often measured with the following metrics: Accuracy, Precision, Recall and F-measure. Match theses metrics to the application domain below (one fo…
1) Classify each of the following statements as true or false: a. An application
1) Classify each of the following statements as true or false: a. An application can contain a race condition only if the computer system servicing the application contains more t…
1) Closeness centrality. Consider an undirected tree of n vertices. A particular
1) Closeness centrality. Consider an undirected tree of n vertices. A particular edge joins vertices 1 and 2 and divides the tree into two disjoint regions of n1 and n2 vertices r…
1) Cloud Structure resembles data center architecture. Describe the similarities
1) Cloud Structure resembles data center architecture. Describe the similarities.? 2) Describe the layering system for cloud stack? 3) which type of storage requires persistance d…
1) Coding follows and depends on physical design; however, coding might force th
1) Coding follows and depends on physical design; however, coding might force the physical design to change if ________. A) the analysis is flawed B) certain design concepts are d…
1) Collections method sort that accepts a List as an argument sorts the elements
1) Collections method sort that accepts a List as an argument sorts the elements of a List, which must implement the __________ interface. 2) Comparator method compare should retu…
1) Compare/contrast structured vs. unstructured decisions including which manage
1) Compare/contrast structured vs. unstructured decisions including which management level uses each. List the four stages of decision making that are required for all decision ma…
1) Complete the code for the calcPower recursive function shown below, which is
1) Complete the code for the calcPower recursive function shown below, which is intended to raise the base number passed into the function to the exponent power passed into the fu…
Subject
Web development and programming
Use Browse or pick another subject.