Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 177 / 3837

1- Given this code fragment that creates two cookies: Response.Cookies[\"street\
1- Given this code fragment that creates two cookies: Response.Cookies["street"].Value = "1600 Pennsylvania Avenue"; Response.Cookies["cityState"].Value = "Washington, D.C."; 2- P…
1- How do SCM systems improve supply chain visibility? You should include the st
1- How do SCM systems improve supply chain visibility? You should include the structure and components of a supply chain, the different flows along the supply chain, and problems …
1- How do SCM systems improve supply chain visibility? You should include the st
1- How do SCM systems improve supply chain visibility? You should include the structure and components of a supply chain, the different flows along the supply chain, and problems …
1- Implement an abstract class Arrays that has the following pure virtual functi
1- Implement an abstract class Arrays that has the following pure virtual functions typel), that returns the type of the array (1-dimensional or 2-dimensional). i) sie0, that retu…
1- In Java Create an array based implementation of a stack Requirments: a- Use p
1- In Java Create an array based implementation of a stack Requirments: a- Use packages to organize your code. The classes/abstractions of your collections should exist in some lo…
1- In Java Create an array based implementation of a stack You will create a cla
1- In Java Create an array based implementation of a stack You will create a class called ArrayStack that implements StackOperations. You are to implement the appropriate behavior…
1- In terminal-host processing, processing is done on both the terminal and the
1- In terminal-host processing, processing is done on both the terminal and the server. True. False. 2- A network is a system that permits networked applications on different host…
1- Introduction: In this lab you will implement a singly-linked list version of
1- Introduction: In this lab you will implement a singly-linked list version of the sequence (template) class. 2- Files: Create the “.hpp” le for a template class called sequence …
1- It takes 12.5ms to transmit 10 characters in a RS232 link. Assume that each d
1- It takes 12.5ms to transmit 10 characters in a RS232 link. Assume that each data is made of 8 bits, with even parity, and 2 stop bits. What is the approximate baud rate of the …
1- Likeable Implement the interface Likeable. It declares two methods: like() an
1- Likeable Implement the interface Likeable. It declares two methods: like() and int getLikes(). 2- Post Write the implementation of the class Post. It implements the characteris…
1- Linux Bash cleanUp.sh Script This is about keeping a directory free of \"junk
1- Linux Bash cleanUp.sh Script This is about keeping a directory free of "junk" files. To be specific, we want to remove files that are backups and auto-saved versions. Create a …
1- List 2 things that you need to begin creating the schedule for your test plan
1- List 2 things that you need to begin creating the schedule for your test plan – 2- You assigned 2 testers to write the test cases. The task will take 10 days and an additional …
1- List the number of jobs each employee has had within the company. Identify ea
1- List the number of jobs each employee has had within the company. Identify each employee by surname. 2- List the maximum and minimum salary of current employees and their depar…
1- MatLab - Cody Solutions Find the sum of the following arithmetic series: 5,9,
1- MatLab - Cody Solutions Find the sum of the following arithmetic series: 5,9, 13, 17 You will be supplied a random integer n which is guaranteed to be the last element of the s…
1- May not seem like significant attacks by themselves Distributed denial of ser
1- May not seem like significant attacks by themselves Distributed denial of service Code analysis Business impact Surveillance, like nmap scAnswer 2- Encrypting "answers the stac…
1- Microsoft Project is an example of software that is very powerful, but quite
1- Microsoft Project is an example of software that is very powerful, but quite expensive. As a project manager, how would you justify the purchase of this software? Also, would y…
1- Moving from one node to another by following a next reference is known as Sel
1- Moving from one node to another by following a next reference is known as Select one: a. templated node class b. pointer hopping c. insertion to the front of a linked list d. g…
1- Objective The purpose of this assignment is for students to gain a better und
1- Objective The purpose of this assignment is for students to gain a better understanding of object-oriented programming, classes, mutators, accessors, method, destructors, and d…
1- Please explain the differences between the private, protected, and public acc
1- Please explain the differences between the private, protected, and public access modifiers. 2- Given the definitions, Scanner kb; kb = new Scanner(System.in); int a = kb.getNex…
1- Provide 2 reasons why object-oriented programs run more slowly than procedura
1- Provide 2 reasons why object-oriented programs run more slowly than procedural programs. 2- You are given the following declarations in Java (you should assume that each class …
1- Pure software working on full population: For the given set of stock market d
1- Pure software working on full population: For the given set of stock market data you are required to perform statistical analysis of this data to find out the mean, the varianc…
1- Rewrite the productions for each of the following nonterminals as right regul
1- Rewrite the productions for each of the following nonterminals as right regular grammars: Identifier, Float. 2- Draw a DFSA for identifiers that contain only letters and digits…
1- Select the clearest, most grammatically correct sentence. Henry Ford develope
1- Select the clearest, most grammatically correct sentence. Henry Ford developed the United States’ first automotive assembly line. Henry Ford developed the United States’ first …
1- Suppose you are a systems analyst developing a detailed test plan. Explain te
1- Suppose you are a systems analyst developing a detailed test plan. Explain testing strategies you will use in your plan. Will you use live or simulated data? 2-What are the mos…
1- Suppose you were assigned to develop a logical model of the registration syst
1- Suppose you were assigned to develop a logical model of the registration system at a school or college. Would you be better off using a top-down approach, or would a bottom-up …
1- Suppose you were assigned to develop a logical model of the registration syst
1- Suppose you were assigned to develop a logical model of the registration system at a school or college. Would you be better off using a top-down approach, or would a bottom-up …
1- Temperature distribution in a part of a heat exchanger in the steady state co
1- Temperature distribution in a part of a heat exchanger in the steady state condition should be determined. The part is shown in Figure-1 has a thermal conductivity of k 25W/m.K…
1- Temperature distribution in a part of a heat exchanger in the steady state co
1- Temperature distribution in a part of a heat exchanger in the steady state condition should be determined. The part is shown in Figure-1 has a thermal conductivity of k 25W/m.K…
1- The CPU system forms the interfaces through which field devices are connected
1- The CPU system forms the interfaces through which field devices are connected to the controller. True    False 2- The programming device must always be connected to the control…
1- There are two approaches to information security policies: the parallel appro
1- There are two approaches to information security policies: the parallel approach and the integrated approach. a- Explain each of them. b- Which one is more efficient? Explain y…
1- TigerOne Bank is a local bank that intends to install a new automated teller
1- TigerOne Bank is a local bank that intends to install a new automated teller machine (ATM) to allow its customers to perform basic financial transactions. Using the ATM machine…
1- Union Person { char name[30]; //30 bytes int age; float height; }; How many b
1- Union Person { char name[30]; //30 bytes int age; float height; }; How many bytes will skip after executing ptr = ptr +1. Union Person abc, *ptr; Ptr = &abc; ptr = ptr +1; …
1- Use inheritance to implement the following classes: A : A Car that is a Vehic
1- Use inheritance to implement the following classes: A: A Car that is a Vehicle and has a name, a max_speed value and an instance variable called the number_of_cylinders in its …
1- Use inheritance to implement the following classes: A : A Car that is a Vehic
1- Use inheritance to implement the following classes: A: A Car that is a Vehicle and has a name, a max_speed value and an instance variable called the number_of_cylinders in its …
1- Using Azure Big data and analytics, upload the Complete Works of William Shak
1- Using Azure Big data and analytics, upload the Complete Works of William Shakespeare from Project Gutenberg at http://www.gutenberg.org/cache/epub/100/pg100.txt. Outputs the nu…
1- We plan to use this hash function to hash ~ half million words into an array
1- We plan to use this hash function to hash ~ half million words into an array of size ~ a million and we want to keep collisions of unequal words to a minimum. Words are conside…
1- What are the benefits and harm of internet censorship? 2- You are in-charge o
1- What are the benefits and harm of internet censorship? 2- You are in-charge of the computers at a large, inner-city library. Most of the people who live in the neighborhood do …
1- What are the high-level options for an enterprise data center strategy?Explai
1- What are the high-level options for an enterprise data center strategy?Explain the differences between the options. 2-  A friend of yours is setting up a small company that wil…
1- What are the primary key fields for the TRIP_GUIDES table? 2- Does the TRIP_G
1- What are the primary key fields for the TRIP_GUIDES table? 2- Does the TRIP_GUIDES table have a Composite Key? (Yes or No) Why or why not? 3- What are the primary key field(s) …
1- What are the two most important factors in determining the strength of a cryp
1- What are the two most important factors in determining the strength of a cryptographic key? (Note: The question asks about the key, not the cryptosystem as a whole.) 2- Name th…
1- What aspects or characteristics of our current network of networks allows dis
1- What aspects or characteristics of our current network of networks allows distributed system run in an uninhibited and cohesive fashion 2-Describe some of the challenges that o…
1- What does ADO.NET stand for? ---------------------------------------- 2- ASP.
1- What does ADO.NET stand for? ---------------------------------------- 2- ASP.NET uses the executeReader and the executeNonQuery method calls to execute SQL statements. What is …
1- What does function subroutine do? def subroutine( n ): while n > 0: print (n,
1- What does function subroutine do? def subroutine( n ): while n > 0: print (n,) n -= 1 Select one: a. Counts from 10 down to 0 and displays each number b. Counts from n down …
1- What does the following code fragment do? vector my_vector; my_vector
1- What does the following code fragment do? vector<double> my_vector; my_vector.push_back(3.456); my_vector.push_back(5); double result = my_vector[1] + my_vector[0]; cout …
1- What element is not depicted on a UML Use Case Diagram? a- Actors - users of
1- What element is not depicted on a UML Use Case Diagram? a- Actors - users of the system. b- Programming logic. c- Functional Requirements. d- Interactions between actors and th…
1- What is Data Destruction? List and explain the Data Destruction Categories us
1- What is Data Destruction? List and explain the Data Destruction Categories using your own words. 2- Most applications include metadata in the document properties. Define the me…
1- What is a Python development framework? Give 3 examples Python development fr
1- What is a Python development framework? Give 3 examples Python development frameworks used today, and explain which development framework is used in which industry. (20)! 2- Wh…
1- What is a career? - A work situation that you take to earn money. - The thing
1- What is a career? - A work situation that you take to earn money. - The thing you enjoy doing the most. - A profession that utilizes your talents and ambitions. - A stepping st…
1- What is a career? - A work situation that you take to earn money. - The thing
1- What is a career? - A work situation that you take to earn money. - The thing you enjoy doing the most. - A profession that utilizes your talents and ambitions. - A stepping st…
1- What is a helper function? Explain the pros and cons. 2- There are three acce
1- What is a helper function? Explain the pros and cons. 2- There are three access modifiers in class to limit or grant access to attributes and methods, name them and explain wha…