Web development and programming
191828 questions • Page 161 / 3837
1) If a class having dynamically allocated members were missing a destructor, wh
1) If a class having dynamically allocated members were missing a destructor, what possible problem(s) could arise? A) anarchy B) an infinite loop C) dangling pointer issues D) do…
1) If an address bus for a given computer has 20 lines, what is the maximum amou
1) If an address bus for a given computer has 20 lines, what is the maximum amount of memory it can access? 2) Name the 16-bit data (general) registers in the 8086/8088 microproce…
1) If an exception is not caught, a program will _____________________ . a) Not
1) If an exception is not caught, a program will _____________________ . a) Not compile b) Terminate abnormally c) Print a message and continue executing d) All of…
1) If architectural enhancement A speeds up 29% of the executed instructions by
1) If architectural enhancement A speeds up 29% of the executed instructions by 3 cycles and architectural enhancement B speeds up 44% of the executed instructions by 2 cycles, wh…
1) If the English word begins with aconsonant, then the first letter is placed a
1) If the English word begins with aconsonant, then the first letter is placed at the end of the word and the suffix "ay" is appended. 2) If the English word begins with a…
1) If you create a form based on a table with a lookup field, the lookup field b
1) If you create a form based on a table with a lookup field, the lookup field becomes a Combo Box control on the new form. True False 2) Match the followi…
1) If you pass the values 100 and .00224 to the calculateTax function, what valu
1) If you pass the values 100 and .00224 to the calculateTax function, what value will be returned? var calculateTax = function ( subtotal, taxRate ) { var tax = subtotal * taxRat…
1) Imagine you are a part of a team that is tasked with writing a mobile applica
1) Imagine you are a part of a team that is tasked with writing a mobile application (app) that will allow users to send pictures to their friends. The manager does not want to wa…
1) Implement -r 2) use a ring buffer (thereby avoiding any buffer overflow issue
1) Implement -r 2) use a ring buffer (thereby avoiding any buffer overflow issues) 3) use only pointer notation (avoid a[i] notation) Write a C program that will read data one cha…
1) Implement -r 2) use a ring buffer (thereby avoiding any buffer overflow issue
1) Implement -r 2) use a ring buffer (thereby avoiding any buffer overflow issues) 3) use only pointer notation (avoid a[i] notation) Write a C program that will read data one cha…
1) Implement a class Purse. A purse contains a collection of coins. For simplici
1) Implement a class Purse. A purse contains a collection of coins. For simplicity, we will only store the coin names in an ArrayList. Supply a method void addCoin(String coinName…
1) Implement a counting semaphore using binary semaphores. Hint: Use two binary
1) Implement a counting semaphore using binary semaphores. Hint: Use two binary semaphores and an integer variable: use the integer variable as the integer variable in the countin…
1) Implement the Counting Sort algorithm using your favorite programming languag
1) Implement the Counting Sort algorithm using your favorite programming language. a) Upon running, your program should prompt the user for the input array size b) Then your progr…
1) Implement the Hash Table using a DOUBLE HASHING method, instead of linear pro
1) Implement the Hash Table using a DOUBLE HASHING method, instead of linear probing. 2) To test your implementation you will write a driver program and create a set of objects to…
1) Implement the portions of Node and List that we have covered in class. Both c
1) Implement the portions of Node and List that we have covered in class. Both classes should be in YOUR personal package we used for Die. The APls for both are shown below: Node …
1) In C++, a legal identifiers may contain these kinds of characters ___________
1) In C++, a legal identifiers may contain these kinds of characters _______________, ______________, ______________ 2) Pick the C++ keywords out of the following list. a) while b…
1) In SQL I am trying to Create a view. I will give you my script first then the
1) In SQL I am trying to Create a view. I will give you my script first then the instructions. CREATE DATABASE Computer_Inventory_System CREATE TABLE Brands ( BrandKey int IDEN…
1) In a C program (test.c), the main is declared as follows int main(int argc, c
1) In a C program (test.c), the main is declared as follows int main(int argc, char **argv) After compilation, when I run my program in the terminal like th…
1) In a certain region, the electric field along the x axis is given by E=ax+b,
1) In a certain region, the electric field along the x axis is given by E=ax+b, where a= 40 V/m^2 and b= 4 V/m. The potential difference between the origin and x= 0.5m is...? The …
1) In a little endian memory system, assume the word 0xFFAABBCC is stored in mem
1) In a little endian memory system, assume the word 0xFFAABBCC is stored in memory address 0xFFFF0000. Then the byte at address 0xFFFF0002 is 0xAA TRUE FALSE Cyclic scheduling is…
1) In a three-tier architecture, operations relating to user interaction with th
1) In a three-tier architecture, operations relating to user interaction with the application are placed in the _____ tier. presentation business rules data It depends on the appl…
1) In addition to email, calendars, contacts, task lists, and notes, the Outlook
1) In addition to email, calendars, contacts, task lists, and notes, the Outlook and Outlook Web App clients provide access to ___________________. (Select 1)(1pts) corporate poli…
1) In addition to email, calendars, contacts, task lists, and notes, the Outlook
1) In addition to email, calendars, contacts, task lists, and notes, the Outlook and Outlook Web App clients provide access to ___________________. (Select 1)(1pts) corporate poli…
1) In an array-based implementation of a stack, which end of the contents of the
1) In an array-based implementation of a stack, which end of the contents of the array represents the bottom of the stack and why? 2) What is wrong with the java.util.Stack implem…
1) In data transmissions over long distances, what dominates the time it takes f
1) In data transmissions over long distances, what dominates the time it takes for a recipient to fully receive a message for a. very small messages (what and why)? b. very large …
1) In main() function you ask a user to enter some positive number. If a number
1) In main() function you ask a user to enter some positive number. If a number is not positive you terminate the program. 2) Otherwise you call a separate function from main() th…
1) In main(), the program should prompt the user for an integernumber 2) You wil
1) In main(), the program should prompt the user for an integernumber 2) You will create a function called double calcPi(int n) which will calculate PI using the taylor series to …
1) In modern packet-switched networks, including the Internet, the source host s
1) In modern packet-switched networks, including the Internet, the source host segments long application-layer messages (for example, an image or a music file) into smaller packet…
1) In reviewing current help wanted advertising in the papers, online, word of m
1) In reviewing current help wanted advertising in the papers, online, word of mouth, and other sources, what do you feel are the most desirable RDBMSs to have experience with for…
1) In terms of DMA (Direct Memory Access), which of the following statements is
1) In terms of DMA (Direct Memory Access), which of the following statements is TRUE? (Chapter 1) A. it is implemented only in real-time operating systems B. it can only be used t…
1) In the Pentium processor, after an instruction is fetched, the Program Counte
1) In the Pentium processor, after an instruction is fetched, the Program Counter (PC) is incremented by 4 bytes to the next instruction address.(True/false) 2) A word in memory …
1) In the RC circuit shown below, the capacitor is fully uncharged. tClose 0 100
1) In the RC circuit shown below, the capacitor is fully uncharged. tClose 0 1002 5V CT 20uF After the switch is closed at point 2, the voltage at the capacitor, vc, at the transi…
1) In the Transmission Control Protocol, what happens to bytes not acknowledged
1) In the Transmission Control Protocol, what happens to bytes not acknowledged within a specified time period? They are dropped They are retransmitted An ICMP host unreachable me…
1) In the Windows server environment, you will create two separate scripts withi
1) In the Windows server environment, you will create two separate scripts within PowerShell that will perform two types of backups of a given source directory and store the backe…
1) In the context of the Critter example described in class, consider the follow
1) In the context of the Critter example described in class, consider the following code snippets, and answer the following questions. a. Does the code compile? If not, explain wh…
1) In the dual-pass ring termination algorithm, the token is colored black when
1) In the dual-pass ring termination algorithm, the token is colored black when A. it is passed on by a black process B. it is passed on by a white process C. it has reached the f…
1) In the figure, a spring with spring constant k = 170 N/m is at the top of a f
1) In the figure, a spring with spring constant k = 170 N/m is at the top of a frictionless incline of angle = 31°. The lower end of the incline is distance D = 1.1 m from the end…
1) In the pseudocode below: What will the final value of counter be? 2) In the p
1) In the pseudocode below: What will the final value of counter be? 2) In the pseudocode below: How many times will the statement counter = counter + 1 be executed? 3) True or Fa…
1) In this lab, you will write generic DoublyLinkedListE> class. DoublyLinkedLis
1) In this lab, you will write generic DoublyLinkedListE> class. DoublyLinkedList will contain DoublyNode objects which is given for you in piazza. The class will contain the m…
1) In what ways is the Zara model counterintuitive? In what ways has Zara\'s mod
1) In what ways is the Zara model counterintuitive? In what ways has Zara's model made the firm a better performer than Gap and other competitors? 2) What do you believe are the m…
1) Indicate which one of the following is the function prototype, the function c
1) Indicate which one of the following is the function prototype, the function call, and the function header: shownum(double num) int shownum(double); shownum(45.67); 2) What is t…
1) Inheritance: You must determine what (if anything) should be abstract, what s
1) Inheritance: You must determine what (if anything) should be abstract, what should be inherited, and what should be overridden a) Create class Shape. The class should have a va…
1) Inheritance: You must determine what (if anything) should be abstract, what s
1) Inheritance: You must determine what (if anything) should be abstract, what should be inherited, and what should be overridden a) Create class Shape. The class should have a va…
1) Integer multiplication can be defined as: mult(m, n) = {m for n = 1 {m + mult
1) Integer multiplication can be defined as: mult(m, n) = {m for n = 1 {m + mult( m,n - 1) for n > 1 Write the recursive function that multiplies integers using this equation. …
1) Is sharing disk to a server networks the same as sharing in the cloud 2) What
1) Is sharing disk to a server networks the same as sharing in the cloud 2) What command would you use to see a shadow file on a linux os 3) Are there any services that use Remote…
1) Jay\'s Bikes is a fam owned and operated business that stocks a wide range of
1) Jay's Bikes is a fam owned and operated business that stocks a wide range of bikes designed to fit the needs of professional riders, your child's first bike, and everything in …
1) Jermaine and Monica are in a really great band. They would really like to pla
1) Jermaine and Monica are in a really great band. They would really like to play more shows and get more people to listen to their music. The problem is that they live in a small…
1) Joe removes the \"Loop\" interaction frame from the scenario, saying it only
1) Joe removes the "Loop" interaction frame from the scenario, saying it only makes the SSD confusing. 2) Joe expands the SSD to include the cases when makePayment happens via cas…
1) LIST THE OUTPUT POR THE PROGRAM BELOw class A public int vi-1 public static i
1) LIST THE OUTPUT POR THE PROGRAM BELOw class A public int vi-1 public static int v2 2 public int v3 -3 public int fl(int v) int v3 v2V3 +2 viv2+ v3; return (v2) public int f2(in…
1) Larry peakgreen wants to store information for his landscaping service. Larry
1) Larry peakgreen wants to store information for his landscaping service. Larry needs to track the common and latin names for each plant. Also, he wants to store standard wholesa…
Subject
Web development and programming
Use Browse or pick another subject.