Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 192 / 3837

1. A function that is called or summoned into action by its reference in another
1. A function that is called or summoned into action by its reference in another function is a ____. A) function prototype B) called function C) calling function D) function decla…
1. A function type is defined by the a. arguments passed to the function b. para
1. A function type is defined by the a. arguments passed to the function b. parameters declared in the function header c. function's return type. 2. An argument passed to a functi…
1. A generalization of the Caesar cipher, known as the Affine cipher, has the fo
1. A generalization of the Caesar cipher, known as the Affine cipher, has the following form: Assume that the alphabet is {a, b, …, z} and that a = 0, b = 1, …, z = 25. The key is…
1. A generic computer has a cache with a 50nsec access time and main memory with
1. A generic computer has a cache with a 50nsec access time and main memory with 200nsec access time. The CPU makes 5000 memory accesses, of these 450 were cache misses. a. Calcul…
1. A grammar for which two distinct parse trees are possible for the same string
1. A grammar for which two distinct parse trees are possible for the same string is considered to be ambiguous.?? True ?False 2. The lexical structure of a programming language is…
1. A group of network designers at the communication company SNet have a connect
1. A group of network designers at the communication company SNet have a connected graph G(E,V) in which nodes represent sites that want to communicate. Each edge e is a communica…
1. A group of statements that exist within a program for the purpose of performi
1. A group of statements that exist within a program for the purpose of performing a specific task is an) a. block b. parameter c. function d. expression 2. A design technique tha…
1. A group of students has devised a code made of four characters: 1st character
1. A group of students has devised a code made of four characters: 1st character is a hexadecimal digit (0-F) 2nd character is a letter that represents color (one of) . R-red O or…
1. A hacker group hacked into the Bay Area Rapid Transit (BART) system to protes
1. A hacker group hacked into the Bay Area Rapid Transit (BART) system to protest BART’s shut down of wireless communication in some BART stations. Was this a form of hacktivism? …
1. A hacker who sends an email but replaces his return remail address with a fak
1. A hacker who sends an email but replaces his return remail address with a fake one is _ the email address A Hardening B Malware C Spoofing D emulating 2.Which of the following …
1. A health-information website has many articles on health and medical issues,
1. A health-information website has many articles on health and medical issues, a chat room where people can discuss health issues with other users, and provisions for people to s…
1. A horizontal force of 30 N pulls a block of mass 3.6 kg across a level floor.
1.A horizontal force of 30 N pulls a block of mass 3.6 kg across a level floor. The coefficient of kinetic friction between the block and the floor is 2.Consider the rock and stri…
1. A key in a relational database table a. a proper subset of a candidate key. b
1. A key in a relational database table a.   a proper subset of a candidate key. b.   a proper superset of a candidate key. c.   a minimal superkey. d.   none of a., b., or c. are…
1. A key is a column or group of columns that identifies a unique row in a table
1. A key is a column or group of columns that identifies a unique row in a table. T/F 2. Each table in a database must have two or more primary keys. T/F 3. A DBMS and database me…
1. A list containing customer and customer purchase information has the followin
1. A list containing customer and customer purchase information has the following columns: customer name, location (of the customer, i.e., North, South, East, and West), customer …
1. A list is a collection of elements of the same type. 2. In order to maintain
1. A list is a collection of elements of the same type. 2. In order to maintain and process the list in an array, we need the array holding the list elements, a variable to store …
1. A list method E remove(int index) designed to remove and return the element a
1. A list method E remove(int index) designed to remove and return the element at the given index should throw IndexOutOfBoundsException when a. the index is 0 b.the index is nega…
1. A loop for which you do not know the number of iterations when you write it i
1. A loop for which you do not know the number of iterations when you write it is a(n) a. definite loop b. indefinite loop c. counted loop d. for loop 2. What is the major advanta…
1. A magnetic disk drive has the following characteristics: - 10,000 rpm spin ra
1. A magnetic disk drive has the following characteristics: - 10,000 rpm spin rate - 2 ns head-to-head switching time - 3 s average track-to-track seek time 5 platters, 1024 track…
1. A main function with the function calls to Getl and GetD. Declare any variabl
1. A main function with the function calls to Getl and GetD. Declare any variables and assign values as needed 2. Include the function definitions described below. Declare any var…
1. A manager manages a single store. A store always has a single manager. Based
1.       A manager manages a single store. A store always has a single manager. Based on this information, what crows foot symbols should be placed at positions 1 and 2 in the ini…
1. A method to simulate a dice roll In a game of Craps, players are betting on t
1. A method to simulate a dice roll In a game of Craps, players are betting on the outcome of a roll of two six-sided dice. Write a method called diceRoll that simulates the roll …
1. A microprocessor always has which of the following components on the chip its
1. A microprocessor always has which of the following components on the chip its A. UART Check for correct B. CPU C ROM choices D. Timers 2. Which of the following buses are alway…
1. A min-max heap is a data Structure that supports both deleteMin and deleteMax
1. A min-max heap is a data Structure that supports both deleteMin and deleteMax in O(logN) per operation. The structure is identical to a binary heap, but the heap-order property…
1. A mobile phone has a 3.48- × 1.96-inch screen size with a resolution of 326 p
1. A mobile phone has a 3.48- × 1.96-inch screen size with a resolution of 326 pixels per inch. (a) How many pixels does it have? (b) With 256 levels of brightness for each color …
1. A multipleprocessor consists of 100 processors, each capable of a peak execut
1. A multipleprocessor consists of 100 processors, each capable of a peak execution rate of 2Gflops. What is the performance of the system as measured in Gflops when 10% of the co…
1. A mutable iterator gives you read/write access to the element to which the it
1. A mutable iterator gives you read/write access to the element to which the iterator points. 2. A sequence container that is dynamic in size is a(n) 3. When an element is stored…
1. A name is a string of characters used to identify some entity in a program. T
1. A name is a string of characters used to identify some entity in a program. True False 2. When more than one variable name can be used to access the same memory location, the v…
1. A network consists of: a. phone numbers, telephones, trunk links, operators,
1.      A network consists of: a.   phone numbers, telephones, trunk links, operators, users, and automated attendants. b.   voice lines, data lines, and trunk links. c.   clients…
1. A network interface card (NIC) has a media access control (MAC) address of a)
1. A network interface card (NIC) has a media access control (MAC) address of          a)      032 bits length        b)      0 48 bits length        c)      128 bits length      …
1. A new website, Cougle, can only store and process an average of 5000 requests
1. A new website, Cougle, can only store and process an average of 5000 requests at any specific time, where each request can be completed in approximately 5ms. How many requests/…
1. A newly formed start-up company wants to do a job analysis for the following
1. A newly formed start-up company wants to do a job analysis for the following jobs: a. Clerk-Typist b. Financial Analyst c. HR Manager Discuss the type of data gathering techniq…
1. A newly hired networking wiz works through the weekend and proudly announces
1. A newly hired networking wiz works through the weekend and proudly announces at the Monday staff meeting now you techs cant hide from your duties. All problems with managed dev…
1. A palindrome is a string that reads the same front to back as it does back to
1. A palindrome is a string that reads the same front to back as it does back to front. Write a function that prints out if the input C-style string is a palindrome or not. Consid…
1. A particle is confined to be within a rectangular box of dimensions 1cm x1cm
1.     A particle is confined to be within a rectangular box of dimensions 1cm x1cm x 2cm. The magnitude of its momentum is constrained to be less than 3x10-24 kg m/s. What is the…
1. A periodic waveform has 0.4 ms time period. What is the frequency of its thir
1.    A periodic waveform has 0.4 ms time period. What is the frequency of its third harmonic? 2.    What is the total average power for a commercial AM transmitter with an unmodu…
1. A person had been sent a file in GIF format and saved it as file \"image.gif.
1. A person had been sent a file in GIF format and saved it as file "image.gif." For a particular application, the person wanted a file in JPEG format. Explain why the following a…
1. A pointer variable to a char contains _________ A) The address of a string va
1. A pointer variable to a char contains _________ A) The address of a string varaible. B) The address of a char variable. C) The address of a double variable. D) A value of a cha…
1. A program that will calculate and print the total pay for an employee who get
1. A program that will calculate and print the total pay for an employee who gets paid the normal rate for each hour less or equal to 40, and 1.5 times the normal rate for each ho…
1. A program with infinite recursion will act similarly to a program with an inf
1. A program with infinite recursion will act similarly to a program with an infinite loop. True or False? 2. Unchecked exceptions must be caught or propagated, or a program will …
1. A proposition is a simple declarative sentence a) True b) False 2. A simple d
1. A proposition is a simple declarative sentence a) True b) False 2. A simple declarative sentence must have a a) Prepositional phrase b) Subject and verb c) Verb and predicate d…
1. A query can contain ____ of the fields in the table. A) one B) some C) all D)
1. A query can contain ____ of the fields in the table. A) one B) some C) all D) all of the above 2. To rename a field, edit the field name in the ____ and press the Tab key. A) d…
1. A record and a variable are declared as follows: struct NameType { char first
1. A record and a variable are declared as follows: struct NameType { char firstName[17]; char lastName[17]; int age; float salary; }; NameType employee[10]; The base address of e…
1. A restriction on arrays in C++ is: The assignment operator may not be used to
1. A restriction on arrays in C++ is: The assignment operator may not be used to copy one array to another The size of the array must be specified when the program is written. All…
1. A sample TCP pseudo code is shown below. What version of reliable data transf
1. A sample TCP pseudo code is shown below. What version of reliable data transfer (rdt) is it using? Explain and point out features with the associated code in this particular ve…
1. A set of instructions to increase a programmer’s pay rate by 10% is hidden in
1. A set of instructions to increase a programmer’s pay rate by 10% is hidden inside an authorized program. It changes and updates the payroll file. What is this computer fraud te…
1. A shift register, as shown below, is a cascade of flip flops, sharing the sam
1. A shift register, as shown below, is a cascade of flip flops, sharing the same clock, in which the output of each flip-flop is connected to the 'data' input of the next flip-fl…
1. A simple internet forum allows users to log in, to start threads, to post rep
1. A simple internet forum allows users to log in, to start threads, to post replies in existing threads, to view a thread and all its replies, to view a list of all threads, and …
1. A string is stored in the memory at location string. Write an ARM assembly la
1. A string is stored in the memory at location string. Write an ARM assembly language program in ARMSimulator to count the number of characters in the given string. The string is…
1. A supervisor has brought to your office a confiscated computer that was alleg
1.   A supervisor has brought to your office a confiscated computer that was allegedly used to view inappropriate material. He has asked you to look for evidence to support this a…