Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 164 / 3837

1) Study the following Program #include #include #include
1) Study the following Program #include <iostream> #include <iomanip> #include <fstream> using namespace std; //Program name: Decoder const int Inverse = 19, Int…
1) Suppose Nodes A and B are on opposite ends of a 1000 meter cable, and they ea
1) Suppose Nodes A and B are on opposite ends of a 1000 meter cable, and they each have one frame of 1,500 bytes (including headers and preamble) to send to each other. Both nodes…
1) Suppose a C/C++ program has been stripped of its debugging symbols before shi
1) Suppose a C/C++ program has been stripped of its debugging symbols before shipment. What will happen when an analyst attempts to attach a debugger to the program during reverse…
1) Suppose relation R(A,B,C) has the tuples: Using bag projection and intersecti
1) Suppose relation R(A,B,C) has the tuples: Using bag projection and intersection, compute PROJA,B(R) INTERSECT RENAMES(A,B)(PROJB,C(R)). Note that the renaming is only to give t…
1) Suppose that str1, str2, and str3 are string variables. i. Write an C stateme
1) Suppose that str1, str2, and str3 are string variables. i. Write an C statement that concatenates str1 and str2, storing the result into str3. (str1 and str2 should not be chan…
1) Suppose that we have three different cache designs available. In all three ca
1) Suppose that we have three different cache designs available. In all three cache designs, the cache lines can each hold a block that is 2^3=8 bytes, and the total number of cac…
1) Suppose there are six routers between a source host and a destination host. I
1) Suppose there are six routers between a source host and a destination host. Ignoring fragmentation, an IP datagram sent from the source host to the destination host will travel…
1) Suppose we have a preexisting Rational class with methods add, subtract, mult
1) Suppose we have a preexisting Rational class with methods add, subtract, multiply and divide. Now we want to build a Complex class with instance variables b and c of type Ratio…
1) Suppose we’ve defined a book class to include a setTitle method with a protot
1) Suppose we’ve defined a book class to include a setTitle method with a prototype: void setTitle(char *); Suppose further we have an instance of the book class named bookOne. De…
1) Suppose you have a circuit that consists of 6 AND gatesm 14 OR gates, and 13
1) Suppose you have a circuit that consists of 6 AND gatesm 14 OR gates, and 13 NOT gates. How many transmitters are being used? a)33 b)53 c)63 d)73 e)83 2)A certain microprocesso…
1) Suppose you have an array of n items (the “member items”) and a separate list
1) Suppose you have an array of n items (the “member items”) and a separate list of k items (the “test items”). The member items are not stored in any particular order. You want t…
1) Suppose you take the number 200, and you do repeated doubling: 200-400-800-16
1) Suppose you take the number 200, and you do repeated doubling: 200-400-800-1600-3200 and so forth. With a start value of 200, you need 4 doubling steps to exceed 2000. Write a …
1) Suppose, you are an intern at Toyota, where your assignment is to design the
1) Suppose, you are an intern at Toyota, where your assignment is to design the Mileage unit for Toyota Prius 2018’s dashboard (Fig. 1). In this task, you will be building a fully…
1) Supposed we have a 1KB direct-mapped data cache with 4 byte blocks. (30 point
1)    Supposed we have a 1KB direct-mapped data cache with 4 byte blocks. (30 points) a.    Show how a 32-bit memory address is divided into tag, index and offset. Show clearly ho…
1) Systems analysis is the first phase of the systems development life cycle. An
1) Systems analysis is the first phase of the systems development life cycle. Answer: T F 2) Requirements structuring is the first activity of the systems planning and selection p…
1) T/F. Different operating systems have different rules for naming files. 2) T/
1) T/F. Different operating systems have different rules for naming files. 2) T/F. fstream objects are only capable of performing file output operations. 3) T/F. ofstream objects,…
1) Test Scores Class Write a class named TestScores. The class constructor shoul
1) Test Scores Class Write a class named TestScores. The class constructor should accept an array of test scores as its argument. The class should have a method that returns the a…
1) The && symbol is called the address-of operator. Select one: True False 2) Yo
1) The && symbol is called the address-of operator. Select one: True False 2) You pass a variable by value when you want the receiving function to change the contents of t…
1) The 32-bit representation of a floating point number in the IEEE 754 standard
1) The 32-bit representation of a floating point number in the IEEE 754 standard is a. in single precision b. in double precision c. as a scientific notation with right 8 bits as …
1) The Accordion widget lets the user display the contents of a panel by clickin
1) The Accordion widget lets the user display the contents of a panel by clicking on (1pts) the panel a link a button the header of the panel 2) To use a plugin, you must code all…
1) The Accordion widget lets the user display the contents of a panel by clickin
1) The Accordion widget lets the user display the contents of a panel by clicking on (1pts) the panel a link a button the header of the panel 2) To use a plugin, you must code all…
1) The Binary search tree ADT is extended to include a boolean method similarTre
1) The Binary search tree ADT is extended to include a boolean method similarTrees that receives references to two binary trees and determines whether the shapes of the trees are …
1) The C++ compiler has a built-in safety mechanism to prevent while blocks from
1) The C++ compiler has a built-in safety mechanism to prevent while blocks from entering an endless loop. True or False? 2) What is the output of this statement? cout << !t…
1) The Counter class doesu\'t have a constrictor. Why doesn\'t it need onc? 2) T
1) The Counter class doesu't have a constrictor. Why doesn't it need onc? 2) The Counter class doesn't have a main. Why doesn't it need o 3) How do we know ModNCounter inhents tro…
1) The Entity-Relationship (E-R) model is _____. E) a diagramming technique that
1) The Entity-Relationship (E-R) model is _____. E) a diagramming technique that relates entities to each other, attributes to each other, and relationships to each other 2) All o…
1) The Memory Management Unit (MMU) restricts the memory access of an applicatio
1) The Memory Management Unit (MMU) restricts the memory access of an application between the base and base + bound addresses. Another policy is to allow the application to access…
1) The Portfolio Management Maturity Model from Jeffery and Leliveld outlines fo
1) The Portfolio Management Maturity Model from Jeffery and Leliveld outlines four stages of maturity for any organization’s IM/IT portfolio management capabilities.What defines t…
1) The User Datagram Protocol (UDP) provides which of the following \"services\"
1) The User Datagram Protocol (UDP) provides which of the following "services" to the user? A) Port addressing B) Duplication Protection C) Sequence Preservation D) Guaranteed Del…
1) The advantage(s) of creating indexes in the database is/are 2) Which of the f
1) The advantage(s) of creating indexes in the database is/are 2) Which of the following statements is true? 3) Which of the following statements is true? 4) Identify the correct …
1) The advantage(s) of creating indexes in the database is/are A) Indexes reduce
1) The advantage(s) of creating indexes in the database is/are A) Indexes reduce time to insert data into the database B) Indexes enhance the presentation of data to the end user …
1) The anonymous function allows us to easily create mathematical functions, and
1) The anonymous function allows us to easily create mathematical functions, and store them in variables. The documentation below provides additional details http://www.mathworks.…
1) The anonymous function allows us to easily create mathematical functions, and
1) The anonymous function allows us to easily create mathematical functions, and store them in variables. The documentation below provides additional details. http://www.mathworks…
1) The array of a non-perfect hashed data structure contains 769 elements. What
1) The array of a non-perfect hashed data structure contains 769 elements. What element does the key 351,956 map into if no preprocessing is performed, and the division hashing fu…
1) The correct order in which an exception is detected and handles is a.try,catc
1) The correct order in which an exception is detected and handles is a.try,catch,throw b.throw,catch,try c.catch,throw,try d.try,throw,catch 2) In order to perform file processin…
1) The digital system usually operated on ………system. (a) binary (b) decimal (c)o
1) The digital system usually operated on ………system. (a) binary (b) decimal (c)octal (d) hexadecimal 2)The First Microprocessor was__________ a) Intel 4004 b) 8080 c) 8085 d) 4008…
1) The dlmwrite functions allows us to easily write matrices to files. dlmwrite
1) The dlmwrite functions allows us to easily write matrices to files. dlmwrite documentation: http://www.mathworks.com/help/matlab/ref/dlmwrite.html a) Assume we have a matrix, M…
1) The drawing shows six point charges arranged in a rectangle. The value of q i
1) The drawing shows six point charges arranged in a rectangle. The value of q is 1.65 ?C, and the distance d is 0.253 m. Find the total electric potential at location P, which is…
1) The file numbers.dat contains random numbers between 0 and 1. Write a program
1) The file numbers.dat contains random numbers between 0 and 1. Write a program that reads all numbers and calculates average, maximum, and minimum of all numbers; it should also…
1) The find method lets you get the children of each selected element that match
1) The find method lets you get the children of each selected element that match the specified selector all of the above get the siblings of each selected element that match the s…
1) The following C/C++ function: void sample(unsigned val1, unsigned val2, char
1) The following C/C++ function: void sample(unsigned val1, unsigned val2, char val3) { unsigned d1=0, d2=5; char d3='x'; ... } is called: sample(9,10,'a'); draw and label the con…
1) The following defines a function that calculates an approximation of the squa
1) The following defines a function that calculates an approximation of the square root of a number, starting with an approximate answer (approx), within the specified tolerance (…
1) The following program is a list of instructions for the Basic Computer in hex
1) The following program is a list of instructions for the Basic Computer in hexadecimal code.  The computer executes the instructions starting from address 100. Show the Symbolic…
1) The following questions are related to Caesar Cipher For the general Caesar a
1) The following questions are related to Caesar Cipher For the general Caesar algorithm C = E(p) = (p + k) mod (26)                         a) What is the decryption algorithm? b…
1) The following shows two threads, Thread A and Thread B, to be run on supersca
1) The following shows two threads, Thread A and Thread B, to be run on superscalar machine with 2 slots. Assume that before the code is run a, b, x and y are 0. Show how each wou…
1) The following shows two threads, Thread A and Thread B, to be run on supersca
1) The following shows two threads, Thread A and Thread B, to be run on superscalar machine with 2 slots. Assume that before the code is run a, b, x and y are 0. Show how each wou…
1) The following shows two threads, Thread A and Thread B, to be run on supersca
1) The following shows two threads, Thread A and Thread B, to be run on superscalar machine with 2 slots. Assume that before the code is run a, b, x and y are 0. Show how each wou…
1) The four (4) main components of a computer system are: Processor: controls th
1) The four (4) main components of a computer system are: Processor: controls the operation of the computer and performs its data processing functions Main memory: stores both dat…
1) The function run_enzyme() needs to be created. Please see the notes inside en
1) The function run_enzyme() needs to be created. Please see the notes inside enzyme.c. _____________________________________________________________________________________ #incl…
1) The greatest common divisor of integers x and y is the largest integer that e
1) The greatest common divisor of integers x and y is the largest integer that evenly divides both x and y. Write a recursive function gcd that returns the greatest common divisor…
1) The importance of a password policy in Windows cannot be overlooked. There ar
1) The importance of a password policy in Windows cannot be overlooked. There are many variables to securing passwords such as minimum and maximum age, complexity, length, and whe…