Web development and programming
191828 questions • Page 197 / 3837
1. Assume that you have an ALU where the functionality is controlled by a 2 to 4
1. Assume that you have an ALU where the functionality is controlled by a 2 to 4 multiplexer with inputs s0 s1. Assume that the inputs 10 cause the ALU to add two inputs, and the …
1. Assume the addition of the two functions: public void recursiveDelete(int ky)
1. Assume the addition of the two functions: public void recursiveDelete(int ky) { // calls the private version } private Node recursiveDelete(int ky, Node n); Write both function…
1. Assume the following function header: void fn( int &n ). Write an instruction
1. Assume the following function header: void fn( int &n ). Write an instruction for the function body that will store 10 into the caller's variable referred to by n. 2. How i…
1. Assume the following function header: void fn( int &n ). Write an instruction
1. Assume the following function header: void fn( int &n ). Write an instruction for the function body that will store 10 into the caller's variable referred to by n. 2. How i…
1. Assume the following function header: void fn( int &n; ). Write an instructio
1. Assume the following function header: void fn( int &n; ). Write an instruction for the function body that will store 10 into the caller's variable referred to by n. 2. How …
1. Assume the following parameters for rdt 2.1 (7 points) a) Round Trip Time (RT
1. Assume the following parameters for rdt 2.1 (7 points) a) Round Trip Time (RTT)10 ms b) A segment is 1500 bytes. Suppose that Bob sends 4 segments to Alice using rdt 2.1. Suppo…
1. Assume the following struct is declared for the permission list of a file in
1. Assume the following struct is declared for the permission list of a file in Linux. Each permission (u or g or o) is represented as an octal. For example, u=7 means rwx, u=5 me…
1. Assume there are 8 LEDs on a development board and also assume that LEDs blin
1. Assume there are 8 LEDs on a development board and also assume that LEDs blink with step 1 and 2 pattern recursively on 8 LEDs as illustrated in Fig. 1 . Also assume that …
1. Assume there are 8 LEDs on a development board and also assume that LEDs blin
1. Assume there are 8 LEDs on a development board and also assume that LEDs blink with step 1 and 2 pattern recursively on 8 LEDs . Also assume that the LEDs are active-high …
1. Assume there are cars driving on one side of the interstate which has two lan
1. Assume there are cars driving on one side of the interstate which has two lanes. At one point along the road there is construction that causes only one lane to continue. We wan…
1. Assume two employees Bob and Carol in the context of the Chinese Wall model.
1. Assume two employees Bob and Carol in the context of the Chinese Wall model. Consider two conflict of interest classes CO -X, Y} and CO12 U, V). Let CDX, CDY, CDU, and CDV be t…
1. Assume you are reading students grades from user for final exam, grades are s
1. Assume you are reading students grades from user for final exam, grades are supposed to be between 0 and 100 inclusively. Write a program that can handle any type of number tha…
1. Assume you have the following set of preferences of people over seats at a ta
1. Assume you have the following set of preferences of people over seats at a table: {"John", {Seat1, Seat2, Seat 3}, "Mary",{Seat2, Seat4}, "Bob", {Seat1, Seat3, Seat4}, "Alice",…
1. Assuming a 512 bytes memory and the page size is 32 bytes, CPU can address 1
1. Assuming a 512 bytes memory and the page size is 32 bytes, CPU can address 1 byte. What are the page numbers and offsets for the following logical address references: a. …
1. Assuming a 64-bit computer using virtual memory with 4 GB of physical memory.
1. Assuming a 64-bit computer using virtual memory with 4 GB of physical memory. Pages are 8 KB each. (a) Assuming a flat page table (i.e., not multilevel), what is the number of …
1. Assuming standard 1500 byte Ethernet max payloads: how many IPv4 fragments wi
1. Assuming standard 1500 byte Ethernet max payloads: how many IPv4 fragments will be needed to transfer 2000 bytes of user data with a single UDP send? And, how do the 2000 bytes…
1. Assuming that all switch ports on the Design network in Figure 1 are operatin
1. Assuming that all switch ports on the Design network in Figure 1 are operating in full-duplex mode; How many collision domains exist? How many b…
1. Assuming the Java language, determine as precise binding times as you can for
1. Assuming the Java language, determine as precise binding times as you can for the following attributes: (1 pt. each) (a) The maximum number of significant digits in a real numb…
1. Assuming the following classes have been defined: public class First { public
1. Assuming the following classes have been defined: public class First { public void method2() { System.out.println("First2"); } public void method3()…
1. Assuming there is a table called Grades that contains student_id for student
1. Assuming there is a table called Grades that contains student_id for student id, school_term for school term associated with the grade, course such as (SE352 or SE452) grade co…
1. Assuming you can do 2^20 encryptions per second and the key size is 40 bits,
1. Assuming you can do 2^20 encryptions per second and the key size is 40 bits, how many days would a brute force attack take? What happens if you double the key size? 2. You have…
1. Assuming you can do 2^20 encryptions per second and the key size is 40 bits,
1. Assuming you can do 2^20 encryptions per second and the key size is 40 bits, how many days would a brute force attack take? What happens if you double the key size? 2. You have…
1. At most, how many comparisons are required to search a sorted vector of 1023
1. At most, how many comparisons are required to search a sorted vector of 1023 elements using the binary search algorithm? (a) 10 (b) 8 (c…
1. At most, how many comparisons are required to search a sorted vector of 255 e
1. At most, how many comparisons are required to search a sorted vector of 255 elements using the binary search algorithm? (a) 10 (b) 8 (c) 7 …
1. At the end of the program, total the amount of money put into the machine, an
1. At the end of the program, total the amount of money put into the machine, and how many dollar bills, quarters, nickels, and dimes there are in the machine. 2. At the end of th…
1. At what social group is the add aimed? what social groups are represented in
1. At what social group is the add aimed? what social groups are represented in the ad? (hint: they are not always the same) 2. Does the advertisement reinforce or violate cultura…
1. Attached is the code to draw dots with mouse. Reproduce the code to make is f
1. Attached is the code to draw dots with mouse. Reproduce the code to make is functional 2. Modify the code so that is can draw rectangles entered with mouse (Function definition…
1. Attached is the code to draw dots with mouse. Reproduce the code to make is f
1. Attached is the code to draw dots with mouse. Reproduce the code to make is functional 2. Modify the code so that is can draw rectangles entered with mouse (Function definition…
1. Autocorrelation In this problem, you will simulate two error distributions wi
1. Autocorrelation In this problem, you will simulate two error distributions with the same mean and sd. One will be pure white noise (a normal distribution) and the other will…
1. B 2 A: -Wall b: -o 3 A Any wrong? Thanks Fill the circles for all filenames t
1. B 2 A: -Wall b: -o 3 A Any wrong? Thanks Fill the circles for all filenames that typically denote a binary file. Write the option flag for gcc used for the following Debug info…
1. B 2. D 3. A 4. A 5. C 6. A 7. B 8. A 9.C 10. D 11.B 12. C 13. D 14. A 15. D 1
1. B 2. D 3. A 4. A 5. C 6. A 7. B 8. A 9.C 10. D 11.B 12. C 13. D 14. A 15. D 16. C 17. C 18. B 19. D 20. A A student must correctly answer 15 of the 20 questions to pass the e…
1. BOOK(Book_title, Author_name, Book_type, List_price, Author_affiliation, Publ
1. BOOK(Book_title, Author_name, Book_type, List_price, Author_affiliation, Publisher_name) Primary Key: (Book_title, Author_name) FD1: (Book_title, Author_name) -> (Book_type,…
1. Bank account access simulation: The bank account should have withdraw and dep
1. Bank account access simulation: The bank account should have withdraw and deposit methods (subtract and add 1 from the balance respectively) You should have many (in the thousa…
1. BankAccount java public class BankAccount Represents a basic bank account. fi
1. BankAccount java public class BankAccount Represents a basic bank account. finals: As mentioned above, declare and use in place of literal constants as needed. Fields: 3 privat…
1. Barry Um is running an experiment to determine the concentration of collagen
1. Barry Um is running an experiment to determine the concentration of collagen in the bone of a 68-million-year-old T-Rex fossil. Use Barry's external standard data in the table …
1. Based on the Queue ADT specification, an application programmer has two ways
1. Based on the Queue ADT specification, an application programmer has two ways to check for an empty queue. Describe them and discuss when one approach might be preferable to the…
1. Based on the following circuit, use Bit Banging methods to write a program (A
1. Based on the following circuit, use Bit Banging methods to write a program (A acts as a Master PIC (RB2 is the CLK/Clock and RB3 is the Data Out/(Dout/SDO) to Transmit a set of…
1. Based on the given table Stocks choose the possible output if the following s
1. Based on the given table Stocks choose the possible output if the following sql statement is executed. SELECT COUNT(PRICE) FROM STOCKS; Select one: a. 1 b. 0 c. 2 d. 3 2. SELEC…
1. Based on what you have learned from Chapter 1, suggest three usability measur
1. Based on what you have learned from Chapter 1, suggest three usability measures that can be used directly to produce a practical evaluation of a system. Keep the goals of effic…
1. Be Reasonable: I am currently deployed to Iraq and lots of times you have mis
1. Be Reasonable: I am currently deployed to Iraq and lots of times you have mission after mission and you become tire and frustrated. When is time to counsel my employees I need …
1. Be prepared to define and provide examples of data, information, business int
1. Be prepared to define and provide examples of data, information, business intelligence, and knowledge. And the relationships between each. 2. Be prepared to analyze Porter’s Fi…
1. Be sure to produce a test driver program in a separate file/class from your a
1. Be sure to produce a test driver program in a separate file/class from your algorithm program a. (as demonstrated by examples posted for TestInsertionSort.java and InsertionSor…
1. Because UDP has no handshake, no flow control, and no congestion control, it
1. Because UDP has no handshake, no flow control, and no congestion control, it is a popular vector of attack – meaning there is little a site can do to prevent a flood of UDP pac…
1. Because the responsibility for IT security is shared across the organization,
1. Because the responsibility for IT security is shared across the organization, there is a risk of inconsistent implementation of security and a loss of central monitoring and co…
1. Before writing your proposal, check out the following resources Read through
1. Before writing your proposal, check out the following resources Read through the descniptions of AR, VR, and MR at the Reality Technologies link. Check out the Engadget video a…
1. Belady\'s anomaly states that ______ A. giving more memory to a process will
1. Belady's anomaly states that ______ A. giving more memory to a process will improve its performance B. as the number of allocated frames increases, the page fault rate may decr…
1. Below are five computational tasks. For each one, choose the data structure o
1. Below are five computational tasks. For each one, choose the data structure or abstract data type you feel best suited to the task from the following list: Stack, Queue, Hashta…
1. Below are five computational tasks. For each one, choose the data structure o
1. Below are five computational tasks. For each one, choose the data structure or abstract data type you feel best suited to the task from the following list: Stack, Queue, Hashta…
1. Below are four computational tasks. For each one, choose the data structure o
1. Below are four computational tasks. For each one, choose the data structure or abstract data type you feel best suited to the task from the following list: Stack, Queue, Hashta…
1. Below are three computational tasks. For each one, choose the data structure
1. Below are three computational tasks. For each one, choose the data structure or abstract data type you feel best suited to the task from the following list: Stack, Queue, Hasht…
Subject
Web development and programming
Use Browse or pick another subject.