Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 220 / 3837

1. Given the theme and content of your choosing, built a web site with the featu
1. Given the theme and content of your choosing, built a web site with the features described below. The site must be contextually complete for three pages. The narrative should d…
1. Given the theme and content of your choosing, built a web site with the featu
1. Given the theme and content of your choosing, built a web site with the features described below. The site must be contextually complete for three pages. The narrative should d…
1. Given thedeclarations Float x; Float* ptr = &x; What does the following state
1.       Given thedeclarations Float x; Float* ptr = &x; What does the following statement do? *ptr = 24.9; A) it stores 24.9 into ptr. B) it store s 24.9 into the variable po…
1. Given two int variables, i and j, which have been decalred and initialized, a
1. Given two int variables, i and j, which have been decalred and initialized, and two other int variables, itemp and jtemp, which have been declared, write some code that swaps t…
1. Given two text strings A a2.am of length m and B bib2... bn of length n, you
1. Given two text strings A a2.am of length m and B bib2... bn of length n, you want to convert A into B with a minimum number of total operations of the following types: . delete…
1. Given universal schema R(A,B,C,D,E,F,G,H,I) and a set of functional dependenc
1. Given universal schema R(A,B,C,D,E,F,G,H,I) and a set of functional dependencies as follows:                   AB CD                   A E                   B FH               …
1. Given x, y, z. Calculate a, b, if 2. Given positive real numbers a, b, c, x,
1. Given x, y, z. Calculate a, b, if 2. Given positive real numbers a, b, c, x, y. To find out whether a brick with edges held, b, c in a rectangular opening with sides x and y. B…
1. Given: int a = 2; unsigned int b = -1; When a is compared with b, since unsig
1. Given: int a = 2; unsigned int b = -1; When a is compared with b, since unsigned is considered the higher type, C promotes a to an unsigned and does the comparison (a > b) a…
1. Giving reasons for your answer based on the type of system being developed, s
1. Giving reasons for your answer based on the type of system being developed, suggest the most appropriate software process model which might be used as a basis for managing the …
1. Giving reasons for your answer based on the type of system being developed, s
1. Giving reasons for your answer based on the type of system being developed, suggest the most appropriate software process model which might be used as a basis for managing the …
1. Global warming . As part of a global warming analysis, a research facility tr
1. Global warming. As part of a global warming analysis, a research facility tracks outdoor temperatures at the North Pole once a day, at noon, for a year. At the end of each mont…
1. Go online and shop for two digital video cameras: one a high end and another
1. Go online and shop for two digital video cameras: one a high end and another a general hand held model. Identify and compare the camera features. Which one would you choose? Ex…
1. Go to the tf_styles4.css file in your editor. 2. Go to the General Flex Style
1. Go to the tf_styles4.css file in your editor. 2. Go to the General Flex Styles section. Within this section, you’ll create a flexible display layout that varies in response to …
1. Goal of this programming assignment The primary goal of this assignment is to
1. Goal of this programming assignment The primary goal of this assignment is to understand and gain some familiarity with pthread libraries in Linix Environment. 2. Requirements …
1. Graph Algorithms Unmanned Aerial Vehicles (UAVs), commonly known as drones, a
1. Graph Algorithms Unmanned Aerial Vehicles (UAVs), commonly known as drones, are starting to be used for high resolution and 3D mapping1. A group of ecologists have decided to u…
1. Greatest Common Divisor (GCD): the greatest common divisor of two integers is
1. Greatest Common Divisor (GCD): the greatest common divisor of two integers is the largest integer that will evenly divide both integers. The GCD algorithm involves integer divi…
1. HTML – use HTML5 support to validate input boxes. 2. CSS – Provide format for
1.   HTML – use HTML5 support to validate input boxes. 2.   CSS – Provide format for tables and headers. 3.   JavaScript – Read all information from HTML Form. Display Submitted i…
1. Hard Disk. A hard drive has eight surfaces, with 4192 tracks per surface and
1.      Hard Disk. A hard drive has eight surfaces, with 4192 tracks per surface and a constant 2048 sectors per track. Sector size is 1K bytes. The average seek time is 8 ms, the…
1. Hash function takes a string of any length as input and produces a fixed leng
1. Hash function takes a string of any length as input and produces a fixed length string which acts as a kind of "signature" for the data provided. a. True False 2. What is the I…
1. Have a GUI that enables the user to enter a location and search terms. 2. Que
1. Have a GUI that enables the user to enter a location and search terms. 2. Query Twitter and Flickr to gather tweets and photos based on the search terms and the location. 3. Di…
1. Having read the case study, come up with a list of the issues that are being
1. Having read the case study, come up with a list of the issues that are being faced by the company and post them here. Make a list of major concerns and you can group them so th…
1. Hello I have a c++ question I am doing this problem i already made the code b
1. Hello I have a c++ question I am doing this problem i already made the code but it doesn't run properly. it compiles just fine but when my program is running it crashes after I…
1. Help with For Statement names integer array with 20 elements. display the ele
1. Help with For Statement names integer array with 20 elements. display the elements in the array 2. Question / Request : Look at Example, Look at my Code... did I accomplish the…
1. Here are five functions, with descriptions of what they are supposed to do. T
1. Here are five functions, with descriptions of what they are supposed to do. They are incorrectly implemented. Replace the incorrect implementations of these functions with corr…
1. Here are the codes for producer and consumer problems Producer: while (true)
1.       Here are the codes for producer and consumer problems Producer: while (true) {                 /* produce an item in next produced */                                 whil…
1. Here are the codes for the reader-writer The structure of a writer process do
1.       Here are the codes for the reader-writer The structure of a writer process do {    wait(rw_mutex);       ...    /* writing is performed */       ...    signal(rw_mutex); …
1. Here is a grammar, whose variables and terminals are NOT named using the usua
1. Here is a grammar, whose variables and terminals are NOT named using the usual convention. Any of R through Z could be either a variable or terminal: it is your job to figure o…
1. Here is a series of address references given as word addresses: 3, 3, 11, 11,
1. Here is a series of address references given as word addresses: 3, 3, 11, 11, 12, 15, 16, 12, 23, 1, 2, 3, 46, 47, 19, 11, 3, 22, 4, 27, 26, and 11. -Assuming a direct mapped c…
1. Here is a short data set. Show the contents in the array after each of the st
1. Here is a short data set. Show the contents in the array after each of the steps in sorting this data using an insertion sort, by adding more rows to the table. 8 2 3 5 3 1 7 4…
1. Here is the first line of a class declaration. a. What is the name of the sup
1.   Here is the first line of a class declaration. a.   What is the name of the superclass? b.   What is the name of the subclass? public class Truck extends Vehicle 2.   Look at…
1. Highlight the added challenges to OS developers in the evolution from uniproc
1. Highlight the added challenges to OS developers in the evolution from uniprocessing up to multitasking processing How can users' applications utilize system's resources?/How do…
1. Host A wants to send a packet to Host B. What role does the Router R play in
1. Host A wants to send a packet to Host B. What role does the Router R play in this transfer? 2. Now Host A wants to send a packet to Host D. What role does the Router R play in …
1. Host A wants to send a packet to Host B. What role does the Router S play in
1. Host A wants to send a packet to Host B. What role does the Router S play in this transfer? 2. Now Host A wants to send a packet to Host D. What role does the Router S play in …
1. Hotels are often rated using stars to represent their score. A five-star hote
1. Hotels are often rated using stars to represent their score. A five-star hotel may have a king-size bed, a kitchen, and two TVs; a one-star hotel may have cockroaches and a lea…
1. How are networks classified? a. Based on the number of nodes. b. Based on the
1. How are networks classified? a. Based on the number of nodes. b. Based on the distance separating communicating computers. c. Based on the speed of network communication. d. Al…
1. How are the ephemeral port numbers generated and why are they called ephemera
1.  How are the ephemeral port numbers generated and why are they called ephemeral? 2.  In HTTP response headers, what is the syntax of most lines (which are header fields)? 3.  H…
1. How are the following two expressions different? (This question if for typeca
1. How are the following two expressions different? (This question if for typecasting review in C language) (int*)&p + 1 (char*)&p + 1 2. Which of the following is true fo…
1. How can a company use change management to minimize the resistance and maximi
1. How can a company use change management to minimize the resistance and maximize the acceptance of changes in business and technology? Give several examples? 2. Briefly explain …
1. How can a computer with only 2G of physical memory run two programs that both
1. How can a computer with only 2G of physical memory run two programs that both use 1.5G each? 2. How is virtual memory related to physical memory? 3. What is the role of the CMO…
1. How can a security framework assist in the design and implementation of a sec
1. How can a security framework assist in the design and implementation of a security infrastructure? What is information security governance? Who in the organization should plan …
1. How can a security framework assist in the design and implementation of a sec
1. How can a security framework assist in the design and implementation of a security infrastructure? What is information security governance? Who in the organization should plan …
1. How can a security framework assist in the design and implementation of a sec
1. How can a security framework assist in the design and implementation of a security infrastructure? What is information security governance? Who in the organization should plan …
1. How can we compare strings in our programs? Provide an example C++ code. 2. A
1. How can we compare strings in our programs? Provide an example C++ code. 2. Although C++ has a stand-alone logical data type, it might treat integers as logical values. The rul…
1. How can you append the output of a command to a file? Command
1. How can you append the output of a command to a file? Command <file Command > file Command <<file Command >>file 2. Which command is used to copy all files ha…
1. How can you break to a new line when using a label? 2. Explain how the locati
1. How can you break to a new line when using a label? 2. Explain how the location of a label is controlled by the container in which it resides. 3. What property will change the …
1. How could a well-managed database help the company better achieve its goals?
1. How could a well-managed database help the company better achieve its goals? 2. What are the modification problems that are likely to occur if Garden Glory attempts to maintain…
1. How do the markers queueHead and queueTail relate with each other in case of
1. How do the markers queueHead and queueTail relate with each other in case of an empty queue implemented using circular array 2. How do the markers queueHead and queueTail relat…
1. How do the viruses propagate between computers? 2. What is social engineering
1. How do the viruses propagate between computers? 2. What is social engineering? 3. How will an SPI firewall handle a packet containing a TCP segment which is an acknowledgement?…
1. How do we know at what point we can consider our environment to be secure? 2.
1. How do we know at what point we can consider our environment to be secure? 2. If the Web servers in our environment are based on Microsoft’s Internet Information Server (IIS) a…
1. How do we run this code using Ubuntu/Linux? 2.how do we debug all errors?expe
1. How do we run this code using Ubuntu/Linux? 2.how do we debug all errors?expect at least 5 errors. 3.show the correct code without errors. ×11?] My Corrputer ×11?Ubuntu 64-bit …