Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 199 / 3837

1. Can two classes each define a method with the same name? (Points : 2) Yes, as
1. Can two classes each define a method with the same name? (Points : 2) Yes, as long as the method has the same number of parameters in each class. Yes, this is possible. No, thi…
1. Can two different classes contain methods with the same name? A. No. B. Yes,
1. Can two different classes contain methods with the same name? A. No. B. Yes, but only if the two classes have the same name. C. Yes, but only if the main program does not creat…
1. Can you access an instance variable from a static method? Explain why or why
1. Can you access an instance variable from a static method? Explain why or why not. 2. Can you access a static variable from an instance method? Explain why or why not. 3. Consid…
1. Can you tell by looking at a single specification statement in isolation whet
1. Can you tell by looking at a single specification statement in isolation whether it is a requirement or (engineering) design specification? How, or why not? 2. Suppose we are d…
1. Carefully read each case and assign each DETAILED procedure or evidence prese
1. Carefully read each case and assign each DETAILED procedure or evidence presented in above given case study to the appropriate OSCAR investigation phase. The objective of this …
1. Ceasar Cipher is one of the earliest classical substitution ciphers. It invol
1. Ceasar Cipher is one of the earliest classical substitution ciphers. It involves replacing each letter in the plaintext by a shifted letter in the alphabet used. Mathematically…
1. Cesium-137 is a radioactive byproduct of nuclear reactors such as the one tha
1. Cesium-137 is a radioactive byproduct of nuclear reactors such as the one that experienced partial meltdown in Chernobyl (then in the USSR, but now in Ukraine) on April 26, 198…
1. Change the IP address, 208.96.47.8 from dotted decimal notation to binary not
1. Change the IP address, 208.96.47.8 from dotted decimal notation to binary notation. Make sure each address has exactly 32 bits. 2. Change the IP addresses below from binary not…
1. Change the IP multicast address 233.50.18.2 to Ethernet multicast addresses.
1. Change the IP multicast address 233.50.18.2 to Ethernet multicast addresses. . 2. Answer the following question about client-server programs: a. Which program is running on the…
1. Change the department number of all employees with employee 7900’s job title
1. Change the department number of all employees with employee 7900’s job title to employee 7900’s current department number. (use the emp table) 2. Generate a listing showing the…
1. Change the size of the arrays: const int MAX_ROW = 40; const int MAX_COL = 80
1. Change the size of the arrays: const int MAX_ROW = 40; const int MAX_COL = 80; ***Make sure that only global variables you have in your program are Max_ROW and MAX_COL. Move an…
1. Changing a program to parallelize it can help shrink execution time of a prog
1.    Changing a program to parallelize it can help shrink execution time of a program significantly. Suppose that you’re analyzing a hypothetical software program written such th…
1. Changing the style does not change the layout (the position of the elements o
1. Changing the style does not change the layout (the position of the elements on the chart area) A. True B. False 2.Number formatting options for an axis include Currency, Date, …
1. Chapter 6 (pg. 404 problem 16) Programming Challenge 16- Overloaded Hospital
1. Chapter 6 (pg. 404 problem 16) Programming Challenge 16- Overloaded Hospital without Overloaded Functions Writhe a program that computes and displays the charges for a patient'…
1. Check all that apply. A. Since Ying\'s loop pointer, p , is type Base , no co
1. Check all that apply. A. Since Ying's loop pointer, p, is type Base, no compiler error will occur. B. Ying can call p->func() on each object in the loop and get distinct beh…
1. Check all that apply. A. Since Ying\'s loop pointer, p , is type Base , no co
1. Check all that apply. A. Since Ying's loop pointer, p, is type Base, no compiler error will occur. B. Ying can call p->func() on each object in the loop and get distinct beh…
1. Check all that apply. A. Since Ying\'s loop pointer, p , is type Base , no co
1. Check all that apply. A. Since Ying's loop pointer, p, is type Base, no compiler error will occur. B. Ying can call p->func() on each object in the loop and get distinct beh…
1. Check all that apply. A. Since Ying\'s loop pointer, p , is type Base , no co
1. Check all that apply. A. Since Ying's loop pointer, p, is type Base, no compiler error will occur. B. Ying can call p->func() on each object in the loop and get distinct beh…
1. Check the major Oracle network files file location within Oracle Home List th
1. Check the major Oracle network files file location within Oracle Home List the file name Give the Oracle SID/Service ID, home name, port number, and protocol Run following comm…
1. Check the major Oracle network files file location within Oracle Home List th
1. Check the major Oracle network files file location within Oracle Home List the file name Give the Oracle SID/Service ID, home name, port number, and protocol Run following comm…
1. Chess Board Write a program that draws an 8 X 8 chess board, with alternating
1. Chess Board                   Write a program that draws an 8 X 8 chess board, with alternating gray and white squares. You can use the SetTextColor and Gotoxy procedures from …
1. Choices: backcolor, location, name, font, size Identity which property could
1. Choices: backcolor, location, name, font, size Identity which property could be set so that a Form object would perform the following function: 2. Which namespace includes most…
1. Choose a correct one. The order by\' command is especially useful when the li
1. Choose a correct one. The order by' command is especially useful when the listing order is important. The default order is ascending, descending (2 points (3 points) 2. What ty…
1. Choose a position on the following statement: \"Computers benefit the natural
1. Choose a position on the following statement: "Computers benefit the natural environment." (You may choose to argue for the proposition or against it.) 2. Research the subject …
1. Choose the API you will use for the project and, 2. Write a brief description
1. Choose the API you will use for the project and, 2. Write a brief description of the web application you are going to make with that API. If I foresee any problems with the API…
1. Choose three publicly available VPNs. Which would be the best choice for some
1. Choose three publicly available VPNs. Which would be the best choice for someone who wants to use it with a small business? Rationale? a. VPN - Clearly summarize which of three…
1. Chose match(es) for each given basic/extended regular expression (maybe multi
1. Chose match(es) for each given basic/extended regular expression (maybe multiple correct matches) and describe the pattern of matched string for 3),4), 6).11). e.g. 'abea (exte…
1. Circle one of True or False in the following questions. log(n) = O (n) True o
1. Circle one of True or False in the following questions. log(n) = O (n)                                  True or False   f(n) + g(n) = O (max (f(n)) ; g(n)) True or False n = o …
1. Circle the integrity constraint(s) that is violated in the following. Domain
1. Circle the integrity constraint(s) that is violated in the following. Domain constraint                  Entity constraint                     Referential constraint 2. Discuss…
1. Cisco switches have a feature called PortFast, which corresponds to an edge p
1. Cisco switches have a feature called PortFast, which corresponds to an edge port in RSTP.  When should this feature be employed in a switched network? What problems does it sol…
1. Class WeightedGraph in this chapter is to be extended to include a removeVert
1. Class WeightedGraph in this chapter is to be extended to include a removeVertex operation, which removes a vertex from the graph. Deleting a vertex is more complicated than del…
1. Class WeightedGraph in this chapter is to be extended to include a removeVert
1. Class WeightedGraph in this chapter is to be extended to include a removeVertex operation, which removes a vertex from the graph. Deleting a vertex is more complicated than del…
1. Class specification Box.h models a box. Include private data for length, widt
1.         Class specification Box.h models a box.   Include private data for length, width, and height. Include a default constructor setting box dimensions to 1 x 1 x 1, a param…
1. Classify each of the following statements as true or false: a. In a computer
1. Classify each of the following statements as true or false: a. In a computer providing virtual memory, the number of bits in a logical address can exceed the number of bits in …
1. Classify each of the following statements as true or false: a. When a stack i
1. Classify each of the following statements as true or false: a. When a stack is used, reuse of a released memory area is automatic. b. PCD data can be allocated on a stack. c. T…
1. Classify each of the systems requirements below, as a functional requirement,
1. Classify each of the systems requirements below, as a functional requirement, a quality requirement, a design constraint, or a process constraint a. The client daemon must be i…
1. Clunker Motors Inc. is recalling all vehicles from model years 1995-1998 and
1. Clunker Motors Inc. is recalling all vehicles from model years 1995-1998 and 2004-2006. An int variable named norecall has been declared. Given another int variablemodelYear wr…
1. Code Assignment/Exercise Exercise 1 A. Update the Fraction class given in the
1. Code Assignment/Exercise Exercise 1 A. Update the Fraction class given in the Lecture notes or as discussed in class meetings as follows, 1. Add your FIRST NAME and the initial…
1. Code a SQL statement to INSERT a new row into the book table (make up any val
1. Code a SQL statement to INSERT a new row into the book table (make up any values that work) but use a date function to pass the published date value in the following format....…
1. Code an event handler for the click event of the elements in the list. Th
1. Code an event handler for the click event of the <a> elements in the list. This event handler should start by getting the URL for the image to be displayed. Then, it shou…
1. Code is already written please show all outputs and comment on function of co
1. Code is already written please show all outputs and comment on function of code. 2. These are Python 3 programs. Please show outpouts and comment on fuctions. Note: this is a b…
1. Code should call member function printUniversal of the Time class. Time clock
1. Code should call member function printUniversal of the Time class. Time clock(11,22,43); Time *clockPtr = &clock; (*clockPtr)->printUniversal(); 2. Code defines an abstr…
1. Coding Guidelines (20 points) (a) (10 points) Rewrite the following according
1. Coding Guidelines (20 points) (a) (10 points) Rewrite the following according to the coding guidelines. (b) (10 points) Mention 5 features of this class that violate the coding…
1. Command line arguments in Perl are stored in a a. scalar b. resource c. array
1. Command line arguments in Perl are stored in a a. scalar b. resource c. array d. hash 2. Elements of a split line can be glued together with a. combine b. join c. push d. shift…
1. Comment on the major differences and similarities between the ARMv7 and MIPS
1. Comment on the major differences and similarities between the ARMv7 and MIPS instruction set architectures. Specifically, look at similarities and differences in register count…
1. Comment on the major differences and similarities between the ARMv7 and MIPS
1. Comment on the major differences and similarities between the ARMv7 and MIPS instruction set architectures. Specifically, look at similarities and differences in register count…
1. Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for
1. Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently long such that 5 consecutive data segments and their correspo…
1. Compare and Contrast Dynamic vs Static memory and where in RAM memory each ty
1. Compare and Contrast Dynamic vs Static memory and where in RAM memory each type of structure is placed. Describe Virtual Memory. 2. Compare and contract Linked List data struct…
1. Compare and contrast analog and digital signals. 2. What is duplex communicat
1. Compare and contrast analog and digital signals. 2. What is duplex communication? 3. What is attenuation? 4. What is latency? 5. What is noise? 6. What is the relationship betw…
1. Compare and contrast between Client/Server and Peer-to-Peer networks. What ar
1. Compare and contrast between Client/Server and Peer-to-Peer networks. What are some of the business benefits of using such networks? Support your answer with examples. 2. Use y…