Web development and programming
191828 questions • Page 215 / 3837
1. Explain what happens (play computer carefully, this is tricky) and why when t
1. Explain what happens (play computer carefully, this is tricky) and why when the following program is executed? ldc y swap call x x: halt y: dw -1 2. Describe the two phases of …
1. Explain what the second . means in the command ep-foxr/-.tt. 22. Which of the
1. Explain what the second . means in the command ep-foxr/-.tt. 22. Which of the following is true if you issue the command In -s home/foxr/somefile home/zappaf/somefile2? a. A ha…
1. Explain why 8 bits equal one byte. 2. Write an if decision statement for the
1. Explain why 8 bits equal one byte. 2. Write an if decision statement for the following: (a) An unsigned long integer variable that is greater than or equal to 100 (b) A string …
1. Explain why DRAM memory requires refreshing. 2. What are the differences betw
1. Explain why DRAM memory requires refreshing. 2. What are the differences between write-back and write through? 3. Suppose a memory system has four banks, each of which has a la…
1. Explain why big data can more cost-effectively handled by clouds that using a
1. Explain why big data can more cost-effectively handled by clouds that using a super computer. Why do big data scientists require domain expertise? Also, explain the difference …
1. Explain why testing can only detect the presence of errors, not their absence
1. Explain why testing can only detect the presence of errors, not their absence. 2. Design an electronic form that may be used to record review comments and which could be used t…
1. Explain why the Fast Fourier Transform has smaller computational complexity t
1. Explain why the Fast Fourier Transform has smaller computational complexity that the discrete Fourier Transform. 2. Write and comment a program that calculates the Discrete Fou…
1. Explain why the rapid delivery and deployment of new systems is often more im
1. Explain why the rapid delivery and deployment of new systems is often more important to businesses than the detailed functionality of these systems. 2. To reduce costs and the …
1. Explain why you might want to create a separate website for mobilie devices r
1. Explain why you might want to create a separate website for mobilie devices rather than convert an existing site to use Responsive Web Desig Describe the use of the viewport me…
1. Explain, in your own words, the difference between “free” and “open source”.
1. Explain, in your own words, the difference between “free” and “open source”. Is one superior to the other? 2. Find an example of a commercial entity making money by using Linux…
1. Explain, in your own words, the difference between “free” and “open source”.
1. Explain, in your own words, the difference between “free” and “open source”. Is one superior to the other? 2. Find an example of a commercial entity making money by using Linux…
1. Explore the roll function from numpy. First, get set up import numpy as np a
1. Explore the roll function from numpy. First, get set up import numpy as np a =np . array ( [ [1,2,3],[4,5,6],[7,8,9]], float ) Then, answer this: What do each of the following …
1. Express natural log of x raised to the y power: log e (x^y) a. log(x**y) b. l
1. Express natural log of x raised to the y power: loge (x^y) a. log(x**y) b. log( pow(x,y) ) c. log10( pow(x,y) ) d. log(x^y) e. ln(x*y) 2. What is the output of this line code, …
1. Express the following expressions in 4-bit sign-magnitude format and then cal
1. Express the following expressions in 4-bit sign-magnitude format and then calculate the answers. Indicate if overflow. 5 + 2 = 0101 + 0011= 4 + 4 -5 + -2 -4 + -4 5 + -2 4…
1. Express the following, base 2 number, in decimal (base 10) format. 01011011 (
1. Express the following, base 2 number, in decimal (base 10) format. 01011011 ( base 2 ) = 2. Express the following, decimal number (base 10), in binary (base 2) …
1. Extend the LList class by implementing some of the other methods that the bui
1. Extend the LList class by implementing some of the other methods that the built-in Python list supports: __min__, __max__, index, count, and remove. # ListNode.py class ListNod…
1. Extend the queue ADT to include the following operations: last that will retu
1. Extend the queue ADT to include the following operations: last that will return the rear element of the queue (which shall not be deleted from the queue) length that will r…
1. Extending the range of numbers that can be expressed by increasing the bit le
1. Extending the range of numbers that can be expressed by increasing the bit length is referred to as 2. Occurs when an arithmetic operation results in an absolute value greater …
1. F = a · b + c + d · (a\' + b\' · c) For each of the boolean functions above,
1. F = a · b + c + d · (a' + b' · c) For each of the boolean functions above, design the combinational circuit using: (a) Decoder and OR gates. (b) Decoder and NOR gates. (c) 8x1 …
1. F data type s I3 points): Based on the following descriptions of stack ADT (a
1. F data type s I3 points): Based on the following descriptions of stack ADT (abstract ilf in the blanks p provide a proper terminology matching each operation. Descript Removes …
1. FIRST PROBLEM Create a pure virtual base class Animal. The base class has one
1. FIRST PROBLEM Create a pure virtual base class Animal. The base class has one private string attribute: _name. The base class has one constant string method, name, that returns…
1. FOR or all products, list the product ID, product name, supplier ID, Supplier
1. FOR or all products, list the product ID, product name, supplier ID, Supplier name, unit price, and a label that indicates whether the item is cheap (less than 10.00), moderate…
1. False Linear probing is equivalent to double hashing with a secondary hashTru
1. False Linear probing is equivalent to double hashing with a secondary hashTrue function of h2(k)-1 True False An algorithm with worst case time behavior of 3n takes at least 30…
1. Femtocells operate on wireless IEEE 802.11 ISM frequencies. True False 2. Wit
1. Femtocells operate on wireless IEEE 802.11 ISM frequencies. True False 2. With 4G cellular systems, each cell can use all available system frequency channels as long as ICIC in…
1. Fig. 1 shows the architecture of a RISC computer and its instruction format.
1. Fig. 1 shows the architecture of a RISC computer and its instruction format. The instrcutions are: Load (L), Store (S), Branch (B), Jump (J), Register-to-Register (R2R), and Re…
1. Fig. 1 shows the directed graph of a computer system. The white circles insid
1. Fig. 1 shows the directed graph of a computer system. The white circles inside the rectangle show the number of that type resource. For example, the rectangle labeled with r2 m…
1. File Account.java contains a partial definition for a class representing a ba
1. File Account.java contains a partial definition for a class representing a bank account. Save it to your directory and study it to see what methods it contains. Then complete…
1. File Account.java contains a partial definition for a class representing a ba
1. File Account.java contains a partial definition for a class representing a bank account. Save it to your directory and study it to see what methods it contains. Then complete t…
1. File Account.java contains a partial implementation for a class representing
1. File Account.java contains a partial implementation for a class representing a bank account. Save it to your directory and study it to see what methods it contains. Then comple…
1. File Account.java contains a partial implementation for a class representing
1. File Account.java contains a partial implementation for a class representing a bank account. Save it to your directory and study it to see what methods it contains. Then comple…
1. File Systems In a certain file system, files are allocated most of their spac
1. File Systems In a certain file system, files are allocated most of their space in large blocks (16 kB) but any final, partial block is allocated in “scraps” (1 kB each). Assume…
1. FileReader fr = new FileReader(myDVDFile.data); 2. BufferedReader br = new Bu
1. FileReader fr = new FileReader(myDVDFile.data); 2. BufferedReader br = new BufferedReader(); 3. String dvdName, dvdPrice, dvdShelf; 4. dvdName = br.readLine(); 5. dvdPrice = br…
1. Fill in True (T) or False (0) in the blank for each of the following statemen
1. Fill in True (T) or False (0) in the blank for each of the following statements: (1) ________Linear insertion sort performs better for partially sorted lists than for random li…
1. Fill in each un-shaded cell of the following chart with one of the following:
1. Fill in each un-shaded cell of the following chart with one of the following: E (empty), F (finite), C (countably infinite), or U (uncountably infinite) to indicate the result …
1. Fill in the 1o blanks in the program below: The user enters a number. of days
1. Fill in the 1o blanks in the program below: The user enters a number. of days that is converted into years, weeks, and days. sample run: Enter the number of days: 1000 1000 day…
1. Fill in the blank: A binary search is faster than a sequential search for ___
1. Fill in the blank: A binary search is faster than a sequential search for ______ lists. 2. Short Answer: Explain how a sequential search works in 1 or 2 sentences. 3. …
1. Fill in the blank: A binary search is faster than a sequential search for ___
1. Fill in the blank: A binary search is faster than a sequential search for ______ lists. 2. Short Answer: Explain how a sequential search works in 1 or 2 sentences. 3. True or F…
1. Fill in the blanks in each of the following 1) A class is an encapsulation of
1. Fill in the blanks in each of the following 1) A class is an encapsulation of and inge data _ structure 2) A declaration ispeded to declare an object ofa classtype. It 3) The d…
1. Fill in the blanks in each of the following: i. Templates enable us to specif
1. Fill in the blanks in each of the following: i. Templates enable us to specify, with a single code segment, an entire range of related functions called .. . . . . . . . . . . .…
1. Fill in the blanks to make the best (most specific) true statement. A. In ord
1. Fill in the blanks to make the best (most specific) true statement. A. In order to easily send an object of a class to cout, you should overload _________________________. B. A…
1. Fill in the code for the following class methods. The following method return
1. Fill in the code for the following class methods. The following method returns the position of the firstoccurrence of a given character in a given string. The positionstarts fr…
1. Fill in the following in increasingorder O(1), O(log n), O(n), O(n log n), O(
1. Fill in the following in increasingorder O(1), O(log n), O(n), O(n log n), O(n2), O(n3), O(2n) 2. Linear search can be done on data in an array or in a list. What is the averag…
1. Fill in the fuction N= myNull (A) to create a matrix N whose columns are the
1. Fill in the fuction N= myNull (A) to create a matrix N whose columns are the homogeneous solutions (i.e. elements of the null space of A). The output of your fuction should mat…
1. Fill the blanks in the table with big Oh notation about the performance of th
1. Fill the blanks in the table with big Oh notation about the performance of these operations Operation Name Performance (O(?)) Stack’s push(o) (array based) Stack’s pop(o) (arra…
1. Find IT security policies from two diflerence insitutions (university webshe)
1. Find IT security policies from two diflerence insitutions (university webshe) For each nsstute answer the following questions a (3 ptsGive links for the web pages or doouments …
1. Find Union and Intersection of two sets. Given two sets (elements in a set ar
1. Find Union and Intersection of two sets. Given two sets (elements in a set are distinct), write a method that finds the union and intersection of two sets using linked list. E.…
1. Find a security policy at your job, at school, or one used for any security p
1. Find a security policy at your job, at school, or one used for any security purpose. What are the most important parts of the organization's security policy? How is the policy …
1. Find a sequence of numbers which, when incrementally inserted into a red-blac
1. Find a sequence of numbers which, when incrementally inserted into a red-black tree, causes the following sequence of rotations: left, right, left. You may start with an initia…
1. Find a working traceroute server from traceroute.org 2. Run a traceroute from
1. Find a working traceroute server from traceroute.org 2. Run a traceroute from one of the links 3. Now run a traceroute from the command line to the host. 4. Include the output …
1. Find and correct the error(s) in each of the following segments of co de: Poi
1. Find and correct the error(s) in each of the following segments of co de: Points: 8 int x For ( x-100 , x>= 10 ,x++) System.out.printin(x b) Correct following code so that i…
Subject
Web development and programming
Use Browse or pick another subject.