Web development and programming
191828 questions • Page 165 / 3837
1) The integrated development environment (IDE) used to create, edit, and run pr
1) The integrated development environment (IDE) used to create, edit, and run programs in Visual Basic is called _________________________________________________. 2) Buttons, lab…
1) The interface between user programs and the operating systems is about dealin
1) The interface between user programs and the operating systems is about dealing with the abstractions the operating system provides. System calls are available in this interface…
1) The lecture describes two types of events which change the normal flow of con
1) The lecture describes two types of events which change the normal flow of control in the processor. Briefly describe each type of event and explain why each is needed. (Please …
1) The major advantage of hashed data structures is _________________________ 2)
1) The major advantage of hashed data structures is _________________________ 2) In a non-perfect hashed structure, every key is mapped into a unique index into the array, True or…
1) The output format is correct in CookingCalculations program, but the calculat
1) The output format is correct in CookingCalculations program, but the calculations are not. The correct calculations follow the rules below: - There are 16 tablespoons in a cup.…
1) The picture ( located here http://i.imgur.com/vCJsHUv.jpg ) shows an end view
1) The picture ( located here http://i.imgur.com/vCJsHUv.jpg ) shows an end view of a loop conducting a current whose direction is shown. The magnetic field at the loop's center p…
1) The primary form of data in MATLAB is vectors. They can be one-dimensional (i
1) The primary form of data in MATLAB is vectors. They can be one-dimensional (i.e., vectors), or two-dimensional (i.e., matrices). a) Write the MATLAB code to create a 1x3 vector…
1) The sales team of Sand Shell Inc. consists of six persons who use the e-mail
1) The sales team of Sand Shell Inc. consists of six persons who use the e-mail service extensively for their communication with clients. One of the salespersons Bob is going on a…
1) The service and functions provided by an operating system can be divided into
1) The service and functions provided by an operating system can be divided into two main categories. Briefly describes the two categories and discuss how they differ. - 2) Explai…
1) The size of the head is equal to the gap size between tracks to help read/wri
1) The size of the head is equal to the gap size between tracks to help read/write. [ ] 2) The time it takes to read the tracks closer to the center of the disk is lesser than the…
1) The solution for many vulnerabilities is proper encoding of user supplied dat
1) The solution for many vulnerabilities is proper encoding of user supplied data. Compare and contrast early (i.e. as it is stored in the database) vs. late (i.e. as the data is …
1) The statement: loop += count--; has the same effect as the statements: count
1) The statement: loop += count--; has the same effect as the statements: count = count+1; loop = loop - count; Select one: a. TRUE b. FALSE 2) Due to the way computers represent …
1) There are three parts to this question: a. Why is important to perform softwa
1) There are three parts to this question: a. Why is important to perform software requirements analysis and capture? b. What are some of the advantages of doing requirements well…
1) There is a tree in the box at the top of this section. What is the order of n
1) There is a tree in the box at the top of this section. What is the order of nodes visited using a pre-order traversal? A. 1 2 3 7 10 11 14 30 40 B. 1 2 3 14 7 10 11 40 30 C. 1 …
1) This is for C++ and I\'m not sure if what I did was correct and also need hel
1) This is for C++ and I'm not sure if what I did was correct and also need help with the programming itself. C++ only. //*********************************************************…
1) This program described below is a part of a simple queue program. Write your
1) This program described below is a part of a simple queue program. Write your own custom_clearQueue', 'custom_enqueue, and 'custom dequeue' to make the program work (You can add…
1) Three sets are represented with three integer vectors A, B and C. The followi
1) Three sets are represented with three integer vectors A, B and C. The following algorithm calculates three-way set disjointness. In easier terms the problem is to determine if …
1) Three sets are represented with three integer vectors A, B and C. The followi
1) Three sets are represented with three integer vectors A, B and C. The following algorithm calculates three-way set disjointness. In easier terms the problem is to determine if …
1) Three sets are represented with three integer vectors A, B and C. The followi
1) Three sets are represented with three integer vectors A, B and C. The following algorithm calculates three-way set disjointness. In easier terms the problem is to determine if …
1) To class DoublyLinkedList , add method reverse which reverse the order of the
1) To class DoublyLinkedList, add method reverse which reverse the order of the elements in the list. 2) Our implementation of a doubly list relies on two sentinel nodes, header a…
1) To create an animated image, you use a. a JPEG file b. a PNG file c. a GIF fi
1) To create an animated image, you use a. a JPEG file b. a PNG file c. a GIF file d. a GIF file that contains frames 2) The HTML5 figure element is typically used as a container …
1) Today, the overwhelming world leader in microprocessor sales is: A) Intel . B
1) Today, the overwhelming world leader in microprocessor sales is: A) Intel. B) Microsoft. C) Motorola. D) Digital Equipment Corporation (DEC). 2) Which of the following is not a…
1) Trace the action of the algorithm with the following input: -65 -71 -86 -58 -
1) Trace the action of the algorithm with the following input: -65 -71 -86 -58 -60 -99 2)How many comparisons does it make? How many swaps in the array? How much space does it tak…
1) Translate the following C function abs() into MIPS assembly procedure. You mu
1) Translate the following C function abs() into MIPS assembly procedure. You must minimize the number of registers used by your MIPS procedure: use the $s0 register to hold any t…
1) True and false questions: For each of the following statements explain under
1) True and false questions: For each of the following statements explain under what conditions they are true and under what conditions they are false. a) If two processors implem…
1) Two common versions of PICe exist currently: PCIe gen2 and PCIe gen3. One of
1) Two common versions of PICe exist currently: PCIe gen2 and PCIe gen3. One of the differences is that gen 2 uses 8b10b encoding while gen 3 uses 128b130b encoding. Recall that t…
1) Two nodes x and y are the only nodes in a network that uses slotted ALOHA for
1) Two nodes x and y are the only nodes in a network that uses slotted ALOHA for medium access. Node’s x retransmission probability is px and it is greater than node’s y retransmi…
1) Type in the following C program which prints the size of a “char” type, but d
1) Type in the following C program which prints the size of a “char” type, but duplicate the printf() line multiple times, changing it so it also prints the size of types: unsigne…
1) USB 3.0. What are some of the improvements to USB 3.0? Find some devices that
1) USB 3.0. What are some of the improvements to USB 3.0? Find some devices that will benefit greatly from those improvements (that is to say, if you are going to buy that device,…
1) Under your home directory create 3 subdirectories named Unix, Assignments, Ex
1) Under your home directory create 3 subdirectories named Unix, Assignments, Exams 2) Change to directory Unix ( what is the command?) 3) Make 2 subdirectories under directory Un…
1) Use MATLAB “tu search\" to design a helical compression spring for a coil-ove
1) Use MATLAB “tu search" to design a helical compression spring for a coil-over shock absorber in a small unmanned ground vehicle (UGV) based on the following specifications. You…
1) Use a one dimensional array to solve thefollowing problem: A company pays its
1) Use a one dimensional array to solve thefollowing problem: A company pays its salespeople on a commissionbasis. The salespeople receive $200 per week plus 9% of their grosss…
1) Use a two dimensional array tosolve the following problem: A company has four
1) Use a two dimensional array tosolve the following problem: A company has four salespeople (1to 4)who sell five different products (1to 5). Once a day, eachsalesperson pass…
1) Use joining technique (WHERE commands is preferred[1]) to write a SQL query t
1) Use joining technique (WHERE commands is preferred[1]) to write a SQL query to display customer ID, customer name, and customer address for all the customers who are doing busi…
1) Use the documentation links provided to answer the following questions: nthro
1) Use the documentation links provided to answer the following questions: nthroot documentation: http://www.mathworks.com/help/matlab/ref/nthroot.html length document…
1) Use the documentation links provided to answer the following questions: nthro
1) Use the documentation links provided to answer the following questions: nthroot documentation: http://www.mathworks.com/help/matlab/ref/nthroot.html length documentation: http:…
1) Use the documentation links provided to answer the following questions: nthro
1) Use the documentation links provided to answer the following questions: nthroot documentation: http://www.mathworks.com/help/matlab/ref/nthroot.html length documentation: http:…
1) Use the implementation of Sorted linked list we used in class(SortLinkLst.h)
1) Use the implementation of Sorted linked list we used in class(SortLinkLst.h) and make the following changes. When we implemented, the items were being included in ascending ord…
1) Use the spark ’s csv reader to read the csv files with the columns names set
1) Use the spark ’s csv reader to read the csv files with the columns names set correctly, all “ ? ” replaced with null and correct datatype detected for each column. Q1. W hat wa…
1) Users and applications generally interact with the ________. basic file syste
1) Users and applications generally interact with the ________. basic file system file device drivers file organization module logical file system 2) Advantages of a virtual file …
1) Users are notorious for forgetting their passwords. In any helpdesk situation
1) Users are notorious for forgetting their passwords. In any helpdesk situation, the vast majority of cases are password resets. Users are also careless with their passwords and …
1) Using Task Manager, you discover an unwanted program that is launched at star
1) Using Task Manager, you discover an unwanted program that is launched at startup. Of the following items, CIRCLE the one(s) that might lead you to the permanent solution t…
1) Using Task Manager, you discover an unwanted program that is launched at star
1) Using Task Manager, you discover an unwanted program that is launched at startup. Of the following items, CIRCLE the one(s) that might lead you to the permanent solution t…
1) Using a set of values from 0 to 10, perform the following unions using union-
1) Using a set of values from 0 to 10, perform the following unions using union-by-size. Show the result of each union. When sizes are the same, make the second tree be a child of…
1) Using an appropriate definition of listnode, design a simple linked list clas
1)Using an appropriate definition of listnode, design a simple linked list class with only two member function and a defult constructor: void add(double x) boolean isMumber(double…
1) Using any programming language of your choice implement the Key Generation pr
1) Using any programming language of your choice implement the Key Generation procedure of the RSA algorithm 2) Specifications: The program should take two inputs, non-negative in…
1) Using any programming language of your choice implement the Rail Fence Cipher
1) Using any programming language of your choice implement the Rail Fence Cipher encryption algorithm 2) Specifications: The program should take two inputs 1) Message n 2) The key…
1) Using c++, write a void function named insertAtFront, that takes two paramete
1) Using c++, write a void function named insertAtFront, that takes two parameters: a vector of integers and an integer value, then insert the integer value from the second parame…
1) Using multiple access points can accomplish which of the following? 1) ______
1) Using multiple access points can accomplish which of the following? 1) _______ A) Decrease broadcast domains B) Minimize IP conflicts C) Extend the range for wireless conne…
1) Using multiple access points can accomplish which of the following? 1) ______
1) Using multiple access points can accomplish which of the following? 1) _______ A) Decrease broadcast domains B) Minimize IP conflicts C) Extend the range for wireless connec…
Subject
Web development and programming
Use Browse or pick another subject.