Web development and programming
191828 questions • Page 194 / 3837
1. Add the following method to the Point class: public double distance(Point oth
1. Add the following method to the Point class: public double distance(Point other) Returns the distance between the current Point object and the given other Point object. The dis…
1. Add three classes to the project: a Filter class, a Capacitor class, and a Re
1. Add three classes to the project: a Filter class, a Capacitor class, and a Resistor class. 2. You may use the Resistor class files from the Week 2 lab for this lab. 3. The Capa…
1. Adding more children per node in a search tree, ______. a. increases the numb
1. Adding more children per node in a search tree, ______. a. increases the number of comparisons at each node during the search for a value b. increases the number of the roots…
1. Address Translation (20 points) Below, you are provided with a snapshot of a
1. Address Translation (20 points) Below, you are provided with a snapshot of a 4 entry, fully associative TLB (translation lookaside buffer) and a page table. If needed, you may …
1. After 15 years working as a software engineer, Alice finally has enough money
1. After 15 years working as a software engineer, Alice finally has enough money and time to fulfill her dream to open a pizza shop in Santa Cruz. She has the recipes for n differ…
1. After TGS verifies the client’s identity, TGS will issue a ticket to the clie
1. After TGS verifies the client’s identity, TGS will issue a ticket to the client. What information items are included in this ticket? 2. After a while, the client will receive t…
1. After comparing the destination IP address to its routing table entries, a ro
1. After comparing the destination IP address to its routing table entries, a router will do one of three things. List each of the possible scenarios and the condition which cause…
1. After examining the table carefully identify the functional dependencies 2. I
1. After examining the table carefully identify the functional dependencies 2. Identify the candidate keys 3. Put the previous relation (table) in a normalized Boyce-Codd Normal F…
1. After reading the attached memo, please rewrite it to reflect the three Cs: C
1. After reading the attached memo, please rewrite it to reflect the three Cs: Clear, Concise, and Concrete. 2. Certain behaviors will make you a more effective member of a team o…
1. After selecting a cell in the source data range, what is the process to creat
1. After selecting a cell in the source data range, what is the process to create a PivotTable report? A. Click the Insert > PivotTable Ribbon icon and then define the structu…
1. After the following code runs, there will be pointers to the heap from for(in
1. After the following code runs, there will be pointers to the heap from for(int i=0;i allocs[i]=malloc(i*2+128); if(i>0) *(void**)(allocs[i])=allocs[i-1]; } (A) .…
1. After this line of code executes what will be the value of “result”? int resu
1. After this line of code executes what will be the value of “result”? int result = 10 % 5; 2. After this line of code executes what will be the value of “result”? …
1. After you create an array variable, you still need to ____ memory space. a. c
1. After you create an array variable, you still need to ____ memory space. a. create c. reserve b. organize d. dump 2. When you initialize parallel arrays, it is convenient to us…
1. After your Linux system has been loaded, you are placed at a graphical termin
1. After your Linux system has been loaded, you are placed at a graphical terminal (tty1). Instead of logging in to this graphical terminal, press CtrlþAltþF2 to switch to a comma…
1. Age Calculator Want to find out how old you\'ll be? Calculate it! Store your
1. Age Calculator Want to find out how old you'll be? Calculate it! Store your birth year in a variable. Store a future year in a variable. Calculate your 2 possible ages for that…
1. Agricultural runoff is a major source of pesticide and excess nutrient pollut
1. Agricultural runoff is a major source of pesticide and excess nutrient pollution. This is a particular problem in Indiana. Why do you think more has not been done to control th…
1. Ajax can use the following data formats: 2. ____ is a combination of JavaScri
1. Ajax can use the following data formats: 2. ____ is a combination of JavaScript, HTML, CSS, and the Document Object Model. 3. In JavaScript, _____ errors are problems in the de…
1. Alan and Bill agree (through a public exchange) on using the Diffie-Hellman a
1.Alan and Bill agree (through a public exchange) on using the Diffie-Hellman algorithm to create a common secret key. They also agree on two public numbers: q (large prime number…
1. Alan is developing a business impact assessment for his organization. He is w
1. Alan is developing a business impact assessment for his organization. He is working with business units to determine the maximum allowable time to recover a particular function…
1. All java classes are derived from A) java.lang.Class B) java.util.Name C) jav
1. All java classes are derived from A) java.lang.Class B) java.util.Name C) java.lang.Object D) java.awt.Window 2. The jdb is used to A) Create a jar archive B) Debug a java prog…
1. All java classes are derived from A) java.lang.Class B) java.util.Name C) jav
1. All java classes are derived from A) java.lang.Class B) java.util.Name C) java.lang.Object D) java.awt.Window 2. The jdb is used to A) Create a jar archive B) Debug a java prog…
1. All of the following are challenges associated with natural language processi
1. All of the following are challenges associated with natural language processing EXCEPT -dividing up a text into individual words in English. understanding the context in which …
1. All of the following are examples of real security and privacy risks EXCEPT:
1. All of the following are examples of real security and privacy risks EXCEPT: A. hackers. B. spam. C. viruses. D. identity theft. 2. A process known as ____________ is used by l…
1. All years that are evenly divisible by 400 or are evenlydivisible by four (4)
1. All years that are evenly divisible by 400 or are evenlydivisible by four (4) and not evenly divisible by 100 are leap years. For example, since 1600 isevenly divisible by 400,…
1. Allocate memory for houseHeight using the new operator. #include u
1. Allocate memory for houseHeight using the new operator. #include <iostream> using namespace std; int main() { double* houseHeight = 0; /* Your solution goes here */ *hous…
1. Although SSL handles the encryption part of a secure e-commerce transaction,
1. Although SSL handles the encryption part of a secure e-commerce transaction, a digital certificate is necessary to provide server identification. A) True B) False 2. The _____ …
1. An Armstrong number of three digits is an integer such that the sum of the cu
1. An Armstrong number of three digits is an integer such that the sum of the cubes of its digits is equal to the number itself. For example, 153 is an Armstrong number since 1^3 …
1. An ERP systems a systematic process for developing a production plan that dra
1. An ERP systems a systematic process for developing a production plan that draws on the information available in the ERP system database. Outline this process and identify the s…
1. An Electronic Health Record System needs to be developed for a clinic that tr
1. An Electronic Health Record System needs to be developed for a clinic that treats patients suffering from cancer. This clinic happens to be in a rural setting where most of the…
1. An Excel file is referred to as ain): (a) worksheet (b) workbook (c) document
1. An Excel file is referred to as ain): (a) worksheet (b) workbook (c) document (d) database 2. Which of the following may be included in a formula? (a) Cell references (b) Funct…
1. An RSA cipher has the public key pq = (5)(13) = 65 and e = 7 a) Encrypt this
1. An RSA cipher has the public key pq = (5)(13) = 65 and e = 7 a) Encrypt this Plain Text Message M = J b) Use the Extended Euclidean algorithm to find the greatest common diviso…
1. An abstract class can declare instance data? 2. An abstract class can extend
1. An abstract class can declare instance data? 2. An abstract class can extend another class? 3. An abstract class can extend a non-abstract class? 4. An interface is an abstract…
1. An algorithm coded in Python usually runs slightly faster than the same algor
1. An algorithm coded in Python usually runs slightly faster than the same algorithm coded in C. A. True B. False 2. When analyzing an algorithm, one must be careful to determine …
1. An analog voltage is in the range of 0-5V. If it can be measured with an accu
1. An analog voltage is in the range of 0-5V. If it can be measured with an accuracy of + -50mv, at most how many bits of information is conveyed? 2. The babylonians developed the…
1. An anonymous function __________. (Points : 6) has no identifier after the ke
1. An anonymous function __________. (Points : 6) has no identifier after the keyword function is registered as an event handler at the same time it is created neither a nor b bot…
1. An argument is a) a variable without a data type b) when the compiler disagre
1. An argument is a) a variable without a data type b) when the compiler disagrees with your syntax c) the data passed to a function d) a value with an undeter…
1. An array a. is not used in Python b. is used when there is only one variable
1. An array a. is not used in Python b. is used when there is only one variable c. is not used in programming d. is a data structure 2. Python strings have a built-in split method…
1. An array a. is not used in Python b. is used when there is only one variable
1. An array a. is not used in Python b. is used when there is only one variable c. is not used in programming d. is a data structure 2. Python strings have a built-in split method…
1. An array a. is not used in Python b. is used when there is only one variable
1. An array a. is not used in Python b. is used when there is only one variable c. is not used in programming d. is a data structure 2. Python strings have a built-in split method…
1. An array is a collection of data items of different types using a single name
1. An array is a collection of data items of different types using a single name (T / F) 2. A structure can be declared without a tag name (T F). 3. A structure variable can be in…
1. An attacker has discovered a vulnerable computer with the IP address 192.168.
1. An attacker has discovered a vulnerable computer with the IP address 192.168.201.10. What tool might the attacker use to determine if there are other vulnerable computers on th…
1. An authentication server is an application that facilitates the authenticatio
1. An authentication server is an application that facilitates the authentication process of any client who attempts to access a network. It stores the usernames and passwords tha…
1. An automobile part trading company would like to store the following attribut
1. An automobile part trading company would like to store the following attributes for each part in a database table: PartNo: 10 bytes Name: 30 bytes UintMeasure: 5 bytes UnitCost…
1. An electromagnetic wave is traveling straight down toward the center of the E
1. An electromagnetic wave is traveling straight down toward the center of the Earth. At a certain moment in time the electric field points west. In which direction does the magne…
1. An employer hires two students, a CS major and an XX major to do handyman wor
1. An employer hires two students, a CS major and an XX major to do handyman work under the following conditions: - The duration of the job is between 21 and 30 days, each choice …
1. An example of a high level code is: a. C c. Pascal e. all the above b. COBOL
1. An example of a high level code is: a. C c. Pascal e. all the above b. COBOL …
1. An experimental addition to UNIX allows a user to connect a watchdog program
1. An experimental addition to UNIX allows a user to connect a watchdog program to a file. The watchdog is invoked whenever a program requests access to the file. The watchdog the…
1. An informal Englishdescription of the main ideas behind your solution 2. A ma
1. An informal Englishdescription of the main ideas behind your solution 2. A mathematical description of all components of automatonM (See hint below.) 3. A proof that L(M) = eve…
1. An information security program should include the following elements: A. Dis
1. An information security program should include the following elements: A. Disaster recovery and business continuity planning, and definition of access control requirements and …
1. An instruction at location $5000 branches to location $F42AB. Which command s
1. An instruction at location $5000 branches to location $F42AB. Which command should be used? a. CALL b. JSR c. BRA d. LBRA 2. What is the contents of memory location $3FFF after…
Subject
Web development and programming
Use Browse or pick another subject.