Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 180 / 3837

1-D Array - C++ You are to write a program that will manipulate an array. Your p
1-D Array - C++ You are to write a program that will manipulate an array. Your program should handle up to 50 integer numbers. You have to count how many values you read in and yo…
1-D Array - C++ You are to write a program that will manipulate an array. Your p
1-D Array - C++ You are to write a program that will manipulate an array. Your program should handle up to 50 integer numbers. You have to count how many values you read in and yo…
1-D Array - C++ You are to write a program that will manipulate an array. Your p
1-D Array - C++ You are to write a program that will manipulate an array. Your program should handle up to 50 integer numbers. You have to count how many values you read in and yo…
1-Define, in your own words, \"multitasking\" 2- Define in you own words, \"real
1-Define, in your own words, "multitasking" 2- Define in you own words, "real-time" Both in terms of embedded system
1-Define, in your own words, \"multitasking\" and \"real-time\" in terms of embe
1-Define, in your own words, "multitasking" and "real-time" in terms of embedded system? 2-Explain why embedded system processor would use concurrent processes to control an alarm…
1-Describe situations in which denormalization of a database schema would be use
1-Describe situations in which denormalization of a database schema would be used? Answer in your own words and give examples. 2-Give a brief explanation of why the following quer…
1-Describe the three goals of cryptography.? 2-Draw a table showing if hashing a
1-Describe the three goals of cryptography.? 2-Draw a table showing if hashing and data signature meet the goals of cryptography ? 3-Cite at least two examples of incidents for ea…
1-Describe three approaches to exception handling in languages that do not provi
1-Describe three approaches to exception handling in languages that do not provide direct support for it? 2-Write a detailed comparison of the exception-handling capabilities of C…
1-EX2 $B6 is what type of reference to cell B6? Relative reference Mixed referen
1-EX2 $B6 is what type of reference to cell B6? Relative reference Mixed reference (column absolute, row relative) Mixed reference (column relative, row absolute) Absolute referen…
1-Edit the following class Date in to jGraspe Save it as E:\\Date.java then comp
1-Edit the following class Date in to jGraspe Save it as E:Date.java then compile that file in jGraspe then you will see in your drive a file: E:Date.class (You can use eclipse or…
1-Explain the code line by line public void forward() { if (state.equals(\"playi
1-Explain the code line by line public void forward() { if (state.equals("playing")) { Mp3 song = songs.get(currentSongPlaying); song.stop(); if (songs.size()-1>currentSongPlay…
1-Explain which three factors influence transaction costs and explain how they a
1-Explain which three factors influence transaction costs and explain how they affect transaction costs. 2-Explain which three aspects influence whether a transaction will be carr…
1-For an 8-way set associative cache that uses 32-bit address and has 16 blocks
1-For an 8-way set associative cache that uses 32-bit address and has 16 blocks and 32 bytes per block, how big is the cache in bytes? 2- For an 8-way set associative cache that u…
1-For cutomer table, there should be columns for: ID, first name, last name , Ad
1-For cutomer table, there should be columns for: ID, first name, last name , Add, city, state and zipcode 2- For product table, there should columns for: Product ID, Description,…
1-Give a BNF grammar (do not use EBNF) for the language that generates the set o
1-Give a BNF grammar (do not use EBNF) for the language that generates the set of all strings consisting of the keyword begin, followed by zero or more statements with a semicolon…
1-Given a QITEM table, from the QSALE DB, copy its content into NEWITEM table. 2
1-Given a QITEM table, from the QSALE DB, copy its content into NEWITEM table. 2-Make three unrelated but elementary changes (one record update, one new record insert, and one old…
1-I want to execute this query : my item table looks like that: seller table: cr
1-I want to execute this query : my item table looks like that: seller table: create table seller (    sellerID       INT IDENTITY(1000,1) NOT NULL,    sellerName       varchar(20…
1-Most application programs that allow text editing have a(n) editing spot that
1-Most application programs that allow text editing have a(n) editing spot that looks like a blinking vertical line on the screen and shows where the next change will be made to t…
1-New System development requires first to understand the system AS-IS, identify
1-New System development requires first to understand the system AS-IS, identify improvements, and propose the system TO-BE. This new system can be simple change or complex. It is…
1-Parent classes are than their child classes. a-less specific b-more specific c
1-Parent classes are than their child classes. a-less specific b-more specific c-easier to understand d-more cryptic 2-Abstract classes differ from other classes in that you . a-m…
1-Pointer variables are just memory addresses and can be assigned to one another
1-Pointer variables are just memory addresses and can be assigned to one another without regard to type. True False 2-The pointer in the last node of a linked list is often set to…
1-Prompt user for information that is then displayed on your page. 2-Have a form
1-Prompt user for information that is then displayed on your page. 2-Have a form with 4 text fields. Clicking the button on the form does calculation; value displayed on form. Don…
1-Select the sentence that is parallel in structure. Not only did Kroger add a b
1-Select the sentence that is parallel in structure. Not only did Kroger add a bank to its store, but also offers more organic food. Kroger added not only a bank to its store, but…
1-Shortest path below. Let a set of points S and two additional points a and b b
1-Shortest path below. Let a set of points S and two additional points a and b be given, with left of S and b right of S. Develop an algorithm to find the shortest path from a to …
1-Show the differences between transport mode and tunnel mode in which the IPsec
1-Show the differences between transport mode and tunnel mode in which the IPsec ESP service can be used. 2- Explain all services that provided by ESP of IPSEC. 3- show the format…
1-Specialized programs that allow particular input or output devices to communic
1-Specialized programs that allow particular input or output devices to communicate with the rest of the computer system are called A) operating systems. B) utilities. C) device d…
1-Suppose you are stranded on a desert island on which LIFO stacks are plentiful
1-Suppose you are stranded on a desert island on which LIFO stacks are plentiful, but no other data structures (arrays, lists, sets, maps, etc.) exist. You need a FIFO queue. How …
1-Th technology that make up the core functionality of Windows Server 2012 inclu
1-Th technology that make up the core functionality of Windows Server 2012 include NTFS, Active Directory, the Microsoft Server Manager, file and printer sharing, networking compo…
1-The HCS08 ...... addressing modes. 2- direct addressing (DIR) uses ..... bytes
1-The HCS08 ...... addressing modes. 2- direct addressing (DIR) uses ..... bytes of memory to indicate the address. 3- Extended addressing (EXT) uses .... bytes of memory to indic…
1-The definition of use case is: a)An informal method of interviews to gather re
1-The definition of use case is: a)An informal method of interviews to gather requirements b)A diagramming tool c)It is a CASE tool d)A formal method used by the System Analyst to…
1-The final program should accept a the file name of a \"grid file\" from the co
1-The final program should accept a the file name of a "grid file" from the command line. 1.1 The input file will be a space delimited stream of digits (allowing for easy use the …
1-The local T- shirt shop sells shirts that retail for $12. Quantity discounts a
1-The local T- shirt shop sells shirts that retail for $12. Quantity discounts are given as follows: Number of Shirts                         Discount 5-10                        …
1-The total magnetic field intensity at the location of Edmonton was 57652 nT on
1-The total magnetic field intensity at the location of Edmonton was 57652 nT on March 20, 2012, when I first wrote this question. On Feb. 19, 2013, it was 57569 nT. On January 6,…
1-This type of mouse is generally considered the traditional type and is current
1-This type of mouse is generally considered the traditional type and is currently the most widely used. A) Mechanical B) Cordless C) Wireless D) Optical 2-Recent versions of Micr…
1-Translate the following C code into IA-64. Your translation must be compliant
1-Translate the following C code into IA-64. Your translation must be compliant with the gcc compiler  conventions. long sum(long A[], long size, long i){  if ( i >= size || i …
1-Translate the following C code into IA-64. Your translation must be compliant
1-Translate the following C code into IA-64. Your translation must be compliant with the gcc compiler  conventions. long sum(long A[], long size, long i){  if ( i >= size || i …
1-Trojan horses can spread by ________. e-mailing themselves to victim computers
1-Trojan horses can spread by ________. e-mailing themselves to victim computers directly propagating to victim computers both A and B neither A nor B 2-A ________ is a flaw in a …
1-What happens to the CDP information if you change the hostname on one of the r
1-What happens to the CDP information if you change the hostname on one of the routers connected to it and then watch it every 20 seconds over the next four minutes? 2- How would …
1-When a copy of an object is made such that the addresses stored in the pointer
1-When a copy of an object is made such that the addresses stored in the pointers of the original are the same addresses as the corresponding pointers in the copy a deep copy is m…
1-When a copy of an object is made such that the addresses stored in the pointer
1-When a copy of an object is made such that the addresses stored in the pointers of the original are the same addresses as the corresponding pointers in the copy a deep copy is m…
1-When a program is launched, it is copied from the disk into memory where it is
1-When a program is launched, it is copied from the disk into memory where it is run. This program, now running under control of the shell, is called a ________________. 2-When a …
1-When constructing an ERD for a PET entity, we make up our own primary key call
1-When constructing an ERD for a PET entity, we make up our own primary key called "pet_id". We refer to this type of primary key as which of the following? Lost key Composite key…
1-Which of the following probably suffered the most financial damage from the Ta
1-Which of the following probably suffered the most financial damage from the Target breach? banks retailers other than Target consumers POS terminal vendors 2-The general name fo…
1-Which tab in the Task Manager shows you how resources such as memory and the C
1-Which tab in the Task Manager shows you how resources such as memory and the CPU are being used? This tab is in the Task Manager for both Win 7 and Win 8. 2-Both WIn 7 and Win 8…
1-Which would NOT likely be an entity on a car insurance ERD? a. Customer b. Pol
1-Which would NOT likely be an entity on a car insurance ERD? a. Customer b. Policy c. Agent d. Zip code e. Car ---------------- 2- A data flow diagram: a. Depicts the flow of dat…
1-Why are computer manufacturers constantly releasing faster computers? How do c
1-Why are computer manufacturers constantly releasing faster computers? How do computer users benefit from the increased speed? 2-If we think of the human brain as a computer, wha…
1-Why do you need to create a complete bibliographical data? 2-What you should d
1-Why do you need to create a complete bibliographical data? 2-What you should do to use secondary sources to find a research problem? 3-How can you find a research problem throug…
1-Write a Python function Multiplication Table() which takes a positive int valu
1-Write a Python function Multiplication Table() which takes a positive int value n and produce n by n multiplication table on the screen. The function does not return any value. …
1-Write a conditional that assigns the boolean value true to the variable fever
1-Write a conditional that assigns the boolean value true to the variable fever if the variable temperature is greater than 98.6 .So if temperature has the value 99.5, after your …
1-Write a method that inserts a node at the beginning of the linked list and a m
1-Write a method that inserts a node at the beginning of the linked list and a method that deletes the first node of the linked list 2-Repeat the above , but assume that the list …