Web development and programming
191828 questions • Page 160 / 3837
1) For each of the following, state whether or not the address given is a valid
1) For each of the following, state whether or not the address given is a valid MAC address. If it is not a valid MAC address, explain in one sentence why not. A. 24.17.232.7B.55 …
1) For the SQL INSERT command, the keyword require single quotes around items fo
1) For the SQL INSERT command, the keyword require single quotes around items for har columns, but not around items for Integer columns. (2) 2) The SQL command used to add new dat…
1) For the following computing units: {bit, byte, KB, MB, GB, TB, MHz, GHz, RPM,
1) For the following computing units: {bit, byte, KB, MB, GB, TB, MHz, GHz, RPM, bps} find one information quantity that is quantified/measured by each one. 2)For a given CPU, the…
1) For the function xb Vba-ac , what are the conditions needed sox is a real num
1) For the function xb Vba-ac , what are the conditions needed sox is a real number ? (Note: 1) 2a not a C code) A) a 0, b2-4ac20 D) a 0,b2-4ac>0 2) What is the output of the f…
1) For this homework, use the following conventions. Definition of Natural Numbe
1) For this homework, use the following conventions. Definition of Natural Numbers: the set of natural numbers is the set of non-negative integers, denoted N. That is, N = {0, 1, …
1) For this problem, assume the ADC on the Arduino is using its internal 1.1 vol
1) For this problem, assume the ADC on the Arduino is using its internal 1.1 volt reference. What is the value that the ADC will return for each to the following input voltages. (…
1) From the /etc/passwd file, provide user ID of root, its home directory, and t
1) From the /etc/passwd file, provide user ID of root, its home directory, and the initial program the system runs for root 2) The /etc/passwd file contains login names used by th…
1) From the C# code shown below identify each Ellipse ( Ellipse lite1, Ellipse l
1) From the C# code shown below identify each Ellipse ( Ellipse lite1, Ellipse lite2, Ellipse lite3) variable scope level. The format of your answer should be: lite1 (scope type),…
1) General Description Create a new class called “XLinkedList”. This class defin
1) General Description Create a new class called “XLinkedList”. This class defines an inner (private) class “Node” as the container for the “T obj” data. The main idea is to recod…
1) Genereate a power plant output (random number from 500 to 1000) in megawattso
1) Genereate a power plant output (random number from 500 to 1000) in megawattsover a periods of 10 weeks. Each rows of the data contains 7 floating- point numbers that reperesent…
1) Give Reason ( Algorithms for Finite Automata and whether polynomial or expone
1) Give Reason ( Algorithms for Finite Automata and whether polynomial or exponential, if not given in question, and why ? ) a) There is an exponential algorithm which, given a no…
1) Give an example of an attribute (or set of attributes) that you can deduce is
1) Give an example of an attribute (or set of attributes) that you can deduce is not a candidate key, based on this instance being legal. 2) Is there any example of an attribute (…
1) Give an example of and describe an application that would require sequential
1) Give an example of and describe an application that would require sequential access in: a- The university environment, b-The insurance company environment, c-The furniture stor…
1) Give declarations of operator functions for each of the following ways to ove
1) Give declarations of operator functions for each of the following ways to overload operator + you must state where the declaration goes, whether within the class in the public …
1) Give the accessing formula for addr(A[ I ][ J ][ K ]) if A is declared in C++
1) Give the accessing formula for addr(A[ I ][ J ][ K ]) if A is declared in C++ by: typex A[ m ][ n ][ p ]; 2) Assume C++ uses column-major storage instead of row-major. Give the…
1) Given a Scanner reference variable named input that has been associated with
1) Given a Scanner reference variable named input that has been associated with an input source consisting of a sequence of lines of text and an int variable named count, write th…
1) Given a variable , election_results, that is associated with a dictionary tha
1) Given a variable , election_results, that is associated with a dictionary that maps candidate names to votes received, associate the name of the candidate with the most votes w…
1) Given a virtual memory system with: virtual address 36 bits physical address
1) Given a virtual memory system with: virtual address 36 bits physical address 32 bits 32KB pages (15 bit page offset) Each page table entry has bits for valid, execute, read and…
1) Given already-defined and initialized int variables: 2D array miles, MILES_NU
1) Given already-defined and initialized int variables: 2D array miles, MILES_NUM_ROWS, MILES_NUM_COLS, i, and j. Write nested loops that assign maxMiles and minMiles with the arr…
1) Given the file in C, create a new while (1) loop to contain a clear LCD follo
1) Given the file in C, create a new while (1) loop to contain a clear LCD followed by a for loop to print all the ASCII characters from 33 to 123. There should be exactly 0.20 se…
1) Given the following class diagram, write statements to answer the following q
1)Given the following class diagram, write statements to answer the following questions. (6 points) Vehicle: -numOfWheels : int -maxSpeed : double +getNumOfWheels(): int +getMaxSp…
1) Given the following code, write a conditional logic statement that that evalu
1) Given the following code, write a conditional logic statement that that evaluates to true if userInput is on [24, 36] and also odd. #include <iostream> using namespace st…
1) Given the following declarations: char someString[30] = \"Whats up?\"; int in
1) Given the following declarations: char someString[30] = "Whats up?"; int intArray[5] = {2, 4, 6, 8, 10}; Write an output statement that displays the question mark from someStri…
1) Given the following initial values: boolean flag1 = true, flag2 = false; int
1) Given the following initial values: boolean flag1 = true, flag2 = false; int num1 = 5, num2 = 25; What would the following test condition evalua…
1) Global questions about the final exam. Examples: Am I going to pass the exam
1) Global questions about the final exam. Examples: Am I going to pass the exam based on my readiness? What questions will be on the final exam? Or better what are the main concep…
1) Grades with input validation (C++). Modify grade programs with arrays and fun
1) Grades with input validation (C++). Modify grade programs with arrays and functions. (the program should minimally have functions for average, min, max, # above average, etc. t…
1) Greatest Common Divisor The greatest common divisor (GCD) of two integers a a
1) Greatest Common Divisor The greatest common divisor (GCD) of two integers a and b is the largest positive integer that divides both a and b. The Euclidean algorithm for finding…
1) Hardware includes electronic components used to input, process, output, and s
1) Hardware includes electronic components used to input, process, output, and store data. 2) A megabyte, or MB, is 1,024 bytes. 3) Native applications are programs that are writt…
1) Hate speech is not covered by the first amendment, but acts of provocative pr
1) Hate speech is not covered by the first amendment, but acts of provocative protest, such as burning the American flag or the Koran are. Where should we draw the line in prohibi…
1) Heap Operation This question is designed to help you get a better understandi
1) Heap Operation This question is designed to help you get a better understanding of basic heap operations. You will be given queries of types: "1 v " - Add an element to the h…
1) How can you implement mutex variables? Please give the pseudo code 2) Suppose
1) How can you implement mutex variables? Please give the pseudo code 2) Suppose there are four pprocess A, B, C, and Dwhich arrive at 10, 10, 130, 250 msec respectively. The leng…
1) How do you compare variables in Matlab? Can you compare a scalar to a vector?
1)How do you compare variables in Matlab? Can you compare a scalar to a vector? A vector to a vector of same dimensions? A vector to a vector of different dimensions? A scalar to …
1) How does multi-factor authentication improve security? A. It denies attacker
1) How does multi-factor authentication improve security? A. It denies attacker multiple times. B. By using biometrics, no other person can authenticate. C. By using a combination…
1) How does the data flow between the CPU and memory? 2) Where is BIOS stored on
1) How does the data flow between the CPU and memory? 2) Where is BIOS stored on early personal computers? What is the disadvantage? 3) List the type of physical memory in the mem…
1) How fast is the mass moving at the bottom of its path? 2) What is the magnitu
1) How fast is the mass moving at the bottom of its path? 2) What is the magnitude of the tension in the string at the bottom of the path? 3) If the maximum tension the string can…
1) How long is the rope? 2) What is the mass? 3) If the maximum mass that can be
1) How long is the rope? 2) What is the mass? 3) If the maximum mass that can be used before the rope breaks is mmax = 1.65 kg, what is the maximum tension the rope can withstand?…
1) How many ASCII characters can be stored in - a byte? - four bytes? 2) How man
1) How many ASCII characters can be stored in - a byte? - four bytes? 2) How many different values can be stored in: (a) a bit? (b) two b…
1) How many students are enrolled in Section 2714 in the first semester of 2008?
1) How many students are enrolled in Section 2714 in the first semester of 2008? 2) Which faculty members have qualified to teach a course since 1993? List the faculty ID, course,…
1) How to keep track of medical expenses when a medical service is rendered is a
1) How to keep track of medical expenses when a medical service is rendered is an example of ________. A) problem domain B) solution domain C) medical domain D) all of the above 2…
1) How would you implement 2-D arrays if C only had 1-D arrays? You can use 1-D
1) How would you implement 2-D arrays if C only had 1-D arrays? You can use 1-D arrays to do this just like C does, so you will need to write some code that does this. 2) write so…
1) How would you implement 2-D arrays if C only had 1-D arrays? You can use 1-D
1) How would you implement 2-D arrays if C only had 1-D arrays? You can use 1-D arrays to do this just like C does, so you will need to write some code that does this. 2) write so…
1) How. mANy addRess lides ase ReguiRed to addRess 2 2)The aumbeRof memoRy chip
1) How. mANy addRess lides ase ReguiRed to addRess 2 2)The aumbeRof memoRy chip is 3 The number of memory celis ina 25%kla memoRy chip is H)How MANY addess lides are ReguiRed FoR …
1) I thought that the equation for complete destructive interference for diffrac
1) I thought that the equation for complete destructive interference for diffraction from a single-slit was d sin?=(m+1/2)?, where m = 0, 1, 2, ... but that was the wrong answer. …
1) I want to clear out a label field called lbFinalCost so that it doesn’t displ
1) I want to clear out a label field called lbFinalCost so that it doesn’t display in my app. I use the following statement: lblFinalCost.Clear() Why won’t this work? How can I cl…
1) IPO Table (using Microsoft Word) 2) Pseudocode (Word) [A working Flowchart cr
1) IPO Table (using Microsoft Word) 2) Pseudocode (Word) [A working Flowchart created using Raptor (Submit the actual Raptor file *Optional* 3) UML Diagram for the Class (Word) Yo…
1) Identify benefits of Iterative development approach A) Risks problems are ide
1) Identify benefits of Iterative development approach A) Risks problems are identified early on B) Quicker time to market C) Since we deploy the system in small iterations, with …
1) Identify from the choices given the nature of the following passages: (a) arg
1) Identify from the choices given the nature of the following passages: (a) argument, (b) loosely associated statements, (c) expository passage, (d) illustration, (e) explanation…
1) Identify the Foreign Keys in each table: NOTE: Primary Keys for each table ar
1) Identify the Foreign Keys in each table: NOTE: Primary Keys for each table are in BOLD LETTERS Employee DEPARTMENT DIVISION NOTE: Primary Keys for each table are in BOLD LETTER…
1) Identify the null hypothesis and the research hypothesis for each of the foll
1) Identify the null hypothesis and the research hypothesis for each of the following statements. A) Class A high school basketball teams who employ a sports psychologist will hav…
1) If Shape is a class and you create a new class Rectangle that extends Shape,
1) If Shape is a class and you create a new class Rectangle that extends Shape, then Shape is a(n) ____ and Rectangle is a(n) ____. Which word goes in the first blank in the sente…
Subject
Web development and programming
Use Browse or pick another subject.