Web development and programming
191828 questions • Page 198 / 3837
1. Below is a portion of a Wireshark capture of the beginning of the nmap scan.
1. Below is a portion of a Wireshark capture of the beginning of the nmap scan. What technique does nmap use to identify open ports on the host? 2. Nmap says it is using a “syn st…
1. Best security practices (BSPs) balance the need for information access with t
1. Best security practices (BSPs) balance the need for information access with the need for adequate protection while simultaneously demonstrating social responsibility. A) True B…
1. Best security practices (BSPs) balance the need for information access with t
1. Best security practices (BSPs) balance the need for information access with the need for adequate protection while simultaneously demonstrating social responsibility. A) True B…
1. Big-O, Big , Big For parts (a) – (e) circle ALL of the items that are TRUE. P
1.Big-O, Big , Big For parts (a) – (e) circle ALL of the items that are TRUE. Provide explanation. a.N2 + N2 log N is: (N2) O (N2) …
1. Big-Oh and Run Time Analysis: Describe the worst case running time of the fol
1. Big-Oh and Run Time Analysis: Describe the worst case running time of the following pseudocode functions in Big-Oh notation in terms of the variable n. e) void silly(int n, int…
1. Binary Tree Template Write your own version of a class template that will cre
1. Binary Tree Template Write your own version of a class template that will create a binary tree that can hold values of any data type. Demonstrate the class with a driver progra…
1. Binary pattern 01101111 represents floating point number. Decode the number a
1. Binary pattern 01101111 represents floating point number. Decode the number and enter the equivalent base 10 number in decimal form. 2. What is the output of the circuit if bot…
1. Bitwise operations Finish the Program You may only use the integer constants
1. Bitwise operations Finish the Program You may only use the integer constants given at the beginning. (You may use whatever integers you wish in string constants as long as th e…
1. Bob recently accepted a position as the information security and compliance m
1. Bob recently accepted a position as the information security and compliance manager for a medical practice. Which regulation is likely to most directly apply to Bob's employer?…
1. Both the merge sort and quick sort algorithms sort a list by partitioning it.
1. Both the merge sort and quick sort algorithms sort a list by partitioning it. Explain how the merge sort algorithm differs from the quick sort algorithm in partitioning the lis…
1. Brainstorm with your team members about what types of output are most appropr
1. Brainstorm with your team members about what types of output are most appropriate for a variety of executives and high-level managers of Dizzyland, a large theme park in Florid…
1. Briefly describe the criteria and properties for evaluating and constructing
1. Briefly describe the criteria and properties for evaluating and constructing modes of operation for block ciphers 2. With the aid of a diagram, explain the mechanism of operati…
1. Briefly describe the three-way handshake. 2. Why is a source and destination
1. Briefly describe the three-way handshake. 2. Why is a source and destination port number an important part of a TCP or UDP segment when establishing a connection? 3. …
1. Briefly describe what hash tables and keys are. 2. T/F Two collision resoluti
1. Briefly describe what hash tables and keys are. 2. T/F Two collision resolution techniques are open addressing and chaining. 3. Write an example of the function that g…
1. Briefly describe which elements of a class use the Pascal case, and what are
1. Briefly describe which elements of a class use the Pascal case, and what are the best practices regarding the naming of these elements. 2.Sometimes the terms Encapsulation and …
1. Briefly explain the end-to-end principle. 2. Why are there two separate, stan
1. Briefly explain the end-to-end principle. 2. Why are there two separate, standard internet transport protocol: TCP and UDP? How are they similar? How are they different? 3. Bri…
1. Briefly explain the problem solving and program development process (no more
1. Briefly explain the problem solving and program development process (no more than ½ page). 2. Why do we need to compile java programs before executing them? Clearly explain you…
1. Briefly explain the three components of STL. 2. Compare the three basic conta
1. Briefly explain the three components of STL. 2. Compare the three basic containers in STL (list, deque and vector) regarding their operations and efficiency, and briefly discus…
1. Briefly summarize the ways in which each of the cultural factors in Table 11.
1. Briefly summarize the ways in which each of the cultural factors in Table 11.1 applies to your school or work environment. TABLE 11.1 Elements of organizational culture • Dress…
1. Bubble Sort: the difference between which items are in order after pass #x? b
1. Bubble Sort: the difference between which items are in order after pass #x? bubble: selection b) What items are compared and possibly swapped in the bubble sort? c) What aspect…
1. Bubble Sort: the difference between which items are in order after pass #x? b
1. Bubble Sort: the difference between which items are in order after pass #x? bubble: selection b) What items are compared and possibly swapped in the bubble sort? c) What aspect…
1. Bubble Sort: the difference between which items are in order after pass #x? b
1. Bubble Sort: the difference between which items are in order after pass #x? bubble: selection b) What items are compared and possibly swapped in the bubble sort? c) What aspect…
1. Build a Gantt chart based on the tasks and dependencies supplied in the book
1. Build a Gantt chart based on the tasks and dependencies supplied in the book on page 136. Use the dependencies to build and test a screen form for a new system. Identify the cr…
1. Build a device which will input a 4-bit two\'s complement number and output t
1. Build a device which will input a 4-bit two's complement number and output the square of the number. Use Binary Coded Decimal representation for the input. Fill out the truth t…
1. Build a model of the problem if such a model is not provided. 2. Decide which
1. Build a model of the problem if such a model is not provided. 2. Decide which class it belongs to: P, NP, NP-Complete, PSPACE. 3. If possible: Propose a practical (polynomial-t…
1. Build a web site with for three pages. The narrative should describe which th
1. Build a web site with for three pages. The narrative should describe which three pages are fully functioning, and how to navigate to them. 3. The site must contain a mouseover-…
1. Build a web site with for three pages. The narrative should describe which th
1. Build a web site with for three pages. The narrative should describe which three pages are fully functioning, and how to navigate to them. 3. The site must contain a mouseover-…
1. Build a web site with for three pages. The narrative should describe which th
1. Build a web site with for three pages. The narrative should describe which three pages are fully functioning, and how to navigate to them. 3. The site must contain a mouseover-…
1. Build an Encoder and simulate your encoder. Be sure you have an enable on you
1. Build an Encoder and simulate your encoder. Be sure you have an enable on your encoder. This is very important for your overall design. Build a part for the encoder. There is n…
1. Build an error correcting code for a set of 50 codes. The code should be able
1. Build an error correcting code for a set of 50 codes. The code should be able to fix one error. Submit a file called ERROR_CORRECTING_CODE.txt containing the description of the…
1. By convention, how are configuration files separated from regular files? (NOT
1. By convention, how are configuration files separated from regular files? (NOTE: A practical effect of the separation is that they are not displayed by the default version of th…
1. By default, the JavaScript sort method uses __________ to sort the array pass
1. By default, the JavaScript sort method uses __________ to sort the array passed to it. (Points : 6) string comparison binary search linear search bubble…
1. C Language Floating point numeric types allows what? 2. The struct data type
1. C Language Floating point numeric types allows what? 2. The struct data type does what? 3. A pointer is what? 4. When complete information about the internals of a module is kn…
1. C++ - Write a phone book program that uses the following classes: Individual
1. C++ - Write a phone book program that uses the following classes: Individual - base class. Private data members: last name, first name, phone number. Student - deri…
1. C++ Program Create a class called Complex for performing arithmetic with comp
1. C++ Program Create a class called Complex for performing arithmetic with complex numbers. Complex numbers have the form: realPart + imaginaryPart * i where i is -1 Use double v…
1. C++ does not have an interface keyword like Java does. How can you make the e
1. C++ does not have an interface keyword like Java does. How can you make the equivalent in C++? 2. What do you write to find the length of a string when the string variable is d…
1. C++ has no array _______ checking, which means you can inadvertently store da
1. C++ has no array _______ checking, which means you can inadvertently store data past the end of an array. 2. Starting values for the elements of an array may be specified with …
1. CREATE TABLE AUTHOR(AUTHOR_ID INT PRIMARY KEY, AUTHOR_NAME VARCHAR(30)); 2. C
1. CREATE TABLE AUTHOR(AUTHOR_ID INT PRIMARY KEY, AUTHOR_NAME VARCHAR(30)); 2. CREATE TABLE INGREDIENT(INGRED_ID INT(5) PRIMARY KEY,INGRED_NAME VARCHAR2(30)); 3. CREATE TABLE RECI…
1. Caches are important to providing a high-performance memory hierarchy to proc
1. Caches are important to providing a high-performance memory hierarchy to processors. Below is a list of 32-bit memory address references, given as word addresses. 3, 180, 43, 2…
1. Calculate the area of a pentagon. Ask the user to enter the length from the c
1. Calculate the area of a pentagon. Ask the user to enter the length from the center of a pentagon to a vertex, then compute the area of the pentagon. The formula for computing t…
1. Calculate the moment of inertia of a CD, including the effect of the hole. Fo
1.Calculate the moment of inertia of a CD, including the effect of the hole. For a CD of radius 3.0 cm, estimate the percentage change in the moment of inertia due to a hole of ra…
1. Calculate the number of integers divisible by 4 between 50 and 500, inclusive
1. Calculate the number of integers divisible by 4 between 50 and 500, inclusive. 2. Hexadecimal digits are formed using either a numeric decimal digit or a letter from A to F. Ho…
1. Calculate the principal amounts in the loan amortization schedule as follows:
1. Calculate the principal amounts in the loan amortization schedule as follows: In cell E23, enter a formula using the PPMT function to determine the amount of the first …
1. Calculate the sender utilization of a satellite link that connects two device
1. Calculate the sender utilization of a satellite link that connects two devices at 100 Mbps, in which the length of the link is 500 km and the frame size is 1Kilobytes. Assume S…
1. Call Tree The Fibonacci sequence is 0 1 1 2 3 5 8 13 21 ... Each Fibonacci nu
1. Call Tree The Fibonacci sequence is 0 1 1 2 3 5 8 13 21 ... Each Fibonacci number is the sum of the preceding two Fibonacci numbers. The sequence starts with the first two Fibo…
1. Calling a Thread \'s ________ invokes the corresponding Runnable object\'s ru
1. Calling a Thread's ________ invokes the corresponding Runnable object's run method to perform a task. a. begin. b. processTask. c. start. d. None of the above. 2. Which stateme…
1. Can a child\'s FK field have a different name than the parent\'s PK field? Pr
1. Can a child's FK field have a different name than the parent's PK field? Provide examples. 2. Suppose you have a table ORDERS. ORDER_ID CUSTOMER_ID ORDER_DATE SHIP_DATE -…
1. Can someone explain this java program to me in detail step-by-step. I want a
1. Can someone explain this java program to me in detail step-by-step. I want a detailed explanation step by step public class Hangman { private String secretWord; private String …
1. Can someone explain this java program to me in detail step-by-step. I want a
1. Can someone explain this java program to me in detail step-by-step. I want a detailed explanation step by step on how this program was written and which technique was used publ…
1. Can the basic interpersonal communication model be used as an aid in understa
1. Can the basic interpersonal communication model be used as an aid in understanding the impact of smartphone usage? If so, how? 2. How have smartphones transformed the way in wh…
Subject
Web development and programming
Use Browse or pick another subject.