Web development and programming
191828 questions • Page 162 / 3837
1) Left uncaught, a thrown exception will cause a compile error in Visual Studio
1) Left uncaught, a thrown exception will cause a compile error in Visual Studio. Select one: a. FALSE b. TRUE 2) Only a pointer variable can be set to have the value NULL. Select…
1) Let color be the following structure: struct color { int red; int green; int
1) Let color be the following structure: struct color { int red; int green; int blue; } write function for f-i. f) void reset(struct color *p) Reset the red, green an…
1) Let p and q be the propositions p: You drive over 65 miles per hour. q: You g
1) Let p and q be the propositions p: You drive over 65 miles per hour. q: You get a speeding ticket. Write each of the following propositions using p and q and logical connective…
1) Let p, q, and r be the propositions p: Phyllis goes out for a walk. q: The mo
1) Let p, q, and r be the propositions p: Phyllis goes out for a walk. q: The moon is out. r: It is raining. Express each of these propositions as an English sentence. (a) ¬r q. (…
1) License plates in the great state of Utah consist of 2 letters and 4 digits.
1) License plates in the great state of Utah consist of 2 letters and 4 digits. Both digits and letters can repeat and the order in which the digits and letters matter. Thus, AA11…
1) List all of the function arguments in this program 2) List all of the functio
1) List all of the function arguments in this program 2) List all of the function parameters in this program 3) List all the variables that are not arguments or parameters. 4) Wha…
1) List all the possible candidate key(s) for the departments table. /2 2) If we
1) List all the possible candidate key(s) for the departments table. /2 2) If we didn’t use a surrogate key for the primary key on the enrollments table, what would you have used …
1) List and describe at least four reasons to acquire and use an IDPS. 2) List a
1) List and describe at least four reasons to acquire and use an IDPS. 2) List and describe the three advantages of NIDPSs. 3) List and describe the four advantages of HIDPSs. 4) …
1) List every member\'s name in the form last name comma first name (for example
1) List every member's name in the form last name comma first name (for example: Smith, Bob) and their telephone number sorted alphabetically by name 2) List the first name, last …
1) List every member\'s name in the form last name comma first name (for example
1) List every member's name in the form last name comma first name (for example: Smith, Bob) and their telephone number sorted alphabetically by name 2) List the first name, last …
1) List the complete reference-source information for where you found the EIA st
1) List the complete reference-source information for where you found the EIA standard resistor value and tolerance information. 2) How was this reference discovered and where? 3)…
1) List the contents of the root directory QA: how many directories are there in
1) List the contents of the root directory QA: how many directories are there in total? QB: how can you tell the difference between files and directories? 2) Print your curr…
1) List the marketing tools that Facebook uses to attract customers. 2) Then mea
1) List the marketing tools that Facebook uses to attract customers. 2) Then measure the effectiveness of these Ads by using the 5 stages of the social marketing model figure 7.4 …
1) ListBasics.py A) (10 Points) Write a for loop that iterates over a list of nu
1) ListBasics.py A) (10 Points) Write a for loop that iterates over a list of numbers num_list and prints the numbers in the list whose square is divisible by 8. For example, if n…
1) Locality is a key principle in computer architecture and OS design, Explain t
1) Locality is a key principle in computer architecture and OS design, Explain two different types of locality. 2) Explain the following in the context of memory management. a. In…
1) Look at the following code. Which line in ClassA has an error: Line 1 public
1) Look at the following code. Which line in ClassA has an error: Line 1 public interface MyInterface Line 2 { Line 3 public static final int FIELDA = 55; Line 4 publi…
1) Look over the English to Spanish dictionary (engl2span.txt). The first line i
1) Look over the English to Spanish dictionary (engl2span.txt). The first line in the file is a value representing the current number of entries in the dictionary. 2) Look over En…
1) MARIE is a minimalist accumulator architecture that is fully functional. Ther
1) MARIE is a minimalist accumulator architecture that is fully functional. Therefore, it is important to be familiar with it. Name all the registers in MARIE and describe the pur…
1) Make the exit button work. 2) If the \"new\" button is depressed, make the ba
1) Make the exit button work. 2) If the "new" button is depressed, make the background color of the frame change back and forth from blue to green. ===============================…
1) Make the interface Account, it has 2 methods withdraw and dispost that both r
1) Make the interface Account, it has 2 methods withdraw and dispost that both returns a boolean ans both take a parameter of type double ? 2) Make the interface GoldAccount. it h…
1) Malware capable of spreading itself from one computer to another is called a
1) Malware capable of spreading itself from one computer to another is called a ______ a) logic bomb. b) Trojan horse. c) Virus. d) Worm. 2) Two broad categories of transmission m…
1) Manually generate the truth table for even parity function (P) for a 2-bit me
1) Manually generate the truth table for even parity function (P) for a 2-bit message (x, y). Manually derive the algebraic expression for the Boolean function P. Manually minimiz…
1) Many people think that the mastery of a specific programming language (e.g. J
1) Many people think that the mastery of a specific programming language (e.g. Java, C++, Visual Basic and the like is to know syntax of that programming language. However, knowin…
1) Map the definition to the corresponding layer of the OSI model. A. Applicatio
1) Map the definition to the corresponding layer of the OSI model. A. Application Layer 1. Responsible for co-ordinating communication between systems B. Presentation Layer 2. …
1) Match the key terms with their definitions. (15 points) A file folder on a di
1) Match the key terms with their definitions. (15 points) A file folder on a disk in which you store E files Button on the address bar that depicts the Check box feature location…
1) Matrix Problem: For this problem, you are going to implement three functions
1) Matrix Problem: For this problem, you are going to implement three functions called isDiagonal, isUpperTriangular and isLowerTriangular which determine whether the matrix (pass…
1) Modify ListAPI. a) Download “ListAPI.zip” from Moodle and extract the NetBean
1) Modify ListAPI. a) Download “ListAPI.zip” from Moodle and extract the NetBeans project folder “ListAPI” from the archive file. In NetBeans under the Project tab, right click on…
1) Modify a prototype. The following prototype describes a class of type Square.
1) Modify a prototype. The following prototype describes a class of type Square. However, the code may have some bugs. Copy and paste this prototype, and correct any mistakes in t…
1) Modify the C language codes below on the implementation of queues using array
1) Modify the C language codes below on the implementation of queues using arrays with string data rather than int data. You may use char * or char []. 2) Modify the C language co…
1) Modify the DeckOfCards class from lab 8 to use the C++ built in functions ran
1) Modify the DeckOfCards class from lab 8 to use the C++ built in functions rand() and srand(). Put the class definition in a file called DeckOfCards.h and the member function de…
1) Must use COMMAND PROMPT as program I/O 2) The input file CAN NOT BE \"hard co
1) Must use COMMAND PROMPT as program I/O 2) The i…
1) Must use COMMAND PROMPT as program I/O 2) The input file CAN NOT BE \"hard co
1) Must use COMMAND PROMPT as program I/O 2) The input file CAN NOT BE "hard coded i…
1) Must use COMMAND PROMPT as program I/O 2) The input file CAN NOT BE \"hard co
1) Must use COMMAND PROMPT as program I/O …
1) Must use COMMAND PROMPT as program I/O 2) The input file CAN NOT BE \"hard co
1) Must use COMMAND PROMPT as program I/O 2) The input file CAN NOT BE "hard coded in" NOT ALLOWED: fin = fopen("filename.in", "r"); 3) CAN NOT USE fscaf OR fprintf You May Use sc…
1) Must use COMMAND PROMPT as program I/O 2) The input file CAN NOT BE \"hard co
1) Must use COMMAND PROMPT as program I/O …
1) Name the four number bases we use in computer arithmetic. Then, describe the
1) Name the four number bases we use in computer arithmetic. Then, describe the ranges of the valid digits used in each base. 2) Convert 41710 into the other three bases. 3) Conve…
1) Name your program word_numbers.c. Your program should include the following f
1) Name your program word_numbers.c. Your program should include the following function: void convert(char *word, char *numbers); 2) Assume input is no longer than 1000 characters…
1) Nested for-loops are when you have one (or more) additional loops inside of a
1) Nested for-loops are when you have one (or more) additional loops inside of a for- loop. Consider the following MATLAB code for i = [12]; for j 112], fpintfCi is: %d, j is: %di…
1) New : Byclicking on that button, another window will be open, and yourpreviou
1) New: Byclicking on that button, another window will be open, and yourprevious work will be discarded. 2) Save:Will open a dialog box where you choose where to save yo…
1) Normally variables are placed on the ( stack / heap ) by the compiler. Dynami
1) Normally variables are placed on the ( stack / heap ) by the compiler. Dynamic variables are instead placed on the ( stack / heap ) by the a…
1) Nvidia’s Volta GV100 GPU reportedly contains 21 billion transistors. Assume t
1) Nvidia’s Volta GV100 GPU reportedly contains 21 billion transistors. Assume the die contains the same number of transistors on each axis X and Y; it doesn’t but it makes the ca…
1) Object-oriented languages like Java are designed to make it easy for programm
1) Object-oriented languages like Java are designed to make it easy for programmers to implement software versions of real-world objects. In learning Java, an important skill to m…
1) Objective : Build a c++ program to solve a problem using linked list OR linea
1) Objective : Build a c++ program to solve a problem using linked list OR linear list. The program shall have all basic list operations including searching and sorting. 2) Instru…
1) Objective : Build a c++ program to solve a problem using linked list OR linea
1) Objective : Build a c++ program to solve a problem using linked list OR linear list. The program shall have all basic list operations including searching and sorting. 2) Instru…
1) Often the front end database file is stored on a server for increased securit
1) Often the front end database file is stored on a server for increased security. True or False? 2) Which of the following is not a type of analysis result given by the Performan…
1) On lines 29 to 33 of main.cpp, why is there an ‘&’ before the player variable
1) On lines 29 to 33 of main.cpp, why is there an ‘&’ before the player variables? 2) For lines 45 to 49 of main.cpp, why not use a loop? 3) On lines 10, 11 and 52 of player.h…
1) Organization of Multiagent Systems There are different organizational structu
1) Organization of Multiagent Systems There are different organizational structures that could work for teaming-up multiple agents. Classical forms are similar to human organizati…
1) Pam the Programmer wants to write a nice, powerful function that can be used
1) Pam the Programmer wants to write a nice, powerful function that can be used in many different circumstances. She wants to be sure that her function never alters the values of …
1) Partially filled arrays Copy-paste your code from warm-up 3 into a new file a
1) Partially filled arrays Copy-paste your code from warm-up 3 into a new file as a starting point for this problem. Modify your main() function to allow any number of names and h…
1) Peereval Type I Using a Type I query, show students who have done an evaluati
1) Peereval Type I Using a Type I query, show students who have done an evaluation (i.e., has been an evaluator). Show the student's ID and name and the team NAME (not the team ID…
Subject
Web development and programming
Use Browse or pick another subject.