Web development and programming
191828 questions • Page 218 / 3837
1. Give an example for when would be a worst case for selection sort algorithm?
1. Give an example for when would be a worst case for selection sort algorithm? Also give the worst and best time complexity for selection sort algorithm? 2. What is the least num…
1. Give an example of a metric that can be used to measure multiple dimensions o
1. Give an example of a metric that can be used to measure multiple dimensions of software quality. 2. Give an example of multiple metrics that can be used to measure one dimensio…
1. Give an example of a weighted graph for which the minimum spanning tree is un
1. Give an example of a weighted graph for which the minimum spanning tree is unique. Indicate what the minimum spanning tree is for that graph. Give another example of a weighted…
1. Give an explanation, with examples and/or analogies, to describe what it mean
1. Give an explanation, with examples and/or analogies, to describe what it means for privacy to be a negative right (liberty). Do the same for privacy as a positive right (claim …
1. Give one example where consumer information is collected for marketing databa
1. Give one example where consumer information is collected for marketing databases, but consumers receive some form of payment for the information 2. Give one example where perso…
1. Give pseudo-code to determine if a point t lies inside a triangle with vertic
1. Give pseudo-code to determine if a point t lies inside a triangle with vertices p, q, and r (in clockwise order, say). A value of true should be returned if t lies on the bound…
1. Give pseudocode for an algorithm that accepts a BST node and an integer k and
1. Give pseudocode for an algorithm that accepts a BST node and an integer k and retuns ethsmaes element in the BST rooted at that node. For example, the tree rooted at node A bel…
1. Give pseudocode for an algorithm that accepts a BST node and an integer k and
1. Give pseudocode for an algorithm that accepts a BST node and an integer k and retuns ethsmaes element in the BST rooted at that node. For example, the tree rooted at node A bel…
1. Give pseudocode of a comparison-based algorithm that outputs the maximum of f
1. Give pseudocode of a comparison-based algorithm that outputs the maximum of four integers x1, x2, x3, x4. algorithm Proof: The running time of a comparison-based sorting alg gr…
1. Give regular expressions for each of the following subsets of ta, (a) {x | x
1. Give regular expressions for each of the following subsets of ta, (a) {x | x contains an even number of a's) (b) { z contains an odd number of b's) (c)( z contains an even numb…
1. Give regular expressions for the following languages: (a) {w {a,b} | w has an
1. Give regular expressions for the following languages: (a) {w {a,b} | w has an even number of b’s} (b) {w {a,b} | w does not contain the substring ab} (c) {w {a,b} | w contains …
1. Give the Python program that computes the square of a number. The number is p
1. Give the Python program that computes the square of a number. The number is passed to the function as a parameter. The output is the square of this number. For example, the fun…
1. Give the computational complexity of the following piece of code in Big-Oh no
1. Give the computational complexity of the following piece of code in Big-Oh notation and explain how you arrived at your result: for (i=1; i<=n; i=i+2){ // constant number of…
1. Give the full name of an application layer protocol that uses TCP as the tran
1. Give the full name of an application layer protocol that uses TCP as the transport layer protocol. (0-2 points) 2. State two advantages of Network Standards. (0-2 points) 3. St…
1. Give the full name of an application layer protocol that uses TCP as the tran
1. Give the full name of an application layer protocol that uses TCP as the transport layer protocol. (0-2 points) 2. State two advantages of Network Standards. (0-2 points) 3. St…
1. Give the most compact theta notation for the function 2n4 + n2 + 1. 2. Give t
1. Give the most compact theta notation for the function 2n4 + n2 + 1. 2. Give the most compact theta notation for the function (2 lg n + 5)(7 + n). 3. Give the most compact theta…
1. Give the most compact theta notation for the function 2n4 + n2 + 1. 2. Give t
1. Give the most compact theta notation for the function 2n4 + n2 + 1. 2. Give the most compact theta notation for the function (2 lg n + 5)(7 + n). 3. Give the most compact theta…
1. Give the names of customers that like both Cherry and Vanilla flavors. (note:
1. Give the names of customers that like both Cherry and Vanilla flavors. (note: it is NOT either/Or but AND) (hint: think of UNION, INTERSECT, MINUS) ICECREAM (Ice_cream_ID,…
1. Give the op code and number of bytes of code for each of these instructions.
1. Give the op code and number of bytes of code for each of these instructions. 28 points (a) mov ecx, 984 Op Code______ …
1. Give the op code and number of bytes of code for each of these instructions.
1. Give the op code and number of bytes of code for each of these instructions. 28 points (f) inc DWORD PTR [edx] Op Code______ Numb…
1. Give the op code and number of bytes of code for each of these instructions.
1. Give the op code and number of bytes of code for each of these instructions. (k) imul eax, ecx Op Code______ Number…
1. Give the output of following algorithm when F(4) is called. F stands for Fibo
1. Give the output of following algorithm when F(4) is called. F stands for Fibonacci numbers. function F(n>=0:integer) :integer if n<=1 then F n else print n, F F(n – 1) + …
1. Give the output of the following code segment. #define SIZE 5 int nams [SIZE]
1. Give the output of the following code segment. #define SIZE 5 int nams [SIZE]; int i; for (i=0; i < SIZE; i++) nums[i] = i * 2; for (i = SIZE -1; i >= 0; i--) printf("%3d…
1. Give the sequence of letters from these traversals of the tree q / | \\ e f r
1. Give the sequence of letters from these traversals of the tree q / | e f r / | /| | d n g h j s t a.) a preorder traversal b.) a postorder traversal 2. Use the stack-based algo…
1. Give three examples each of internal and external peripheral devices as refer
1. Give three examples each of internal and external peripheral devices as referenced to the HCS12 microcontroller and not an entire PC. (2 points) 2. Given “the requirements of e…
1. Give us a very brief list of code (sometimes a single line is all that is nee
1. Give us a very brief list of code (sometimes a single line is all that is needed) for the following: a. The statement to allow our programs to use the methods of the Scanner Cl…
1. Give us an example of declaring an array and then a loop that assigns a rando
1. Give us an example of declaring an array and then a loop that assigns a random number from 20 to 200 to each array element - this should be a single statement in the loop body.…
1. Give us an example of declaring and assigning values to a single-dimensional
1. Give us an example of declaring and assigning values to a single-dimensional Array. 2. Give us an example of declaring and assignment values to a two-dimensional Array. 3. Obje…
1. Give, using “big oh” notation, the worst case running times of the following
1. Give, using “big oh” notation, the worst case running times of the following procedures as a function of n 0. (a). procedure unknown for i =1 to n – 1 do for j =i + 1 to n do f…
1. Given a 2-by-5 integer array X, answer the following questions: (program is n
1. Given a 2-by-5 integer array X, answer the following questions: (program is not required) a. Write a definition (array declaration) for X b. How many rows and columns does X ha…
1. Given a 32 bit address space and 32 GB of physical memory, answer the followi
1. Given a 32 bit address space and 32 GB of physical memory, answer the following questions: a. How many 4K pages of virtual memory exist? b. How many 4K pages of physical memory…
1. Given a class \"Student\", which of the following is the correct statement to
1. Given a class "Student", which of the following is the correct statement to create a pointer to an object of class "Student" in the heap? Assume that we use default constructor…
1. Given a class ‘Node’ and ‘Queue’, that contains the below information diagram
1. Given a class ‘Node’ and ‘Queue’, that contains the below information diagram. Implement add(String), remove() and element() methods in the Queue class which is provided to you…
1. Given a disk drive with the following characteristics: Number of surfaces = 2
1. Given a disk drive with the following characteristics: Number of surfaces = 200 Number of tracks per surface = 100 Number of sectors per track = 50 Bytes per sector = 256 Speed…
1. Given a graph represented by an array of linked lists (refer to the ppt discu
1. Given a graph represented by an array of linked lists (refer to the ppt discussed in class today), write an algorithm (pseudo code) to determine if the graph is connected 2. A …
1. Given a int variable named yesCount and another int variable named noCount an
1. Given a int variable named yesCount and another int variable named noCount and a char variable named response, write the necessary code to read a value into into response and t…
1. Given a list of integers, your prolog program must figure out whether there a
1. Given a list of integers, your prolog program must figure out whether there are missing integers in the given set of integers and report a list of all values that are missing. …
1. Given a matrix variable \"mat\", write code using for loops, if statements, e
1. Given a matrix variable "mat", write code using for loops, if statements, etc. that will accomplish the same as the following: Please make sure to store the result in "matsum" …
1. Given a pointer/reference to the head node of a linked list, write a method t
1. Given a pointer/reference to the head node of a linked list, write a method to display its elements, one element per line. If the head pointer is null (indicating the list is e…
1. Given a rectangular field with few sensors present on it, write a program to
1. Given a rectangular field with few sensors present on it, write a program to cross it by taking the shortest safe route without activating the sensors. Sensors are marked with …
1. Given a relation R(A, B), write an SQL query to find the tuples t = (a, b) su
1. Given a relation R(A, B), write an SQL query to find the tuples t = (a, b) such that there does not exist another tuple with A = a. Which of the following SQL queries is the co…
1. Given a string of odd length, return the character in the middle of the strin
1.Given a string of odd length, return the character in the middle of the string, so that "abc" yields 'b'. middleChar("a") 'a' middleChar("abc") 'b' middleChar("abcde") 'c' publi…
1. Given a type Money that is a structured type with two int fields, dollars and
1. Given a type Money that is a structured type with two int fields, dollars and cents declare an array monthlySales with 12 elements of type Money. 2. Given a type Money that is …
1. Given an arbitrary ransom note, consisting of 15 - 20 words and several magaz
1. Given an arbitrary ransom note, consisting of 15 - 20 words and several magazines, write a function that will return a true, if the ransom note can be constructed from the word…
1. Given an encoder with 32 inputs, how many output will it have? 2. A decoder w
1. Given an encoder with 32 inputs, how many output will it have? 2. A decoder with 8 inputs will have how many outputs? 3. How many different types of tri-state buffers are there…
1. Given an integer N, it is required to compute the sum of the cubes of the num
1. Given an integer N, it is required to compute the sum of the cubes of the numbers from 1 to N. The sum can be computed directly or analytically by the following formula: S = 13…
1. Given an integer array A 17,4,8, 2,5,3,9 a) Write your own Java source code n
1. Given an integer array A 17,4,8, 2,5,3,9 a) Write your own Java source code named SelectionSort.java to implement Selection Sort algorithm on the array A. Please finish your co…
1. Given an object file, what program would you use to see what functions are re
1. Given an object file, what program would you use to see what functions are referenced within it? 2. What is the name of the executable created by gcc and g++ if you don't speci…
1. Given are the following 2-dimensional examples from two classes (class I and
1. Given are the following 2-dimensional examples from two classes (class I and class II) class I: pl = [1 1], p2 = [-1-1] class II: p3 12 2] Can a perceptron learn to distinguish…
1. Given four digits, find the maximum valid time that can be displayed on a dig
1. Given four digits, find the maximum valid time that can be displayed on a digital clock (in 24-hour format) using those digits. For example, given digits 1,8,3,2 the maximum va…
Subject
Web development and programming
Use Browse or pick another subject.