Web development and programming
191828 questions • Page 177 / 3837
1- Given this code fragment that creates two cookies: Response.Cookies[\"street\
1- Given this code fragment that creates two cookies: Response.Cookies["street"].Value = "1600 Pennsylvania Avenue"; Response.Cookies["cityState"].Value = "Washington, D.C."; 2- P…
1- How do SCM systems improve supply chain visibility? You should include the st
1- How do SCM systems improve supply chain visibility? You should include the structure and components of a supply chain, the different flows along the supply chain, and problems …
1- How do SCM systems improve supply chain visibility? You should include the st
1- How do SCM systems improve supply chain visibility? You should include the structure and components of a supply chain, the different flows along the supply chain, and problems …
1- Implement an abstract class Arrays that has the following pure virtual functi
1- Implement an abstract class Arrays that has the following pure virtual functions typel), that returns the type of the array (1-dimensional or 2-dimensional). i) sie0, that retu…
1- In Java Create an array based implementation of a stack Requirments: a- Use p
1- In Java Create an array based implementation of a stack Requirments: a- Use packages to organize your code. The classes/abstractions of your collections should exist in some lo…
1- In Java Create an array based implementation of a stack You will create a cla
1- In Java Create an array based implementation of a stack You will create a class called ArrayStack that implements StackOperations. You are to implement the appropriate behavior…
1- In terminal-host processing, processing is done on both the terminal and the
1- In terminal-host processing, processing is done on both the terminal and the server. True. False. 2- A network is a system that permits networked applications on different host…
1- Introduction: In this lab you will implement a singly-linked list version of
1- Introduction: In this lab you will implement a singly-linked list version of the sequence (template) class. 2- Files: Create the “.hpp” le for a template class called sequence …
1- It takes 12.5ms to transmit 10 characters in a RS232 link. Assume that each d
1- It takes 12.5ms to transmit 10 characters in a RS232 link. Assume that each data is made of 8 bits, with even parity, and 2 stop bits. What is the approximate baud rate of the …
1- Likeable Implement the interface Likeable. It declares two methods: like() an
1- Likeable Implement the interface Likeable. It declares two methods: like() and int getLikes(). 2- Post Write the implementation of the class Post. It implements the characteris…
1- Linux Bash cleanUp.sh Script This is about keeping a directory free of \"junk
1- Linux Bash cleanUp.sh Script This is about keeping a directory free of "junk" files. To be specific, we want to remove files that are backups and auto-saved versions. Create a …
1- List 2 things that you need to begin creating the schedule for your test plan
1- List 2 things that you need to begin creating the schedule for your test plan – 2- You assigned 2 testers to write the test cases. The task will take 10 days and an additional …
1- List the number of jobs each employee has had within the company. Identify ea
1- List the number of jobs each employee has had within the company. Identify each employee by surname. 2- List the maximum and minimum salary of current employees and their depar…
1- MatLab - Cody Solutions Find the sum of the following arithmetic series: 5,9,
1- MatLab - Cody Solutions Find the sum of the following arithmetic series: 5,9, 13, 17 You will be supplied a random integer n which is guaranteed to be the last element of the s…
1- May not seem like significant attacks by themselves Distributed denial of ser
1- May not seem like significant attacks by themselves Distributed denial of service Code analysis Business impact Surveillance, like nmap scAnswer 2- Encrypting "answers the stac…
1- Microsoft Project is an example of software that is very powerful, but quite
1- Microsoft Project is an example of software that is very powerful, but quite expensive. As a project manager, how would you justify the purchase of this software? Also, would y…
1- Moving from one node to another by following a next reference is known as Sel
1- Moving from one node to another by following a next reference is known as Select one: a. templated node class b. pointer hopping c. insertion to the front of a linked list d. g…
1- Objective The purpose of this assignment is for students to gain a better und
1- Objective The purpose of this assignment is for students to gain a better understanding of object-oriented programming, classes, mutators, accessors, method, destructors, and d…
1- Please explain the differences between the private, protected, and public acc
1- Please explain the differences between the private, protected, and public access modifiers. 2- Given the definitions, Scanner kb; kb = new Scanner(System.in); int a = kb.getNex…
1- Provide 2 reasons why object-oriented programs run more slowly than procedura
1- Provide 2 reasons why object-oriented programs run more slowly than procedural programs. 2- You are given the following declarations in Java (you should assume that each class …
1- Pure software working on full population: For the given set of stock market d
1- Pure software working on full population: For the given set of stock market data you are required to perform statistical analysis of this data to find out the mean, the varianc…
1- Rewrite the productions for each of the following nonterminals as right regul
1- Rewrite the productions for each of the following nonterminals as right regular grammars: Identifier, Float. 2- Draw a DFSA for identifiers that contain only letters and digits…
1- Select the clearest, most grammatically correct sentence. Henry Ford develope
1- Select the clearest, most grammatically correct sentence. Henry Ford developed the United States’ first automotive assembly line. Henry Ford developed the United States’ first …
1- Suppose you are a systems analyst developing a detailed test plan. Explain te
1- Suppose you are a systems analyst developing a detailed test plan. Explain testing strategies you will use in your plan. Will you use live or simulated data? 2-What are the mos…
1- Suppose you were assigned to develop a logical model of the registration syst
1- Suppose you were assigned to develop a logical model of the registration system at a school or college. Would you be better off using a top-down approach, or would a bottom-up …
1- Suppose you were assigned to develop a logical model of the registration syst
1- Suppose you were assigned to develop a logical model of the registration system at a school or college. Would you be better off using a top-down approach, or would a bottom-up …
1- Temperature distribution in a part of a heat exchanger in the steady state co
1- Temperature distribution in a part of a heat exchanger in the steady state condition should be determined. The part is shown in Figure-1 has a thermal conductivity of k 25W/m.K…
1- Temperature distribution in a part of a heat exchanger in the steady state co
1- Temperature distribution in a part of a heat exchanger in the steady state condition should be determined. The part is shown in Figure-1 has a thermal conductivity of k 25W/m.K…
1- The CPU system forms the interfaces through which field devices are connected
1- The CPU system forms the interfaces through which field devices are connected to the controller. True False 2- The programming device must always be connected to the control…
1- There are two approaches to information security policies: the parallel appro
1- There are two approaches to information security policies: the parallel approach and the integrated approach. a- Explain each of them. b- Which one is more efficient? Explain y…
1- TigerOne Bank is a local bank that intends to install a new automated teller
1- TigerOne Bank is a local bank that intends to install a new automated teller machine (ATM) to allow its customers to perform basic financial transactions. Using the ATM machine…
1- Union Person { char name[30]; //30 bytes int age; float height; }; How many b
1- Union Person { char name[30]; //30 bytes int age; float height; }; How many bytes will skip after executing ptr = ptr +1. Union Person abc, *ptr; Ptr = &abc; ptr = ptr +1; …
1- Use inheritance to implement the following classes: A : A Car that is a Vehic
1- Use inheritance to implement the following classes: A: A Car that is a Vehicle and has a name, a max_speed value and an instance variable called the number_of_cylinders in its …
1- Use inheritance to implement the following classes: A : A Car that is a Vehic
1- Use inheritance to implement the following classes: A: A Car that is a Vehicle and has a name, a max_speed value and an instance variable called the number_of_cylinders in its …
1- Using Azure Big data and analytics, upload the Complete Works of William Shak
1- Using Azure Big data and analytics, upload the Complete Works of William Shakespeare from Project Gutenberg at http://www.gutenberg.org/cache/epub/100/pg100.txt. Outputs the nu…
1- We plan to use this hash function to hash ~ half million words into an array
1- We plan to use this hash function to hash ~ half million words into an array of size ~ a million and we want to keep collisions of unequal words to a minimum. Words are conside…
1- What are the benefits and harm of internet censorship? 2- You are in-charge o
1- What are the benefits and harm of internet censorship? 2- You are in-charge of the computers at a large, inner-city library. Most of the people who live in the neighborhood do …
1- What are the high-level options for an enterprise data center strategy?Explai
1- What are the high-level options for an enterprise data center strategy?Explain the differences between the options. 2- A friend of yours is setting up a small company that wil…
1- What are the primary key fields for the TRIP_GUIDES table? 2- Does the TRIP_G
1- What are the primary key fields for the TRIP_GUIDES table? 2- Does the TRIP_GUIDES table have a Composite Key? (Yes or No) Why or why not? 3- What are the primary key field(s) …
1- What are the two most important factors in determining the strength of a cryp
1- What are the two most important factors in determining the strength of a cryptographic key? (Note: The question asks about the key, not the cryptosystem as a whole.) 2- Name th…
1- What aspects or characteristics of our current network of networks allows dis
1- What aspects or characteristics of our current network of networks allows distributed system run in an uninhibited and cohesive fashion 2-Describe some of the challenges that o…
1- What does ADO.NET stand for? ---------------------------------------- 2- ASP.
1- What does ADO.NET stand for? ---------------------------------------- 2- ASP.NET uses the executeReader and the executeNonQuery method calls to execute SQL statements. What is …
1- What does function subroutine do? def subroutine( n ): while n > 0: print (n,
1- What does function subroutine do? def subroutine( n ): while n > 0: print (n,) n -= 1 Select one: a. Counts from 10 down to 0 and displays each number b. Counts from n down …
1- What does the following code fragment do? vector my_vector; my_vector
1- What does the following code fragment do? vector<double> my_vector; my_vector.push_back(3.456); my_vector.push_back(5); double result = my_vector[1] + my_vector[0]; cout …
1- What element is not depicted on a UML Use Case Diagram? a- Actors - users of
1- What element is not depicted on a UML Use Case Diagram? a- Actors - users of the system. b- Programming logic. c- Functional Requirements. d- Interactions between actors and th…
1- What is Data Destruction? List and explain the Data Destruction Categories us
1- What is Data Destruction? List and explain the Data Destruction Categories using your own words. 2- Most applications include metadata in the document properties. Define the me…
1- What is a Python development framework? Give 3 examples Python development fr
1- What is a Python development framework? Give 3 examples Python development frameworks used today, and explain which development framework is used in which industry. (20)! 2- Wh…
1- What is a career? - A work situation that you take to earn money. - The thing
1- What is a career? - A work situation that you take to earn money. - The thing you enjoy doing the most. - A profession that utilizes your talents and ambitions. - A stepping st…
1- What is a career? - A work situation that you take to earn money. - The thing
1- What is a career? - A work situation that you take to earn money. - The thing you enjoy doing the most. - A profession that utilizes your talents and ambitions. - A stepping st…
1- What is a helper function? Explain the pros and cons. 2- There are three acce
1- What is a helper function? Explain the pros and cons. 2- There are three access modifiers in class to limit or grant access to attributes and methods, name them and explain wha…
Subject
Web development and programming
Use Browse or pick another subject.