Web development and programming
191828 questions • Page 167 / 3837
1) What is the purpose of the INTO instruction? 2) What was the main purpose for
1) What is the purpose of the INTO instruction? 2) What was the main purpose for the INTMUL instruction in this volume? What was it introduced before the chapter on integer arithm…
1) What is the purpose of using asymptotic notation \"such as O, Omega and Theta
1) What is the purpose of using asymptotic notation "such as O, Omega and Theta instead of using the exact number of comparisons done by a sorting algorithm? i.e. why do we use O(…
1) What is the purpose of using asymptotic notation such as O, Omega and Theta i
1) What is the purpose of using asymptotic notation such as O, Omega and Theta instead of using the exact number of comparisons done by a sorting algorithm? i.e. why do we use O(n…
1) What is the purpose of using asymptotic notation such as O, Omega and Theta i
1) What is the purpose of using asymptotic notation such as O, Omega and Theta instead of using the exact number of comparisons done by a sorting algorithm? i.e. why do we use O(n…
1) What is the purpose of using asymptotic notation such as O, Omega and Theta i
1) What is the purpose of using asymptotic notation such as O, Omega and Theta instead of using the exact number of comparisons done by a sorting algorithm? i.e. why do we use O(n…
1) What is the value of the beta variable after the following code executes? int
1) What is the value of the beta variable after the following code executes? int beta = 5; switch(beta) { case 3: …
1) What is your background programming with Java? 2) What are the Java Platform,
1) What is your background programming with Java? 2) What are the Java Platform, Java Standard Edition (SE), and Java Enterprise Edition (EE)? What will we be using in this course…
1) What is “Dynamic Scoping”? 2) Consider the following C program: void main() {
1) What is “Dynamic Scoping”? 2) Consider the following C program: void main() { int i, j, k; . . . } void sub1() { int j, k, l; . . . } void sub2() { int k, l, m; . . . } void su…
1) What keyword do I use to have a derived class call methods of its base class?
1) What keyword do I use to have a derived class call methods of its base class? 2) What keyword do I use to inherit from a base class into a subclass? 3) What is the purpose of k…
1) What kinds of attacks could be classified as software DoS attacks? 2) What ki
1) What kinds of attacks could be classified as software DoS attacks? 2) What kinds of attacks could be classified as preventable DoS attacks? 3) What are three DDoS attack tools?…
1) What might a member of a professional organization be doing when they refer t
1) What might a member of a professional organization be doing when they refer to the organization’s code of ethics? Clarifying whether a business practice violates the code of …
1) What non-functional system requirements might be addressed in the choice of a
1) What non-functional system requirements might be addressed in the choice of architectural design? Provide at least one example. 2) Compare and contrast characteristics of repos…
1) What role does bandwidth play in the successful delivery of the Advanced Mobi
1) What role does bandwidth play in the successful delivery of the Advanced Mobile Communications and Information System? 2) When does functionality transform the standard BlackBe…
1) What should be entered on LINE 9? 2) What should be entered on LINE 20? 3) As
1) What should be entered on LINE 9? 2) What should be entered on LINE 20? 3) Assuming that all corrections have been made, what will be displayed after LINE 47 is …
1) What to SUBMIT: You will submit a document to include all the following infor
1) What to SUBMIT: You will submit a document to include all the following information. When you include tables or figures, you should properly name using captions. …
1) What type of control is created if you create a form based on a table with a
1) What type of control is created if you create a form based on a table with a lookup field? A) Check Box B) Option Button C) Combo Box …
1) What was the first version of Android that was specifically implemented for t
1) What was the first version of Android that was specifically implemented for tablets? 2) (T/F) Developers only need to ensure that their applications run on the most recent vers…
1) What will be printed by the following code? int x = 5; while ( x < 0 ) { Syst
1) What will be printed by the following code? int x = 5; while ( x < 0 ) { System.out.print( x + " " ); x -= 2; } System.out.println( "Final x = " + x ); 5 3 1 Final x = -1 2)…
1) What will be printed by the following code? int x = 5; while ( x < 0 ) { Syst
1) What will be printed by the following code? int x = 5; while ( x < 0 ) { System.out.print( x + " " ); x -= 2; } System.out.println( "Final x = " + x ); 5 3 1 Final x = -1 2)…
1) What will be the output for the following code? (5 pts.) int[) array- (2,5,7,
1) What will be the output for the following code? (5 pts.) int[) array- (2,5,7,10,4,6,7,11,14 Console.Hriteline): for(int ilo; icarray.Lengthi i++) Let Console.Writee)arrayl] - 2…
1) What will be the value of EAX when the following sequence of instructions has
1) What will be the value of EAX when the following sequence of instructions has executed? push 5 push 10 push 20 pop eax 2) What will be the value of EAX when the following seque…
1) What will the following code do? const int SIZE = 5; double x[SIZE]; for(int
1) What will the following code do? const int SIZE = 5; double x[SIZE]; for(int i = 2; i <= SIZE; i++) { x[i] = 0.0; } Answer a. Each element in the array is initialized to …
1) What would be the encoded version of the message xxy yyx xxy xxy yyx if LZW c
1) What would be the encoded version of the message xxy yyx xxy xxy yyx if LZW compression, starting with the dictionary containing x, y and a space (as described in Section 1.8 o…
1) What would be the execution time for a program containing 2.,000,000 instruct
1) What would be the execution time for a program containing 2.,000,000 instructions if the processor clock were running at 8 MHz and each instruction took four clock cycles? 2) A…
1) What\'s the difference between a security group and a distribution group in A
1) What's the difference between a security group and a distribution group in ActiveDirectory? Can you explain the difference between group scopes in AD? Do those relationships ch…
1) When considering a migration from an existing, internal data center to a clou
1) When considering a migration from an existing, internal data center to a cloud environment, describe examples of upfront and ongoing costs that would needs to be considered whe…
1) When converting a 32-bit unsigned integer to a 64-bit unsigned integer, which
1) When converting a 32-bit unsigned integer to a 64-bit unsigned integer, which operation will preserve the correct value? a)The correct value cannot always be preserved b)Sign e…
1) When designing a database, all of the following statements are true EXCEPT: a
1) When designing a database, all of the following statements are true EXCEPT: a) You need to consider the output requirements of the database b) You need not be concerned with th…
1) When writing member funcations, if we have a class member with the same name
1) When writing member funcations, if we have a class member with the same name as a parameter, how can we use the member name without any ambiguity ? 2) Given the following, what…
1) Where can you not declare a variable in a C++ program? a) Within the paramete
1) Where can you not declare a variable in a C++ program? a) Within the parameter list of a function definition b) Within the block of a void function. c) Within the argument list…
1) Where do you think pervasive computing will expand to next? Explain your answ
1) Where do you think pervasive computing will expand to next? Explain your answer. 2) How does pervasive computing affect your life? As a consumer or employee, would you make use…
1) Which OSI layer is concerned with making sure that when a device at one end o
1) Which OSI layer is concerned with making sure that when a device at one end of a wire talks, the device at the other end of the same wire listens and understands 2) Which OSI l…
1) Which command will return the upper right corner element of a 5-by-5 matrix A
1) Which command will return the upper right corner element of a 5-by-5 matrix A? a. A([end, 1], [end, 1]) b. A(1,end) c. A({[1, end]}) d. A(1:10, 1:10) .-------------------------…
1) Which exceptions can each of these instructions trigger? For each of these ex
1) Which exceptions can each of these instructions trigger? For each of these exceptions, specify the pipeline stage in which it is detected. a) and $1, $2, $3 b) sw $1, 160($2) c…
1) Which exceptions can each of these instructions trigger? For each of these ex
1) Which exceptions can each of these instructions trigger? For each of these exceptions, specify the pipeline stage in which it is detected. a) and $1, $2, $3 b) sw $1, 160($2) c…
1) Which is a good choice of identifier? A) _abc B) RATE C)x D)A 2) Before a var
1) Which is a good choice of identifier? A) _abc B) RATE C)x D)A 2) Before a variable in C++ is used, it must be A)defined B)initialized C)contain only letters, digits and undersc…
1) Which is a good choice of identifier? A) _abc B) RATE C)x D)A 2) Before a var
1) Which is a good choice of identifier? A) _abc B) RATE C)x D)A 2) Before a variable in C++ is used, it must be A)defined B)initialized C)contain only letters, digits and undersc…
1) Which is a good choice of identifier? A) _abc B) RATE C)x D)A 2) Before a var
1) Which is a good choice of identifier? A) _abc B) RATE C)x D)A 2) Before a variable in C++ is used, it must be A)defined B)initialized C)contain only letters, digits and undersc…
1) Which loop control structure is used to create a data validation loop in the
1) Which loop control structure is used to create a data validation loop in the example in the supplemental notes? 2) A loop that uses an exit sentinel or exit code is what kind o…
1) Which of the following activities might be considered a possible source of th
1) Which of the following activities might be considered a possible source of threat to a company's network, and why? a) The daily courier service personnel who drop off and pick …
1) Which of the following allows you to read your e-mail easily on an Internet c
1) Which of the following allows you to read your e-mail easily on an Internet café's computer? A- POP B- Web-enabled e-mail C- both POP and Web-enabled e-mail D- neither POP nor …
1) Which of the following are characteristics of OS Partitioning Style of Virtua
1) Which of the following are characteristics of OS Partitioning Style of Virtualization Multiple O/S guests per nost Same O/S Guests Streamlined Hardware Invocation Modified Gues…
1) Which of the following are legal Boolean values in pseudocode? False None 0 T
1) Which of the following are legal Boolean values in pseudocode? False None 0 True "False" "True" 2) In the following pseudocode, what relational operator should be in the blank?…
1) Which of the following attacks requires the use of multiple computers? DoS Vi
1) Which of the following attacks requires the use of multiple computers? DoS Virus DDoS Worm 2) Which of the following identifies the upper layers of the OSI model in correct ord…
1) Which of the following can you NOT format using CSS3 pseudo-classes? (1pts) v
1) Which of the following can you NOT format using CSS3 pseudo-classes? (1pts) valid fields invalid fields required fields non-required fields 2) What does an HTML5 type attribute…
1) Which of the following class definitions is correct in Java? (i) public class
1) Which of the following class definitions is correct in Java? (i) public class Employee { private String name; private double salary; private int id; public Employee() { name = …
1) Which of the following instructions should be privileged? (10 points) a. Set
1) Which of the following instructions should be privileged? (10 points) a. Set value of timer. b. Read the clock. c. Clear memory. d. Issue a trap instruction. e. Turn off interr…
1) Which of the following is a reason to add sections to your PowerPoint present
1) Which of the following is a reason to add sections to your PowerPoint presentation?: * A) You want a subset of your slides to use a different design template from the rest. B) …
1) Which of the following is a valid C++ array definition? A) int array[10]; B)
1) Which of the following is a valid C++ array definition? A) int array[10]; B) int array[0]; C) float $payments[10]; D) void numbers[5]; E) None of these 2) What will the followi…
1) Which of the following is false? 1) Half adders and full adders are combinati
1) Which of the following is false? 1) Half adders and full adders are combinational logic. 2) The number of inputs to a full adder is one more than that to a half adder. 3) Eithe…
Subject
Web development and programming
Use Browse or pick another subject.