Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 176 / 3837

1,The C++ iostream library function __________ establishes a connection between
1,The C++ iostream library function __________ establishes a connection between the external file name and the name of the stream of characters by which the file will be known to …
1,The ________ properties are defined in the javafx.scene.shape.Line class. text
1,The ________ properties are defined in the javafx.scene.shape.Line class. text x y underline strikethrough 2, Which of the following statements are true? A Scene is a Node. A Sh…
1,To check if a string s contains the suffix \"Java\", you may write ________. i
1,To check if a string s contains the suffix "Java", you may write ________. if (s.endsWith("Java")) ... if (s.lastIndexOf("Java") >= 0) ... if (s.substring(s.length() - 4).equ…
1,When creating user account using useradd how is the default group determined?
1,When creating user account using useradd how is the default group determined? Is there a default group users are added automatically unless specified in the useradd command ? Do…
1,Which of the Boolean expressions below is incorrect? (true) && (3 => 4) !(x >
1,Which of the Boolean expressions below is incorrect? (true) && (3 => 4) !(x > 0) && (x > 0) (x > 0) || (x < 0) (x != 0) || (x = 0) (-10 < x &lt…
1,Which of the following statements are correct? When creating a Random object,
1,Which of the following statements are correct? When creating a Random object, you have to specify the seed or use the default seed. If two Random objects have the same seed, the…
1,Which of the following statements are true? A default constructor is provided
1,Which of the following statements are true? A default constructor is provided automatically if no constructors are explicitly declared in the class. At least one constructor mus…
1,Write a short C++ code fragment that reads a line of text and echo the line wi
1,Write a short C++ code fragment that reads a line of text and echo the line with all uppercase letters replaced by asterisks. 2,Write a C ++program that prompts for an input fil…
1- : A data type in which the values are made up of components, or elements, tha
1- : A data type in which the values are made up of components, or elements, that are themselves values is known as an object data type. Select one: True False 2- Given any real n…
1- A RAID system has 8 data bits and 1 parity bit as follows: Data: 11010000 Par
1- A RAID system has 8 data bits and 1 parity bit as follows: Data: 11010000 Parity: 0 Which parity scheme is being used? a.Even parity b.Odd parity c.Hybrid parity d.None of the …
1- A function in programming is a price of prewritten code that performs an oper
1- A function in programming is a price of prewritten code that performs an operation. Explain how the python programming language will use a function to display? 2-Python allows …
1- A structured cabling installation connects a computer in a work area to a swi
1- A structured cabling installation connects a computer in a work area to a switch in the telecommunications room. Put the components of the installation in order, starting from …
1- A(n) ____ is a set of interrelated components that collect, manipulate, store
1- A(n) ____ is a set of interrelated components that collect, manipulate, store, and disseminate data and information and provide a feedback mechanism to meet an objective. A. co…
1- A) Typically, the best philosophy for exception-handling is? B) Each of the f
1- A) Typically, the best philosophy for exception-handling is? B) Each of the following is a method of the Iterator interface, EXCEPT first() next() remove() hasNext() C)Does Jav…
1- Airplane An airplane model can be described (highly oversimplified) by the fo
1- Airplane An airplane model can be described (highly oversimplified) by the following attributes name: String empty weight: double number of seats: int fuel Consumption: double …
1- An algorithm for finding large itemsets is called fast find algorithm True Fa
1- An algorithm for finding large itemsets is called fast find algorithm True False _______________________________ 2- Multi-dimensional schemas are specified by using dimension t…
1- An algorithm for finding large itemsets is called fast find algorithm True Fa
1- An algorithm for finding large itemsets is called fast find algorithm True False _______________________________ 2- Multi-dimensional schemas are specified by using dimension t…
1- An example of a possible logical view of data is Question 1 options: A) Hiera
1- An example of a possible logical view of data is Question 1 options: A) Hierarchical B) Physical C) File management system D) All of the above 2- The stage in which an ER model…
1- An information security manager routinely monitored Web Surfing among her com
1- An information security manager routinely monitored Web Surfing among her company's employees. She discovered that many employees were visiting the "sinful six" web sites (Note…
1- Assume that s is a stack of MAX_SIZE characters and s_top is the subscript of
1- Assume that s is a stack of MAX_SIZE characters and s_top is the subscript of the element at the top of the stack s. Perform the following sequence of operations. Draw the new …
1- Assume the following instruction mix for some program: 15% stores, 25% loads,
1- Assume the following instruction mix for some program: 15% stores, 25% loads, 15% branches, 35% integer arithmetic, 5% integer shift and 5% integer multiply. Given that load in…
1- Assume there is a class AirConditioner that supports the following behaviors:
1- Assume there is a class AirConditioner that supports the following behaviors: turning the air conditioner on and off. The following methods are provide this behavior: turnOn an…
1- Compare the security and performance advantages and disadvantages of each var
1- Compare the security and performance advantages and disadvantages of each variant of CBC mode: a fixed IV, a counter IV, a random IV, and a nonce-generated IV. 2- Suppose you, …
1- Consider two masses, m p and m t , on a surface where friction is negligible.
1- Consider two masses, mp and mt, on a surface where friction is negligible. Assume that mt is initially at rest and that mass mp, having a velocity v = vpi i, collides with it. …
1- Create a class called Point that has two instance variables, defined as priva
1- Create a class called Point that has two instance variables, defined as private, as follows: An x coordinate and a y coordinate of type integer. a) Write two constructors for t…
1- Create a function named “remove_vowels” which takes in a sentence as input ar
1- Create a function named “remove_vowels” which takes in a sentence as input argument and returns the following parameters: The same sentence after removal of vowels The indices …
1- Create a holiday package shipping application to perform the following busine
1- Create a holiday package shipping application to perform the following business functions: Allow customers to select the weight of a package and the destination zone for the pa…
1- Create an object of calss student 2- Create a pointer to class student 3- Tak
1- Create an object of calss student 2- Create a pointer to class student 3- Take Name, ID, and GPA from the user 4- Put the values from taken form user in the object pointer 5- P…
1- Create your html resume according to the following template: 2. Create a css
1- Create your html resume according to the following template: 2. Create a css file to format your resume as the following figure: Your Name Here Mobile :.... Email: you@yourdoma…
1- Define a class called CSClass (as in a computer science department class) Def
1- Define a class called CSClass (as in a computer science department class) Define enough data and functionality to be meaningful. Use an array for student names and one for stud…
1- Define a class called CSClass (as in a computer science department class) Def
1- Define a class called CSClass (as in a computer science department class) Define enough data and functionality to be meaningful. Use an array for student names and one for stud…
1- Define the term, “ESD.” Be specific here; don’t simply decode the acronym! 2-
1- Define the term, “ESD.” Be specific here; don’t simply decode the acronym! 2- The following are three classifications of ESD control. Define and give an example of each. a) Pre…
1- Describe a data structure suitable for representing a board configuration dur
1- Describe a data structure suitable for representing a board configuration during a chess game? 2- Identify the data structures and procedures that might appear in an abstract d…
1- Describe a data structure suitable for representing a board configuration dur
1- Describe a data structure suitable for representing a board configuration during a chess game? 2- Identify the data structures and procedures that might appear in an abstract d…
1- Describe a scenario in which biased or incorrect information a child nd son t
1- Describe a scenario in which biased or incorrect information a child nd son the Web might harm him or her. What, if anything, might have prevented the child from nding similar …
1- Describe an organization, which has networking or connectivity problems 2- Wh
1- Describe an organization, which has networking or connectivity problems 2- What connectivity problems is the organization facing Is the organization facing any security issues …
1- Describe how secret key and public key cryptosystems work. 2- Distinguish bet
1-      Describe how secret key and public key cryptosystems work. 2-      Distinguish between physical and logical address. 3-      Distinguish between flat memory model and segm…
1- Describe how secret key and public key cryptosystems work. 2- Distinguish bet
1-      Describe how secret key and public key cryptosystems work. 2-      Distinguish between physical and logical address. 3-      Distinguish between flat memory model and segm…
1- Describe how secret key and public key cryptosystems work. 2- Distinguish bet
1-      Describe how secret key and public key cryptosystems work. 2-      Distinguish between physical and logical address. 3-      Distinguish between flat memory model and segm…
1- Describe situations when you or someone you know experienced frustration or f
1- Describe situations when you or someone you know experienced frustration or fear when using an interface. How could better design have improved the experience? 2- Write a short…
1- Describe the difference between the Page directive’s Theme and StyleSheetThem
1- Describe the difference between the Page directive’s Theme and StyleSheetTheme attributes. 2- For a theme to work, where must you store the theme’s skin file(s)? In your answer…
1- Design a class named Rectangle to represent a rectangle. The class contains:
1- Design a class named Rectangle to represent a rectangle. The class contains: ? Two double data fields named width and height that specify the width and height of the rectangle.…
1- Each of the following questions asks you to collect some type of data or prov
1- Each of the following questions asks you to collect some type of data or provide some type of operation to the user. For each question, select the most appropriate widget to us…
1- Explain how inheritance works? 2- What is prototyping and what does it accomp
1- Explain how inheritance works? 2- What is prototyping and what does it accomplish (include the resource allocation and planning implications in your answer)? 3- At what point i…
1- Explain how inheritance works? 2- What is prototyping and what does it accomp
1- Explain how inheritance works? 2- What is prototyping and what does it accomplish (include the resource allocation and planning implications in your answer)? 3- At what point i…
1- Find the greatest common divisor(gcd) by Euclid’s Algorithm of a and b with a
1- Find the greatest common divisor(gcd) by Euclid’s Algorithm of a and b with a b      is given by       int gcd (int a, int b) {           int r = 0;           while (b > 0) …
1- Give the state of the array after each pass when the following numbers (1 to
1- Give the state of the array after each pass when the following numbers (1 to 8) are sorted using the given algorithm. 5     4      7      2       8       3       1        6 The…
1- Give two major changes made in SNMP V2 related to minimizing the data exchang
1- Give two major changes made in SNMP V2 related to minimizing the data exchanged between agents and manager and standardized products. 2- Differentiate between authentication an…
1- Given that the variables x and y have already been declared and assigned valu
1- Given that the variables x and y have already been declared and assigned values, write an expression that evaluates to true if x is non-negative and y is negative.So, if the va…
1- Given the availability of an ofstream object named output , and a string vari
1- Given the availability of an ofstream object named output , and a string variable name tweet , write the other statements necessary to open a file named mytweet" , display the …