Web development and programming
191828 questions • Page 214 / 3837
1. Evaluate the Boolean expression below if the variables have the following val
1. Evaluate the Boolean expression below if the variables have the following values: //variable definitions int x = 5; double num = 7.0; bool mark = true; int y = 10; int z = -7; …
1. Evaluate the truth value of the following expression. Show your work 10%8e2 1
1. Evaluate the truth value of the following expression. Show your work 10%8e2 11 !(24/8>3) && 5/21+2.5 2. Two football teams, C and F, play against each other and have…
1. Evaluate the truth values of the following conditions given the values of the
1. Evaluate the truth values of the following conditions given the values of the declared variables. NOTE: Conditions formed using relational or equality operators (>.-= 30 eli…
1. Evaluate this SQL statement: SELECT manufacturer_id, COUNT(*), order_date FRO
1. Evaluate this SQL statement: SELECT manufacturer_id, COUNT(*), order_date FROM inventory WHERE price > 5.00 GROUP BY order_date, manufactured_id HAVING COUNT(*) > 10…
1. Evaluating various needs or opportunities, and then deciding which should be
1. Evaluating various needs or opportunities, and then deciding which should be moved forward as a project is called: a. project decision-making. c. project projections. b. projec…
1. Event handlers are ____. 2. #Region and #EndRegion are preprocessor directive
1. Event handlers are ____. 2. #Region and #EndRegion are preprocessor directives in C#. 3. Windows forms applications differ from console applications because they do not use the…
1. Every relation in a database is of the entity type. (a) true (b) false 2. If
1. Every relation in a database is of the entity type. (a) true (b) false 2. If you need to use a table multiple times in a query, you have to use aliases to avoid the ambiguity. …
1. Examine the function below and answer the following questions. int gLobal = 2
1. Examine the function below and answer the following questions. int gLobal = 25; // declared outside function int func( int X, char *Y, BYTE Z ) { int a; char b[] = “The lazy do…
1. Excel is a quick and efficient program for tasks like creating sales reports,
1. Excel is a quick and efficient program for tasks like creating sales reports, budgets, and invoices A. True B. False 2. A group of cells is referred to as a range. A. True B. F…
1. Exception handling is used to _____. 2. C++ signals an error or unusual situa
1. Exception handling is used to _____. 2. C++ signals an error or unusual situation by _____. 3. A throw statement passes which type of value to the catch block? 4. The catch blo…
1. Execute a SQL statement to display all the columns in the table CLUB for the
1. Execute a SQL statement to display all the columns in the table CLUB for the club named Poetry. 2. Execute a SQL statement to display the columns FirstName and LastName in the …
1. Execution Time of my old computer is 6 seconds, the new computer’s time is 2
1. Execution Time of my old computer is 6 seconds, the new computer’s time is 2 seconds, what does Amdahls law say the speedup is? 2. I found that I can replace one of my instruct…
1. Exercise 1 (```sinesum.py```) Approximating a function by a sum of sines (vie
1. Exercise 1 (```sinesum.py```) Approximating a function by a sum of sines (view image for better formatting) *Idea:* Any function can be approximated arbitrarily well by a sum…
1. Exercise 2.18 (Current time) Listing 2.7, ShowCurrentTime.py, gives a program
1. Exercise 2.18 (Current time) Listing 2.7, ShowCurrentTime.py, gives a program that dispiays the current timein GMT. Revise the program so that it prompts the user to enter the …
1. Exercise 3.7 of the textbook. An algorithm prints the following pattern: * *
1. Exercise 3.7 of the textbook. An algorithm prints the following pattern: * * * * * * * * * * * * * * * A. What are the basic operations performed by the algorithm that you woul…
1. Exercise 6.7 (page 237) in the textbook. Requirements: a) You need to write t
1. Exercise 6.7 (page 237) in the textbook. Requirements: a) You need to write two classes for this problem. Name them Investment and InvestmentTest. The associated java files sho…
1. Explain TWO things that are wrong with this code and how to fix them: #includ
1. Explain TWO things that are wrong with this code and how to fix them: #include <string> int sum(x, y) { std::string result; result = x + y; return result; } Cho…
1. Explain a few reasons why IT professionals (system admins especially) need to
1. Explain a few reasons why IT professionals (system admins especially) need to know how to use the command line interface in Windows? 2.What directory does it place you in by de…
1. Explain a few reasons why IT professionals (system admins especially) need to
1. Explain a few reasons why IT professionals (system admins especially) need to know how to use the command line interface in Windows? 2.What directory does it place you in by de…
1. Explain clearly why competition synchronization is not a problem in a program
1. Explain clearly why competition synchronization is not a problem in a programming environment that supports coroutines but not concurrency. 2. What is the best action…
1. Explain how a HART device works 2. What are the two transmission modes for Mo
1. Explain how a HART device works 2. What are the two transmission modes for Modbus? 3. If there is fault to a slave, can it report to the master immediately? 4. Do slaves reply …
1. Explain how bar charts and activity network diagrams provide different views
1. Explain how bar charts and activity network diagrams provide different views of a project's schedule and tasks. 2. Describe the Critical Path Method (CPM)/Critical Path Analysi…
1. Explain how error connection is handled in 802.11a. 2. Write a report compari
1. Explain how error connection is handled in 802.11a. 2. Write a report comparing the wired equivalent privcy (WEP) protocol against the Wi-Fi protected access (WPA) protocol and…
1. Explain how information technology drives today’s business processes. 2. IT s
1. Explain how information technology drives today’s business processes. 2. IT security can be defined as maintaining confidentiality, integrity and availability for information a…
1. Explain how the meaning of the word “hacker” changed between the 1950s and th
1. Explain how the meaning of the word “hacker” changed between the 1950s and the 1990s 2.Briefly relate the story of the Firesheep extension to the Firefox browser. What capabili…
1. Explain how to use loops to process the data stored in a two-dimensional arra
1. Explain how to use loops to process the data stored in a two-dimensional array. In your explanation, include a two-dimensional array declaration and initialization. 2. Explain …
1. Explain in plain English of the relationship between risk management and the
1. Explain in plain English of the relationship between risk management and the integration of confidentiality, integrity, and availability into an information security program. A…
1. Explain in words why each recurrence relation is represented by the given des
1. Explain in words why each recurrence relation is represented by the given description For example: P(1) = 2 P(n) = P(n-1)+2 for n22 P(n) slices after cutting a pizza n times al…
1. Explain one characteristic of a database that has data redundancy. Note: Redu
1. Explain one characteristic of a database that has data redundancy. Note: Redundancy in our context is not a good thing 2. Briefly explain the benefits of normalization and why …
1. Explain step by step what is happening in the following two C programs and ho
1. Explain step by step what is happening in the following two C programs and how they connect: Project1A.c #include #include int main() { pid_t pid1, pid2; pid1 = fork();…
1. Explain the actions perfomec by fork 2. Explain the return values from the fo
1. Explain the actions perfomec by fork 2. Explain the return values from the fork) function from from the point of view of the parent and child process 3. What attributes from th…
1. Explain the difference between an object Solution 1 http://www.adobepress.com
1. Explain the difference between an object
1. Explain the difference between check boxes and radio buttons. 2. Explain the
1. Explain the difference between check boxes and radio buttons. 2. Explain the difference between a combo boxand a dialog box. 3. Give an example ofa common use ofa dialog box. 4…
1. Explain the difference between formal parameters and actual parameters. 2. Ho
1. Explain the difference between formal parameters and actual parameters. 2. How does Java transmit data by means of parameters? 3. Define a method sum. This method expects two i…
1. Explain the difference between formal parameters and actual parameters. 2. Ho
1. Explain the difference between formal parameters and actual parameters. 2. How does Java transmit data by means of parameters? 3. Define a method sum. This method expects two i…
1. Explain the difference between formal parameters and actual parameters. 2. Ho
1. Explain the difference between formal parameters and actual parameters. 2. How does Java transmit data by means of parameters? 3. Define a methodsum. This method expects two in…
1. Explain the difference between formal parameters and actual parameters. 2. Ho
1. Explain the difference between formal parameters and actual parameters. 2. How does Java transmit data by means of parameters? 3. Define a methodsum. This method expects two in…
1. Explain the difference between modal and nonmodal user interfaces. 2. Is a co
1. Explain the difference between modal and nonmodal user interfaces. 2. Is a command-line interface modal or nonmodal? 3. why is event handling necessary when one begins to w…
1. Explain the difference between the /etc/profile and the ~/.bash_profile file.
1. Explain the difference between the /etc/profile and the ~/.bash_profile file. Which one is executed first? 2. Edit your .bash_profile file as follows: 1. Welcome the user 2. Ad…
1. Explain the distinction between interpretation and compilation. What are the
1. Explain the distinction between interpretation and compilation. What are the comparative advantages and disadvantages of the two approaches? 12. Is Java compiled or interpreted…
1. Explain the first consistency rule in Table 12-2. Explain the second consiste
1. Explain the first consistency rule in Table 12-2. Explain the second consistency rule in Table 12-2. Table 12-2 1. In at least one direction, the maximum cardinality should be …
1. Explain the following Java Class. // Represents a time span of hours and minu
1. Explain the following Java Class. // Represents a time span of hours and minutes elapsed. // Class invariant: minutes < 60 public class TimeSpan { private int hours; private…
1. Explain the heap property of a tree 2. List and describe the 3 methods most o
1. Explain the heap property of a tree 2. List and describe the 3 methods most often associated with a stack. 3. Identify 3 errors in the following code snippet: num = input() def…
1. Explain the importance ofimplications of Electronic Records Management and Fe
1. Explain the importance ofimplications of Electronic Records Management and Federal RecordsAct. 2. Explain the importance ofimplications of Federal Managers Financia…
1. Explain the output of the following program. Does interchanging the arguments
1. Explain the output of the following program. Does interchanging the arguments in the last printf () statement make any difference? #include<stdio.h> int main (void) { cha…
1. Explain the purpose of GUI programming? 2. What are the classes (choose eithe
1. Explain the purpose of GUI programming? 2. What are the classes (choose either Swing, or JFC) used to accomplish the following, and demonstrate the use of those classes. You do…
1. Explain the security mechanisms available for a database and how the data wil
1. Explain the security mechanisms available for a database and how the data will be protected. 2. Explain how to defeat SQL injection attacks since the database will be publicly …
1. Explain to a group of business users how permissions in Linux can be accompli
1. Explain to a group of business users how permissions in Linux can be accomplished using the chmod command and the character method of user(u) group(g) and other(o). Give three …
1. Explain using an example (use 4-bit 1010) how a 2’s compliment number can be
1. Explain using an example (use 4-bit 1010) how a 2’s compliment number can be represented in usual positional number representation- except the weight of the MSB will be n…
1. Explain what a base class access specifier is and how it affects inheritance.
1. Explain what a base class access specifier is and how it affects inheritance. 2. Define what is meant by the term compile-time binding, and list two other terms that are also u…
Subject
Web development and programming
Use Browse or pick another subject.