Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 172 / 3837

1) the ______ instruction prompts the little man to pull the value out of the ca
1) the ______ instruction prompts the little man to pull the value out of the calculator and store it in a mailbox. a)LOAD b)LOSSY c)STORE d)ADD 2)a _________ instruction prompts …
1) translate the following C code to MIPS assembly code. Use a minimum number of
1) translate the following C code to MIPS assembly code. Use a minimum number of instructions. Assume that the values of a, b, I, and j are in registers $S0, $S1, $t0, and $t1, re…
1) two private hosts with IP 10.0.0.0/16 and 10.1.0.0/16 connected with router w
1) two private hosts with IP 10.0.0.0/16 and 10.1.0.0/16 connected with router what happens when send a) the router will discard the message b)the router will forward the message …
1) unsigned number1Bits( unsigned n ); Returns the number of 1-bits in n. For ex
1) unsigned number1Bits( unsigned n ); Returns the number of 1-bits in n. For example, if main says number1Bits( 0xBADDECAFU ) then the function returns 22. The function does no I…
1) virtual memory uses a page table to track the mapping of virtual addresses to
1)virtual memory uses a page table to track the mapping of virtual addresses to physical addresses. This exercise shows how this table must be updated as addresses are accessed. T…
1) void setSpeeds(int microsLeft, int microsRight) 2)void calibrateSpeeds() 3)vo
1) void setSpeeds(int microsLeft, int microsRight) 2)void calibrateSpeeds() 3)void setSpeedsRPS (float rpsLeft, float rpsRight) 4)void setSpeedsIPS(float ipsLeft, float ipsRight) …
1) what are the differences in the generations of the Intel I7 processor (beside
1) what are the differences in the generations of the Intel I7 processor (besides possible speed enhancements) 2) is the processor a CISC or a RISC (or both) 3) why is there a Int…
1) what is the acceleration felt by a free electron in a metal if the magnitude
1) what is the acceleration felt by a free electron in a metal if the magnitude of the electric field is E? 2) suppose we start with an electron with zero initial velocity. Let be…
1) what is the purpose of this model ? 2)what is the size of (AX, BX, CX, DX) an
1) what is the purpose of this model ? 2)what is the size of (AX, BX, CX, DX) and (AX, BX, CX, DX) registers in protected model ? 3)what is the purpose of the memory segmentation …
1) which network device limits external traffic to the internal network? A) Swit
1) which network device limits external traffic to the internal network? A) Switch B)Router C) VPN D) Firewall E) Proxy 2) Which networking device extends an internal network beyo…
1) which of the following is not considered a system? a) check order against inv
1) which of the following is not considered a system? a) check order against inventory b)solar system c)home network d)inventory control 2)In a ________ configuration, a program o…
1) why do local variables lose their values between calls to a function in which
1) why do local variables lose their values between calls to a function in which they are defined? 6) How would multiple values be returned from a function? correct the following …
1) write a constructor function (not inline) for Square objects. It should take
1) write a constructor function (not inline) for Square objects. It should take a vector of string tokens as its only parameter. If there are at least 2 tokens, the one at index 1…
1) write a program that analyzes a data file that has been determined to contain
1) write a program that analyzes a data file that has been determined to contain only integer values and white spaces. The program should print the number of lines in the file and…
1) write any C++ or java programming for each one of these as follows: a) Is 7 a
1) write any C++ or java programming for each one of these as follows: a) Is 7 a primitive root modulo 65537? How many calculations" multiplications" are needed? b) solve 7^x 2 (m…
1) write code to do the following - declare a variable ptr as a ponter to int an
1) write code to do the following - declare a variable ptr as a ponter to int and initialize it to NULL - dynamically allocate memory for an array of 100 elements - read 100 eleme…
1) “e” function. Similar to the pi() function, create a function that outputs 2.
1) “e” function. Similar to the pi() function, create a function that outputs 2.71828 when you type ex() 2) Absolute Value Function. Create a function that always outputs a positi…
1)(JAVA) Extend the Binary Search Tree ADT to include a public method leafCount
1)(JAVA) Extend the Binary Search Tree ADT to include a public method leafCount that returns the number of leaf nodes in the tree. Thank You in Advanced. Below, I also have attach…
1)) The following function is supposed to compute and display the value of n-fac
1)) The following function is supposed to compute and display the value of n-factorial for integers greater than 0. What is wrong with this function? The calculation is wrong. The…
1)- Create a specialized version of Insects called FlyingInsects which have the
1)- Create a specialized version of Insects called FlyingInsects which have the ability to fly. 2)- Create a specialized version of Insects called Butterfly which has a state call…
1)- Write a program that includes two functions named calcavg() and variance().
1)- Write a program that includes two functions namedcalcavg() and variance().The calcavg() function should calculate and returnthe average of the values stored in an array namedt…
1). (Finding the smallest element) Write a method that finds the smallest elemen
1). (Finding the smallest element) Write a method that finds the smallest element in an array of integers. Use {1, 2, 4, 5, 10, 100, 2, –22} to test the method. 2). (Increasing ar…
1). Consider two CPUs that have the same core speed of 3.2 GHz. Both are 64-bit
1). Consider two CPUs that have the same core speed of 3.2 GHz. Both are 64-bit processors and both have the same amount of cache. They both are said to handle 4 threads. Which of…
1). Construct logical expressions to represent the following conditions: (A). we
1). Construct logical expressions to represent the following conditions: (A). weight is greater than or equal to 115 but less than 125.(B). ch is q or Q. (C).x is even but is not …
1). Describe frequency modulation, amplitude modulation, phase-shift modulation,
1). Describe frequency modulation, amplitude modulation, phase-shift modulation, and on-off keying. 2What are the components of a communiication channel? 3) What are the component…
1). Design, implement and test a Circle class. The Circle class should be writte
1). Design, implement and test a Circle class. The Circle class should be written as a template class, so the user of the class can create Circle objects that have int, double or …
1). For installations in the United States, the reason why channels 1, 6, and 11
1). For installations in the United States, the reason why channels 1, 6, and 11 are typically used in the 2.4 GHz band is _____. a). The other channels are not allowed by the FCC…
1). Function name mentioned before main function is called a) Function Declarati
1). Function name mentioned before main function is called a) Function Declaration b) Function call c) Function definition 2). Function name mentioned inside the main function is …
1). Function name mentioned before main function is called a) Function Declarati
1). Function name mentioned before main function is called a) Function Declaration b) Function call c) Function definition 2). Function name mentioned inside the main function is …
1). Given any set of seven integers, must there be two that have the same remain
1). Given any set of seven integers, must there be two that have the same remainder when divided by 6? Why? 2.) Given any set of seven integers, must there be two that have the sa…
1). Many access points can be configured for modes other than as a straight acce
1). Many access points can be configured for modes other than as a straight access point. Match the following modes their most appropriate definitions. ( These are the selections;…
1). Match the terms below with the explanations which follow. (a) cache hit (b)
1). Match the terms below with the explanations which follow. (a) cache hit (b) cache line fill (c) write hit 1.___ The processor attempts to write an operand to a cacheable area …
1). Multiplexing is used on wired and wireless communications links. Explain wha
1).        Multiplexing is used on wired and wireless communications links. Explain what multiplexing is and explain the various types of multiplexing methods that are available a…
1). Read in names to sort until the user types the \"enter\" key as the first ch
1). Read in names to sort until the user types the "enter" key as the first character of a string (the maximum number of names is 20, there is not a maximum length to a name). 2).…
1). Read the section \" Intellectual Property Rights \" of the course notes \" E
1). Read the section "Intellectual Property Rights" of the course notes "Ethical, Social, and Political Issues in E-commerce". 2). Give a short answer for each of the questions be…
1). Read the section \" Understanding Ethical, Social, and Political Issues in E
1). Read the section "Understanding Ethical, Social, and Political Issues in E-commerce" of the course notes "Ethical, Social, and Political Issues in E-commerce". 2). Give a shor…
1). Suppose that we are testing Ho: The medicine has no value vs. Ha: The medici
1). Suppose that we are testing Ho: The medicine has no value vs. Ha: The medicine has value. Describe Type I Error a)The medicine has no value and we conclude that it has no valu…
1). THE QUESTION IS : DNA sequencers produce output in a variety of formats. A c
1). THE QUESTION IS : DNA sequencers produce output in a variety of formats. A common task that biotechnicians encounter is writing program to collect the data from these sequence…
1). The elements of an integer -valued array can be set to 0 (i.e., the array ca
1). The elements of an integer -valued array can be set to 0 (i.e., the array can be cleared) recursively as follows: An array of size 0 is already cleared; Otherwise, set the fir…
1). The items that appear between the parentheses following a function\'s name a
1). The items that appear between the parentheses following a function's name are called ____________. Example: function pow: pow(2,3) 2). Assuming that the message variable conta…
1). True/False: A program written in a higher order programming language such as
1). True/False: A program written in a higher order programming language such as “C” is likely to be more portable than a program that is written in assembly language 2). The proc…
1). Using the grammar in Example 3.4, show a parse tree and a leftmost derivatio
1). Using the grammar in Example 3.4, show a parse tree and a leftmost derivation for each of the following statements. (a and d) a) A (A + B) * C d) A B* C* (A B)) 2). Consider t…
1). When an image is resized in Photoshop, A-it is converted to a vector image B
1). When an image is resized in Photoshop, A-it is converted to a vector image B-image quality is reduced C-quality is unaffected D-quality is improved 2)The main internation stan…
1). Where is the error in this code sequence? double [] a = new double[4]; for (
1). Where is the error in this code sequence? double [] a = new double[4]; for ( int i = 0; i <= a.length; i++ ) {       System.out.println( a[i] ); }                          …
1). Which of the following are true of 802.11ac? Choose all that apply. a). Was
1). Which of the following are true of 802.11ac? Choose all that apply. a).Was ratified in 2013 b). Uses only in the 5 GHz frequency bands c). Use of channel bonding with the capa…
1). Which of the following memory areas are allocated in a SQL Server 2014 insta
1). Which of the following memory areas are allocated in a SQL Server 2014 instance (engine)? A. Buffer cache B. Shared pool C. Memory pool area D. code area 2). Terry wants to ch…
1). Which of the following statements is true? a) . IDE interfaces have been pha
1). Which of the following statements is true? a). IDE interfaces have been phased out in favor of SATA. b). SATA interfaces have been phased out in favor of IDE. c). All hard dri…
1). Which two of the following expansion slots would more likely be found on a s
1).Which two of the following expansion slots would more likely be found on a server motherboard than on a desktop motherboard? a).PCI b).PCIX c).PCIe X1 d).PCIe X16 e). PCIe X4 2…
1). Which two of the following relate to technologies such as Bluetooth and ZigB
1). Which two of the following relate to technologies such as Bluetooth and ZigBee? a). 802.15 b). 802.16 c). WPAN d). WWAN e). WMAN f). 802.11 g). 802.3 2). In your own words*, e…
1).When should a programmer select a for loop for his or her program? A. When he
1).When should a programmer select a for loop for his or her program?       A. When he or she knows the exact number of times the loop will be executed.       B. When he or she is…