Web development and programming
191828 questions • Page 166 / 3837
1) Using only two D flip-flops, two full-adders, and additional combinational st
1) Using only two D flip-flops, two full-adders, and additional combinational structures and gates, design the least-significant two bits of a register with the following function…
1) Using the Web, search for at least three tools to automate risk assessment. C
1) Using the Web, search for at least three tools to automate risk assessment. Collect information on automated risk assessment tools. What do they cost? What features do they pro…
1) Using the following image below, create a list of each of the column variable
1) Using the following image below, create a list of each of the column variables that would be created if this would be implemented in a database. Be sure to provide data types a…
1) Using the format painter we may a. copy a font style b. copy a font size c. c
1) Using the format painter we may a. copy a font style b. copy a font size c. copy bulleted or numbered list styles d. all of the above 2) In the font section we may select a. a …
1) Using the subset of X86 assembly language we have seen so far, a) Write the a
1) Using the subset of X86 assembly language we have seen so far, a) Write the assembly language lines that would perform the C++ line of code: a[5] += -65. Assume the following i…
1) Using wildcards, write a generic method that counts the number of even number
1) Using wildcards, write a generic method that counts the number of even numbers in a List. This method should accept Lists with elements that inherit from Integer. 2) Write the …
1) VHDL code for 4-2 priority encoder I have already (here): http://imgur.com/1i
1) VHDL code for 4-2 priority encoder I have already (here): http://imgur.com/1iTh8W5, and http://imgur.com/9dlgG7A What is the testbench VHDL code? (along with simulation if poss…
1) Videos Type I Using a Type I subquery, show which videos were watched during
1) Videos Type I Using a Type I subquery, show which videos were watched during the first week of February if the video is over 10 minutes in length. Show the video's main topic, …
1) Visit the NIST FASP security practices Web site at http://csrc.nist.gov/group
1) Visit the NIST FASP security practices Web site at http://csrc.nist.gov/groups/SMA/fasp/index.html. Review some of the listed FASPs and identify five drawbacks to adopting the …
1) We are asked to add a function Position lowestKey(const Position& v) const to
1) We are asked to add a function Position lowestKey(const Position& v) const to the class SearchTree. Function prototype: Position lowestKey(const Position& v); input arg…
1) We say that in embedded operating systems, if the highest-priority user threa
1) We say that in embedded operating systems, if the highest-priority user thread is executing when a high-priority interrupt occurs, most operating systems will continue to proce…
1) We started this course learning about Microsoft Windows. Conduct a brief sear
1) We started this course learning about Microsoft Windows. Conduct a brief search on reasons why you should keep your Windows software updated and provide a list of those you bel…
1) We will examine how replacement policies impact miss rate. Assume a following
1)We will examine how replacement policies impact miss rate. Assume a following 2way set associative cache. Consider the following block address sequence: 0, 1, 5, 2, 4, 8, 12, 16…
1) What Does The Following Program Print? # include int sum(int number)
1) What Does The Following Program Print? # include<stdio.h> int sum(int number); int main(void) { int x = 3; printf("The sum of all positive integers (<= %d) is %d. ",x,…
1) What Signals through Optical Fiber for specific application? A) ASK B) PSK 2)
1) What Signals through Optical Fiber for specific application? A) ASK B) PSK 2)What is Plesiochronouse System? A) Minor timing variations but keeps the system within acceptable l…
1) What are some of the ways a wireless data connection could be made over a lon
1) What are some of the ways a wireless data connection could be made over a long distance such as 30 miles or more? What are the advantages and disadvantages of each method? 2) W…
1) What are some of the ways that loop execution can be controlled? What are ind
1) What are some of the ways that loop execution can be controlled? What are indefinite loops? 2) Explain the various ways that a variable can be incremented? 3) What is the synta…
1) What are the effects of changing the actual values of some attributes to miss
1) What are the effects of changing the actual values of some attributes to missing values when C4.5 is applied to the data 2) Compare the boosting ensemble learning method with …
1) What are the problems with the “horizontal” and “vertical” solutions to the h
1) What are the problems with the “horizontal” and “vertical” solutions to the handling of multiple relationships as described in the chapter? 2) What expectation should there be …
1) What are the reasons for considering a noSQL database, rather than a relation
1) What are the reasons for considering a noSQL database, rather than a relational database Select or more: a) A database can allow the insertion of data without a predefined sche…
1) What are the three major performance metrics regarding file systems? (2) The
1) What are the three major performance metrics regarding file systems? (2) The boot strap loader in MBR is recoverable when its contents are comupt by some reason (but the MBR se…
1) What do sociologists mean when they describe deviance as being relative? Prov
1) What do sociologists mean when they describe deviance as being relative? Provide an example of a deviant behavior and identify how it is relative. 2) What are deviant places, a…
1) What do the following variables mean? a. $HOME b. $PATH c. $TERM d. $SHELL 2)
1) What do the following variables mean? a. $HOME b. $PATH c. $TERM d. $SHELL 2) What command will search the file /tmp/MCSE for the pattern “MCSE”? (the file exists s…
1) What does int() do? a. Displays a message on screen b. Displays a random numb
1) What does int() do? a. Displays a message on screen b. Displays a random number c. Convert characters to numbers d. A and C e. None of the above 2) In a code statement a named …
1) What does the following function do? double calc ( double data[ ], int size )
1) What does the following function do? double calc ( double data[ ], int size ) { double s = 1; for(int i = 0; i < size; i++) { s *= data[i]; } return(s); } - Returns the prod…
1) What is Math.ceil(3.6)? (1pts) 3.0 3 4.0 5.0 2) What is Math.floor(3.6)? (1pt
1) What is Math.ceil(3.6)? (1pts) 3.0 3 4.0 5.0 2) What is Math.floor(3.6)? (1pts) 3.0 3 4 5.0 3) Math.pow(3, 3) returns _______. (1pts) 27 9 27.0 9.0 4) Math.sqrt(4) returns ____…
1) What is a Compiled and what is and Interpreted language? 2) What are flow cha
1) What is a Compiled and what is and Interpreted language? 2) What are flow charts and why use them? 3) What levels of programming Language would you rather use, and why? 4) What…
1) What is a Java exception and how do you program to handle them? 2) What is th
1) What is a Java exception and how do you program to handle them? 2) What is the difference between the Error class and the Exception class? 3) What is a try-catch block? Can you…
1) What is a security risk of allowing mobile code to execute on a target machin
1) What is a security risk of allowing mobile code to execute on a target machine? The time delay from when it is downloaded and executed could initiate an asynchronous attack. It…
1) What is a security risk of allowing mobile code to execute on a target machin
1) What is a security risk of allowing mobile code to execute on a target machine? The time delay from when it is downloaded and executed could initiate an asynchronous attack. It…
1) What is a security risk of allowing mobile code to execute on a target machin
1) What is a security risk of allowing mobile code to execute on a target machine? A. The time delay from when it is downloaded and executed could initiate an asynchronous attack.…
1) What is a semantic tableau and what is the main advantage of using it to dete
1) What is a semantic tableau and what is the main advantage of using it to determine if a formula is satisfiable? - Theorem 2.60 in our textbook states: A set of literals is sati…
1) What is a stochastic model? Provide an example. 2) Risk management is a major
1) What is a stochastic model? Provide an example. 2) Risk management is a major usage of Monte Carol simulation. True (T) or False (F)? 3) Risk management uses data to assist in …
1) What is client program? What isa server program? Does a server program reques
1) What is client program? What isa server program? Does a server program request and receives from aclient program? [2point] 2) What are the two types oftransport servi…
1) What is feasibility analysis? List and briefly discuss three kinds of feasibi
1) What is feasibility analysis? List and briefly discuss three kinds of feasibility analysis. 2) How can you classify costs? Describe each cost classification and provide a typic…
1) What is returned by max(min(10,5),6) ? 2) Write the line of code to display t
1) What is returned by max(min(10,5),6)? 2) Write the line of code to display the backslash () to the console. Hint: The line starts with cout. 3) Fill in the blank in the followi…
1) What is stored in the list array after the following code executes? int list[
1) What is stored in the list array after the following code executes? int list[6]; for(int j = 0; j < 6; j++) { list[j] = 3 * j + 3; …
1) What is the Java Swing classs? 2) What is a JFrame used for with Java GUI app
1) What is the Java Swing classs? 2) What is a JFrame used for with Java GUI applications? 3) What is a JLabel used for? 4) What are the advantages of the JComboBox class? 5) What…
1) What is the decimal representation of the each of the UNSIGNED binary number
1) What is the decimal representation of the each of the UNSIGNED binary number 11111010 a. ???uu 2) What is the decimal value of the following SIGNED binary numbe…
1) What is the first step in the sales/fulfillment process that has an impact on
1) What is the first step in the sales/fulfillment process that has an impact on a company's financial accounts? 2) The smallest organizational unit for which accounting can be ca…
1) What is the output of each one. You must show your work a) cout
1) What is the output of each one. You must show your work a) cout << (3*2+6/2-4+6*2); b) cout << (2*7%3); c) cout <<(2*(7%3)); 2) What is the output. You must s…
1) What is the output of following JavaScript code?
1) What is the output of following JavaScript code? <script type="text/javascript"> x=4+"4"; document.write(x); </script> a) 44 b) 8 c) 4 d) Error output 2) What is th…
1) What is the output of the following code segment? ArrayList groceryList = new
1) What is the output of the following code segment? ArrayList groceryList = new ArrayList(); groceryList.add(“milk”); groceryList.add(“eggs”); groceryList.add(“bread”); System.ou…
1) What is the output of the following code? for ( int i=1; i
1) What is the output of the following code? for (int i=1; i<4; i++) { cout << i << " "; } Question 2. What does the following code print? int ctr, x = 5; for (…
1) What is the output of the function call f(root) where f is the function shown
1) What is the output of the function call f(root) where f is the function shown below and root is a pointer to the root of the tree shown below? (Note: use the struct defintion f…
1) What is the output of the function call f(root) where f is the function shown
1) What is the output of the function call f(root) where f is the function shown below and root is a pointer to the root of the tree shown below? (Note: use the struct defintion f…
1) What is the primary key on the VISIT_DETAIL ? 2) What kind of primary key is
1) What is the primary key on the VISIT_DETAIL? 2) What kind of primary key is it? APPONTMENT PK APPT NUM APPT DATE APPT TIME PATIENT DOCTOR PK PAT NUM FK1 INS PLAN CD PK DOC ID P…
1) What is the purpose of interrupts? How does the interrupt work? Explain with
1) What is the purpose of interrupts? How does the interrupt work? Explain with a diagram. What is the difference between an interrupt and trap? Explain. What are the different cl…
1) What is the purpose of interrupts? How does the interrupt work? Explain with
1) What is the purpose of interrupts? How does the interrupt work? Explain with a diagram. What is the difference between an interrupt and trap? Explain. What are …
1) What is the purpose of the Gateway address? Could the computer use a gateway
1) What is the purpose of the Gateway address? Could the computer use a gateway router located at 192.168.1.1 instead of 172.16.1.1? Explain. 2) Identify the command that would co…
Subject
Web development and programming
Use Browse or pick another subject.