Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 213 / 3837

1. Distinguish between primary and secondary storage. 2. Identify the important
1. Distinguish between primary and secondary storage. 2. Identify the important characteristics of secondary storage. 3. Describe hard disk platters, tracks, sectors, cylinders, a…
1. Divide a document into a(n) in onder to format different parts of the documen
1. Divide a document into a(n) in onder to format different parts of the document with different page Iayout settings 32. A(n) is the box formed by the intersection of a column an…
1. Do DFS and BFS find the same connected components of for a given graph? 2. :
1. Do DFS and BFS find the same connected components of for a given graph? 2. : What is the necessary condition that DFS or BFS can find a path between any two vertices? If there …
1. Do Problem 8 in the text, at the end of section 4.11. Make sure the M-file ha
1. Do Problem 8 in the text, at the end of section 4.11. Make sure the M-file has the proper amount of comment lines, indented text, white space, etc. Also, make sure the names of…
1. Do coding standards exist for C++? 2.Consistency is one key piece that helps
1. Do coding standards exist for C++? 2.Consistency is one key piece that helps make code readable. Unfortunately, even though you can get programmers to agree up front on a parti…
1. Do some Internet research on Chevron’s use of seismic imaging technology. Bri
1. Do some Internet research on Chevron’s use of seismic imaging technology. Briefly explain how it works and how it has helped Chevron discover new oil and gas reservoirs. C6-7 2…
1. Do the following base conversions. (10 pts) a. Convert the binary number 1101
1. Do the following base conversions. (10 pts)       a. Convert the binary number 110100 to decimal                                                                 b. Convert the …
1. Do the following problems a. Find the 32-bit and 64-bit 2’s complement, 1’s c
1. Do the following problems a. Find the 32-bit and 64-bit 2’s complement, 1’s complement and sign-magnitude representations of the decimal value: 32767. b. Find the 32-bit and 64…
1. Do the following problems: Taking on the role of an advocate of RISC design,
1. Do the following problems: Taking on the role of an advocate of RISC design, write a critique of the CISC approach (disadvantages, issues, concerns, limitations, restrictions, …
1. Do we really need a major change in the way the IS function is structured...a
1. Do we really need a major change in the way the IS function is structured...are the necessary changes just minor modifications to accommodate normal growth in computer uses...w…
1. Do you consider Pinterest a form of disruptive or sustaining technology? 2. C
1. Do you consider Pinterest a form of disruptive or sustaining technology? 2. Categorize Pinterest as an example of Web 1.0 (ebusiness) or Web 2.0 (Business 2.0). 3. Describe the…
1. Download several books as plain text (i.e., .txt files), which you will use t
1. Download several books as plain text (i.e., .txt files), which you will use to test your application. A good place to find free books is Project Gutenberg. Choose a variety boo…
1. Download the input file, employees.dat, from my public directory. While you a
1. Download the input file, employees.dat, from my public directory. While you are in your own cs111 directory, use the copy command (cp). [smith001@empress cs111] cp /cs/slott/cs…
1. Download the program submission template. 2. Create new project, Lab7. Create
1. Download the program submission template. 2. Create new project, Lab7. Create new package, lab7. Create new class, Main. 3. Study the example code below which is a program that…
1. Draft a program that adds two BCD numbers (9-digits each). The first BCD numb
1.     Draft a program that adds two BCD numbers (9-digits each). The first BCD number is stored in an array named myAuburnID, and the second in an array named All1s. The first nu…
1. Drag and drop a function name to the appropriate algorithm below (fill in the
1. Drag and drop a function name to the appropriate algorithm below (fill in the blank with A & B) : Algorithm blank :    for j = n -1, n - 2, ..., i do       A[ j + 1 ] A[ j …
1. Drag and drop a function name to the appropriate algorithm below (in blank) :
1. Drag and drop a function name to the appropriate algorithm below (in blank) : Algorithm blank :    for j = n -1, n - 2, ..., i do       A[ j + 1 ] A[ j ]    A[ i ] e    n n + 1…
1. Draw a UML diagram for a class hierarchy that contains data definition classe
1. Draw a UML diagram for a class hierarchy that contains data definition classes and the relationships between the following data definition classes: Fruit, Banana, Apple. Assume…
1. Draw a picture or write a pseudocode for solving the problem using compositio
1. Draw a picture or write a pseudocode for solving the problem using composition 2. Write an m-file script. The mathlab function "clock" returns a vector that contains six elemen…
1. Draw a structured flowchart describing the steps you would take to cook popco
1.      Draw a structured flowchart describing the steps you would take to cook popcorn in a microwave oven. Include at least one decision. 2.      Create the pseudocode to go alo…
1. Draw the BST that results when the words are inserted in the order given belo
1. Draw the BST that results when the words are inserted in the order given below. using, while, static, private, enum, case, return, public                  < 8 > 2. Given …
1. Draw the UML class relationships in PowerPoint. Name the file BookUML.ppt. 2.
1. Draw the UML class relationships in PowerPoint. Name the file BookUML.ppt. 2. Write program WriteFile that writes the book data to books.txt. The data array is no longer used. …
1. Driver\'s License Exam: The local Driver\'s License Office has asked you to w
1. Driver's License Exam: The local Driver's License Office has asked you to write a program that grades the written portion of the driver's license exam. The exam has 20 multiple…
1. Driver’s License Exam Create a New Project called License. The local Driver’s
1. Driver’s License Exam Create a New Project called License. The local Driver’s License Office has asked you to write a program that grades the written portion of the driver’s li…
1. During systems implementation, the ________ serves as a blueprint for constru
1. During systems implementation, the ________ serves as a blueprint for constructing the new system. a. system design specification b. release plan c. design walkthrough d. struc…
1. E-Commerce: Mechanisms, Infrastructure, and Tools a. e-market place Define an
1. E-Commerce: Mechanisms, Infrastructure, and Tools a. e-market place Define and describe its attributes. b. Define a digital product and provide five examples. c. What are infor…
1. EPON MAC Protocol Communication established through………… a. Virtual tunneling
1.       EPON MAC Protocol Communication established through………… a. Virtual tunneling b. Non-virtual tunneling c. Both a and b d. None of the these    2.       Why should organiza…
1. EPON MAC Protocol Communication established through………… a. Virtual tunneling
1.       EPON MAC Protocol Communication established through………… a. Virtual tunneling b. Non-virtual tunneling c. Both a and b d. None of the these    2.       Why should organiza…
1. Each of the following is a true statement about highlighting except Please pr
1. Each of the following is a true statement about highlighting except Please provide your answer in the rich text box. A Highlighting techniques can be used singularly or in comb…
1. Each of the following is true about a condition-name EXCEPT: It is coded on l
1. Each of the following is true about a condition-name EXCEPT: It is coded on level 88. It must have a PIC clause. It has a truth value. It is used to make programs easier to rea…
1. Each of the following languages is the intersection of two simpler languages
1. Each of the following languages is the intersection of two simpler languages over the alphabet {a, b}. For each, construct the DFA
1. Each of these problems gives \"before\" conditions and an instruction. Give t
1.      Each of these problems gives "before" conditions and an instruction. Give the indicated "after" state. Before Instruction executed After (a) ECX: 00 00 BF 7A mov ecx, -89 …
1. Each time a new state is added or updated in the States table verify that the
1. Each time a new state is added or updated in the States table verify that the StateCode follows this pattern - First 5 character same as the StateName followed by the number of…
1. Early versions of Windows did not support true preemptive multitasking. Inste
1. Early versions of Windows did not support true preemptive multitasking. Instead, the designers of Windows provided something they called "cooperative multitasking" in which eac…
1. Earned value measures: a.ROI, NPV and PBP b.Quality c.Progress against budget
1. Earned value measures: a.ROI, NPV and PBP b.Quality c.Progress against budget dStatus of deliverables 2. If a project has an SPI of 90% and a CPI of 110%, it is: a.over budget,…
1. Electronic data are more susceptible to destruction, fraud, error, and misuse
1. Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that: a. have the potential to be a…
1. Email must be sent using SMTP in both directions through the firewall, but it
1. Email must be sent using SMTP in both directions through the firewall, but it must be relayed via the DMZ gateway that provides header sanitization and content filtering. Exter…
1. Employee and ProductionWorker Classes Design a class named Employee. The clas
1. Employee and ProductionWorker Classes Design a class named Employee. The class should keep the following information in • Employee name • Employee number • Hire date Write one …
1. Employee records stored in order from highest-paid to lowest-paid have been o
1. Employee records stored in order from highest-paid to lowest-paid have been order. sorted in a. recursive b. ascending order. c. staggered d. descending 2. Student records stor…
1. Encrypt the message \"DO NOT TELL ANYONE\" using the rail fence cipher with k
1. Encrypt the message "DO NOT TELL ANYONE" using the rail fence cipher with key = 2. 2. Encrypt the message "LOGIC WILL GET YOU FROM A TO B. IMAGINATION WILL TAKE YOU EVERYWHERE.…
1. Encryption can take place at several different layers of the protocol stack.
1. Encryption can take place at several different layers of the protocol stack. Does encryption make sense at level 1 (the Physical Layer)? Why, or why not? 2. What are some of th…
1. Encryption is the most reliable method of ensuring confidentiality on a netwo
1. Encryption is the most reliable method of ensuring confidentiality on a network. True False 1. Controls are mechanisms that reduce or eliminate threats to network security. Ans…
1. Enter and run the following program. Show the values printed and answer the q
1. Enter and run the following program. Show the values printed and answer the questions that follow. #include<stdio.h> main(){ int x = 5; int *ptr_x; ptr_x = &x; printf…
1. Entering e-marketplaces helps to a. Expedite the sales process b. expedite th
1. Entering e-marketplaces helps to a. Expedite the sales process b. expedite the product delivery to customer c expedite the procurement process d. allows companies to meet onlin…
1. Ethical standards for randomized, controlled clinical trials include I 1. A)
1. Ethical standards for randomized, controlled clinical trials include I 1. A) never testing drugs which have not been proven to be completely safe. 2. B) not asking subjects to …
1. Evaluate C Expressions (30 points/2 point each). Use the following macro defi
1. Evaluate C Expressions (30 points/2 point each). Use the following macro definitions and variable declarations to statements. evaluate the following expressions or Also, assume…
1. Evaluate a short algebraic expression using code with three-operand instructi
1. Evaluate a short algebraic expression using code with three-operand instructions. The expression should have a minimum of three operands and 2 operators. Operands may be alpha …
1. Evaluate a short algebraic expression using code with three-operand instructi
1. Evaluate a short algebraic expression using code with three-operand instructions. The expression should have a minimum of three operands and 2 operators. Operands may be alpha …
1. Evaluate expressions using structs. (30 points/2 point each). Use the followi
1. Evaluate expressions using structs. (30 points/2 point each). Use the following macro definitions and variable declarations to evaluate the following expressions or statements.…
1. Evaluate expressions using structs. (30 points/2 point each). Use the followi
1. Evaluate expressions using structs. (30 points/2 point each). Use the following macro definitions and variable declarations to evaluate the following expressions or statements.…