Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 217 / 3837

1. For the MIPS assembly instruction: beq $t0,$t1,Label, a. What are the values
     1.          For the MIPS assembly instruction: beq $t0,$t1,Label, a.      What are the values of the control signals for the processor in Figure 4.24 of the textbook? b.     …
1. For the Problem Do only part b; however, use the assumptions from part a: Con
1. For the Problem Do only part b; however, use the assumptions from part a: Consider a file system on a disk that has both logical and physical block sizes of 512 bytes. Assume t…
1. For the class provided below, identify which elements are part of the class\'
1. For the class provided below, identify which elements are part of the class's behavior and which are part of the class's state. 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20…
1. For the data given in the Table 1 below, a. compute the coefficients and R^2
1. For the data given in the Table 1 below, a. compute the coefficients and R^2 values for each of the following models: i. Linear model ii. Power model iii. Saturation model (Hin…
1. For the declarations shown below, which of the following could not be a valid
1. For the declarations shown below, which of the following could not be a valid statement? struct emprec {      string name;      int id;      float salary; }; emprec emp1, emp2;…
1. For the department that controls more projects than any other department, ret
1. For the department that controls more projects than any other department, retrieve its department number. 2. Find the name of employee whoe supervises more employees than any o…
1. For the following array x [10] = { 45, 20, 50, 30, 80, 10, 60, 70, 40, 90}, s
1. For the following array x [10] = { 45, 20, 50, 30, 80, 10, 60, 70, 40, 90}, show the contents of x after the function call split Pos = split(x, 0, 9) is executed, and give the …
1. For the following codes segments (You can assume the code is in the proper pl
1. For the following codes segments (You can assume the code is in the proper place and runs properly): ... String[] allEmployees = new String[15]; String employeeName = "Bill Gat…
1. For the following data allocation, show how the variables will be mapped in t
1. For the following data allocation, show how the variables will be mapped in the memory. Assume that the starting address of DATA area is 0x20000000. All the values should be pr…
1. For the following instructions, what is the minimum stall cycles that are nee
1. For the following instructions, what is the minimum stall cycles that are needed after the beq instruction? Beq r5,r4,label Add r10,r10,r14 a. 0 b. 1 c. 3 d. 2 2. Suppose that …
1. For the following please show a screenshot of your function being called and
1.   For the following please show a screenshot of your function being called and its result (5pts) #1 Rewrite the following code in Haskell if ( books < 1) numCoupons = 0; els…
1. For the following program segment, fill in the tracing table below as describ
1. For the following program segment, fill in the tracing table below as described in the course notes. You should make a duplicate of this table in your homework submission. 1 2 …
1. For the following program, explain the interesting elements related to thread
1. For the following program, explain the interesting elements related to threads. You may experiment with the program using the attached source code: TaskThreadDemo source code 1…
1. For the following two hexadecimal numbers which represent two 32-bit binary b
1. For the following two hexadecimal numbers which represent two 32-bit binary bit patterns. a. 0x02324820 b. Ox8E130064 Please answer the following questions: (a) What decimal nu…
1. For the given database schema: R1(A,B,C,D) R2(A,E) R3(B,F,H) R4(C,G) R5(H,I)
1. For the given database schema: R1(A,B,C,D) R2(A,E) R3(B,F,H) R4(C,G) R5(H,I) Please list all the foreign keys in R1. a. A b. B c. C d. All of A, B, and C are foreign key in R1 …
1. For the query [piano lessons), English (US), which of the following results s
1. For the query [piano lessons), English (US), which of the following results should be rated Fails to OTrue False A list of community piano schools in the U.S. O True O False A …
1. For the running example Beers-Bars-Drinkers (with a modification on table Bee
1. For the running example Beers-Bars-Drinkers (with a modification on table Beers to have new schema Beers(name, manf, cost), please write a script file including SQL statements …
1. For the threadHello program in Figure 4.6, the procedure go() has the paramet
1. For the threadHello program in Figure 4.6, the procedure go() has the parameter np and the local variable n Are these variables per-thread or shared state? Where does the compi…
1. For the two 16 bit values shown below, show what the value truncated to 8 bit
1. For the two 16 bit values shown below, show what the value truncated to 8 bits would be. Also, for each truncated bit pattern, say whether the value of the original 16 bit repr…
1. For these problems, a Boolean expression: means an expression like “2 < x
1. For these problems, a Boolean expression: means an expression like “2 &lt; x &lt;= 4” or “5 &lt; x and y &gt; 2” a. If r and s are both numbers: write the Boolean expression th…
1. For this problem your inputs are a training data set and a validation set. Bo
1. For this problem your inputs are a training data set and a validation set. Both data sets have coordinates in n-space and the corresponding classification for each observation …
1. For this problem, assume that each instruction takes the same number of cycle
1. For this problem, assume that each instruction takes the same number of cycles, and use the code listed below. mov Sr2, #4 jmp L1 Loop: mul Sr3, Sr3, $rl add $r4, $r4, $rl ld $…
1. For this problem, suppose that you are working with the partial data segment
1. For this problem, suppose that you are working with the partial data segment given below. Assume that the memory address of balance is 0x44. What hexadecimal address belongs to…
1. For this question, check all that apply. Which of the following five statemen
1. For this question, check all that apply. Which of the following five statements about current computer hardware is/are true? A hard disk is a type of volatile memory A PC keybo…
1. For user-Center design which of the following is the best strategy? a. Preten
1. For user-Center design which of the following is the best strategy? a. Pretend to be a user b.Do not think like a user c. Work with user and then learn to think like a user d.A…
1. For user-Center design which of the following is the best strategy? a. Preten
1. For user-Center design which of the following is the best strategy? a. Pretend to be a user b.Do not think like a user c. Work with user and then learn to think like a user d.A…
1. For what exact range of values of variable x does the following code segment
1. For what exact range of values of variable x does the following code segment print 'C'? if (x &lt;= 200="" br="" _prototypeuid="15"&gt;     if (x &lt; 100)           if (x &lt;…
1. Frank wishes to make a Skype call to Jane. As both Frank and Jane are at home
1. Frank wishes to make a Skype call to Jane. As both Frank and Jane are at home behind their NAT routers, and B respectively, proxies must be used to establish and complete the c…
1. From a business perspective, which TWO attributes will be the most appealing
1. From a business perspective, which TWO attributes will be the most appealing features of moving applications to the cloud? A. Pay As You Go B. New Architectural Options C. On D…
1. From subnet mask /21 to /30, how many subnet has been created 2. Given the cu
1. From subnet mask /21 to /30, how many subnet has been created 2. Given the current network mask 255.255.192.0, what would be the new subnet mask (in decimal format, not slash n…
1. From that articles, Write a brief review (between 200-400 words) that explain
1. From that articles, Write a brief review (between 200-400 words) that explains what you consider to be the most clear breach of the guidelines for project initiation, feasibili…
1. From your home directory, find all the symbolic links currently in /tmp. 2. F
1. From your home directory, find all the symbolic links currently in /tmp. 2. From your home directory, find all the files of the form yyyymmdd.txt in /tmp/notes which represent …
1. Function of OS include: a. Execute and provide services for applications. b.
1. Function of OS include: a. Execute and provide services for applications. b. Resource management c. Standardization of user interface 2. Suppose the following files are in the …
1. Functional Programming. Implement a function in OCAML that takes a number as
1. Functional Programming. Implement a function in OCAML that takes a number as an input and checks whether it is a prime number. The result should be a Boolean value. 2. Function…
1. GIVEN THE CLASS BELOW, DESIGN A METHOD TO REVERSE THE ORDER OF MEMBERS IN THE
1. GIVEN THE CLASS BELOW, DESIGN A METHOD TO REVERSE THE ORDER OF MEMBERS IN THE ARRAY. public class ArrayClass {    private int[] data;    private int size;    private int capaci…
1. GPS Write a Python program that estimates the number of blocks to travel from
1. GPS Write a Python program that estimates the number of blocks to travel from one address to another along the same street. Your algorithm should assume that addresses are numb…
1. General The/Pale Qtions (5 lats tealrs 5 ninutel Please record your answer to
1. General The/Pale Qtions (5 lats tealrs 5 ninutel Please record your answer to the following true or false questions. a. (3 points) True or False: Circuit switched networks do n…
1. Generate 50 random numbers ranging from 1 to 99 and store it in an array (DO
1. Generate 50 random numbers ranging from 1 to 99 and store it in an array (DO NOT SORT THE ARRAY). Print these values to the screen. 2. Now take one number at a time sequentiall…
1. Generate an arbitrary 4x4 matrix a. Print out the matrix; b. Write an algorit
1. Generate an arbitrary 4x4 matrix a. Print out the matrix; b. Write an algorithm to calculate sum of all entries, print your code and result; . Write code to calculate the sum o…
1. Get a picture from a filename. You only need to accept file extensions of jpg
1.      Get a picture from a filename.   You only need to accept file extensions of jpg, gif, jpeg, JPG, GIF, and JPEG.  Allow the user to recover from entering an incorrect type …
1. Get multiple student scores of a course and find the average score of the cou
1. Get multiple student scores of a course and find the average score of the course. Use OOP. Design the class by UML and write python application to implement the solution. 2. Us…
1. Give a big-Oh notation, in terms of n and m, of the running time of the follo
1. Give a big-Oh notation, in terms of n and m, of the running time of the following procedures, including your explanations: a. Procedure1(n) for (i = 0; i &lt; n; i++) { for (j …
1. Give a code snippet of 3 y86 instructions where the third instruction has a d
1. Give a code snippet of 3 y86 instructions where the third instruction has a dependency on the first instruction that results in a stall if the pipeline does not have forwarding…
1. Give a formal definition (state diagram) of a Turing machine M that computes
1. Give a formal definition (state diagram) of a Turing machine M that computes the negation of a signed binary number (in 2’s complement format) on the tape. a) if the input is e…
1. Give a pseudocode that would perform this iteration N times and plot, with a
1. Give a pseudocode that would perform this iteration N times and plot, with a dot, the coordinates of each iterate xk. 2. Create a Matlab function, titled fractal_fern that impl…
1. Give a real-world example of a task that you perform everyday via cloud compu
1.   Give a real-world example of a task that you perform everyday via cloud computing. Explain how you would cope if the network connection suddenly became unavailable. 2.   In y…
1. Give a specific example of a defense in depth strategy listing specific compo
1. Give a specific example of a defense in depth strategy listing specific components and what their security functionality would be as well as the deficiency of each layer? 4: Wh…
1. Give algorithms for implementing the following operations on a binary search
1. Give algorithms for implementing the following operations on a binary search tree: (a) Average-Keys: Given a node x, returns the average value of the keys in the subtree rooted…
1. Give an analysis of the running time (Big-Oh notation) for each of the follow
1. Give an analysis of the running time (Big-Oh notation) for each of the following 4 program fragments. You must provide calculate the computational cost of each line of code tha…
1. Give an asymptotically tight bound to each of the following expressions: 3n^2
1. Give an asymptotically tight bound to each of the following expressions: 3n^2 + 2n^3 3n log n + 2n^2 2^n + 3^n 2. Arrange the following asymptotic family from lower order to hi…