Web development and programming
191828 questions • Page 190 / 3837
1. 2. 3. 4. 5. 6. 7. 8. Consider the following class definition class rectangleT
1. 2. 3. 4. 5. 6. 7. 8. Consider the following class definition class rectangleType { public: void setLengthWidth(double x, double y); //Postcondition: length = x; width =…
1. 2. 3. 4. 5. When creating graphics inside a JFrame, the program continues to
1. 2. 3. 4. 5. When creating graphics inside a JFrame, the program continues to run once the JFrame has been instantiated. How can the program be set to terminate upon closing the…
1. 2. 3. 4. Account class public abstract class Account { int id; double balance
1. 2. 3. 4. Account class public abstract class Account { int id; double balance; public Account(){ id=0; balance=0; } public Account(int newID, double initialBalance){ id = newID…
1. 2. 3. Consider the following code double foo(int count,double base) { return
1. 2. 3. Consider the following code double foo(int count,double base) { return count * base; } int main (void) { int n=5; double y= 1.1; double x= foo(…
1. 2. 3. My Code: import java.awt.BorderLayout; import java.awt.Color; import ja
1. 2. 3. My Code: import java.awt.BorderLayout; import java.awt.Color; import java.awt.Font; import java.awt.GridBagConstraints; import java.awt.GridBagLayout; import java.awt.Gri…
1. 2. 3. questions please ired in asures? ree types i which they live, census da
1. 2. 3. questions please ired in asures? ree types i which they live, census data, and highest vided by the broker, you could establish an the list to identify likely purchasers …
1. 2. 4.The expression x *= i + j / y; is equivalent to: 5. A. Once. B. Never. C
1. 2. 4.The expression x *= i + j / y; is equivalent to: 5. A. Once. B. Never. C. 49 times. D. 50 times. 2. What is the output from the following program? #include <i…
1. 2. Construct a finite-state machine that models a newspaper vending machine t
1. 2. Construct a finite-state machine that models a newspaper vending machine that accepts $10 and $20 coins. The machine has a red button (R) that may bepressed at any stage to …
1. 2. Discuss the importance and value of register SvO when using syscall Write
1. 2. Discuss the importance and value of register SvO when using syscall Write a program in MIPS assembly language that implements the following a. Ask the user to input his/her …
1. 2. For the following code, which statement is TRUE ? class Point { private: d
1. 2. For the following code, which statement is TRUE? class Point { private: double y; double z; public: double x; }; Given c…
1. 2. In this section of the assignment your task is to write an assembly progra
1. 2. In this section of the assignment your task is to write an assembly program capable of calculating the product of two complex numbers. Remember that the product of the two c…
1. 2. The following program creates a simple Tkinter canvas on a window similar
1. 2. The following program creates a simple Tkinter canvas on a window similar to what's shown at right, initialized by the color #000000 (Black) import random import tkinter cla…
1. 25 points) Consider the following code segment. mov.w #mys, R14 mov.w #myaa,
1. 25 points) Consider the following code segment. mov.w #mys, R14 mov.w #myaa, R13 sub.w R14, R13 rra RI3 mov.w #0x7FFF, R7 6 7 1loop: mov.w R14+,R15 ige lskip mov.w R15, R7 10 1…
1. 3 points] For the following code snippets, fill in the box and pointer diagra
1. 3 points] For the following code snippets, fill in the box and pointer diagrams to show The double boxes represent IntList objects (see definition on page 2), with the left box…
1. 3 pts] Write a SQL statement that creates a table named \"Course\" and has th
1. 3 pts] Write a SQL statement that creates a table named "Course" and has three attributes named "CourselD". "CourseName". and InstructorlD". "CourselD" is the primary key of th…
1. 3-way Mergesort (8 points) Consider the following variant of mergesort, where
1. 3-way Mergesort (8 points) Consider the following variant of mergesort, where the fhrst call is 3wayMergesort (0,n-1,A) to sort the array AI0.n int 3wayMergesort (int i, int j,…
1. 30 points Write a C++ program that computes student grades for an assignment
1. 30 points Write a C++ program that computes student grades for an assignment as a percentage given each student’s score and the total points. The final score should be rounded …
1. 4 copies of a new book Distributed and Cloud Computing has been added to the
1. 4 copies of a new book Distributed and Cloud Computing has been added to the library. The price is $50.00 for each copy. Add the information to the book relation. Assume that b…
1. 4 marks Binary representation and algorithm analysis. Consider the following
1. 4 marks Binary representation and algorithm analysis. Consider the following algorithm, which manually counts up to a given numbernsing an array of 0's and 1's to mimic binary …
1. 4. Here is the Output 5. Please modify my code to fit the above output. impor
1. 4. Here is the Output 5. Please modify my code to fit the above output. import java.awt.BorderLayout; import java.awt.GridBagConstraints; import java.awt.GridBagLayout; import …
1. 40 points In mathematics, the Fibonacci numbers are the series of number that
1. 40 points In mathematics, the Fibonacci numbers are the series of number that exhibit the following pattern: 0,1,1,2,3,5,8,13,21,34,55,89,144,.... In mathematical notation the …
1. 6 points Implement a program to play the word Ladser gamt by completing the f
1. 6 points Implement a program to play the word Ladser gamt by completing the functions in wordLaddorstartry.oNote: you'll also need these files basicgraphugy.bfsigy, and quesuel…
1. 9 points Consider the following problem: Given a set of n points in the plane
1. 9 points Consider the following problem: Given a set of n points in the plane, pi (z?, y?), ?? = (x2,U2), . . . , pn-(Xn,Yn), determine which pair pi, pi are closest. distance …
1. A C program contains the following statements: char u, v = ‘A’ ; char *pu, *p
1. A C program contains the following statements: char u, v = ‘A’ ; char *pu, *pv = &v; *pv = v + 1; u = *pv + 1; pu = &u; Suppose each char…
1. A C program contains the following statements: char u, v = ‘A’ ; char *pu, *p
1. A C program contains the following statements: char u, v = ‘A’ ; char *pu, *pv = &v; *pv = v + 1; u = *pv + 1; pu = &u; Suppose each character o…
1. A DNA strand can be represented as a large string built with four character s
1. A DNA strand can be represented as a large string built with four character symbols, namely A, T, G, and C. Each symbol represents an amino acid. The DNA has a double helix str…
1. A DNA strand can be represented as a large string built with four character s
1. A DNA strand can be represented as a large string built with four character symbols, namely A, T, G, and C. Each symbol represents an amino acid. The DNA has a double helix str…
1. A DNA strand can be represented as a large string built with four character s
1. A DNA strand can be represented as a large string built with four character symbols, namely A, T, G, and C. Each symbol represents an amino acid. The DNA has a double helix str…
1. A RISC computer having a 1GHZ clock rate executes a program by performing 1.0
1. A RISC computer having a 1GHZ clock rate executes a program by performing 1.0 x 10^9 instructions having measured CPI of 2 with mix shown in table 1. what is the number of memo…
1. A SQL keyword that defines a column that can contain ONLY numbers of varying
1. A SQL keyword that defines a column that can contain ONLY numbers of varying length and precision is a ___ data type. NUMBER NULL Column alias VARCHAR2 CHAR 2. Giving a colu…
1. A TCP client is in the ESTABLISHED state. Answer the following question: a. T
1. A TCP client is in the ESTABLISHED state. Answer the following question: a. The TCP receives a close command from the application, what TCP packet is sent? b. What is the state…
1. A _______ is a message that tells the program that something has happened. (P
1. A _______ is a message that tells the program that something has happened. (Points : 2) Instance Event Modifier Multiplier 2. If an event is fired, and you want your program to…
1. A ________ implementation of a processor architecture is one in which common
1. A ________ implementation of a processor architecture is one in which common instructions can be initiated simultaneously and executed independently. 2. The term ________ refer…
1. A ________________________ constraint specifies that every entity in the supe
1. A ________________________ constraint specifies that every entity in the superclass must be a member of at least one subclass in the specialization. 2. A _____________clause in…
1. A __________________________ protocol is a technique that guarantees that mul
1. A __________________________ protocol is a technique that guarantees that multiple CPU's will access the same value of memory and not two different values. 2. A _______________…
1. A bear is an animal and a zoo contains many animals, including bears. Three c
1. A bear is an animal and a zoo contains many animals, including bears. Three classes Animal, Bear, and Zoo are declared to represent animal, bear and zoo objects. Which of the f…
1. A binary search tree is a binary tree with the added property that the left c
1. A binary search tree is a binary tree with the added property that the left child is less than the parent, which is less than or equal to the ___________. A. Left child B.…
1. A binary search tree is a binary tree with the added property that the left c
1. A binary search tree is a binary tree with the added property that the left child is less than the parent, which is less than or equal to the ___________. A. Left child B.…
1. A binary search tree is a binary tree with the added property that the left c
1. A binary search tree is a binary tree with the added property that the left child is less than the parent, which is less than or equal to the ___________. A. Left child B.…
1. A business intelligence system supports _______. A. strategic planning and ex
1. A business intelligence system supports _______. A. strategic planning and executive decision making B. just in time inventory decisions C. customer service requirements D. bus…
1. A business process is a sequence of activities for accomplishing a function.
1. A business process is a sequence of activities for accomplishing a function. 2. Resources are defined as tasks within a business process. 3.Actors are resources who are either …
1. A byte is a standardized unit of measure that is always 8-bits. 2. Bit patter
1. A byte is a standardized unit of measure that is always 8-bits. 2. Bit patterns have no intrinsic meaning. 3. The meaning of bit patterns is determined by the way the HW and SW…
1. A car is rolling down a ramp that is inclined at and angle of 5.8 degree with
1. A car is rolling down a ramp that is inclined at and angle of 5.8 degree with respect to horizontal. There is no friction acting from the road on the tires. Employ conservation…
1. A car is rolling down a ramp that is inclined at and angle of 6.5 degree with
1. A car is rolling down a ramp that is inclined at and angle of 6.5 degree with respect to horizontal. There is no friction acting from the road on the tires. Employ conservation…
1. A car of mass 1100 kg starts from rest at sea level and climbs a hill of alti
1. A car of mass 1100 kg starts from rest at sea level and climbs a hill of altitude 50 m. At the top of the hill the car has a speed of 25 m/s. From the top of the hill the drive…
1. A certain gamma-ray source emits photons that have a 20% chance of being foun
1. A certain gamma-ray source emits photons that have a 20% chance of being found as an electron-positron pair. The source emits 400 photons. How many individual material particle…
1. A certain hash function for a string of characters C-c0c1 . . .Gn-1 is given
1. A certain hash function for a string of characters C-c0c1 . . .Gn-1 is given by: m_ hash(C)Xex3 C¡ x 31(m-imod 232 (a) Suppose we want to find the first occurrence of a string …
1. A certain university assigns each of its students student numbers the rst tim
1. A certain university assigns each of its students student numbers the rst time they register for any course. These numbers are sequential integers that started at 0 many years …
1. A channel has more bandwidth than is necessary given data transmission speeds
1. A channel has more bandwidth than is necessary given data transmission speeds requirements in ________ transmission. A. normal radio B. reliable commercial C. spread spectrum D…
1. A charged particle with charge 7x10 -9 C moves at a speed of 1.5x10 6 m/s in
1. A charged particle with charge 7x10-9C moves at a speed of 1.5x106m/s in a magnetic field 0.53T as shown below. Find the magnitude of the force on this particle.Also please rem…
Subject
Web development and programming
Use Browse or pick another subject.