Web development and programming
191828 questions • Page 222 / 3837
1. How many states are possible for a 10-bit value? 2. What problem were the “bi
1. How many states are possible for a 10-bit value? 2. What problem were the “binary prefixes” introduced to solve? 3. How many possible 1-parameter bitwise operators are there wi…
1. How many times is the factorial method invoked for factorial(5) in the follow
1. How many times is the factorial method invoked for factorial(5) in the following? import java.util.Scanner; public class ComputeFactorial { /** Main method */ public static voi…
1. How many total registers are there in the ARMV7 architecture? 2. What are ban
1. How many total registers are there in the ARMV7 architecture? 2. What are banked registers and what are they used for? 3. How many privilege modes does the ARMv7 support? What …
1. How many type parameters may a function template have? a) none, that is not w
1. How many type parameters may a function template have? a) none, that is not what the parameters in a function template are called. b) 1 c) 2 d) as many as are needed 2. Suppose…
1. How much data will we have by 2020? 2.The data processing that we did in the
1. How much data will we have by 2020? 2.The data processing that we did in the last two years is more than the data processing done in the last year…
1. How much power is dissipated by a 2.4 k resistor in series with a 12V power s
1. How much power is dissipated by a 2.4 k resistor in series with a 12V power supply? 2. A series circuit contains four resistors with values of 4.7k, 5.6k, 8.1k and 10k.…
1. How often are network standards reviewed? 2. What category of UTP cabling is
1. How often are network standards reviewed? 2. What category of UTP cabling is the minimum for a telephone cable? 3. What category of cabling should be installed as a…
1. How should catch clauses be ordered? 2. In Java, any method that calls anothe
1. How should catch clauses be ordered? 2. In Java, any method that calls another method that might possibly throw an exception must either handle the exception or have a throws c…
1. How should this software be enhanced in the future? What functions or feature
1. How should this software be enhanced in the future? What functions or features do you believe will be needed in future versions based on what the customer organizations are doi…
1. How to implement properties where score should be read only? namespace Assign
1. How to implement properties where score should be read only? namespace Assignment2 { public class Quiz : List<Question> { public double PointsPerQuestion = 0.0; // Implem…
1. How to read the arguments Hi, my name is (your name)\"passed to a shell scrip
1. How to read the arguments Hi, my name is (your name)"passed to a shell script from the command line. Also, the script has to print the script name and the total number of argum…
1. How will becoming computer literate benefit you personally and professionally
1. How will becoming computer literate benefit you personally and professionally in both the short and long term? 2. What do you think may be some negative consequences for you bo…
1. HuffmanTree(char[] a, int[] f) This is a constructor that builds a Huffman tr
1. HuffmanTree(char[] a, int[] f) This is a constructor that builds a Huffman tree based on a and f, where a is an array of characters to be encoded and f is an array of frequenci…
1. Human–Computer Interface (HCI) On a daily basis Swagger Distribution’s employ
1. Human–Computer Interface (HCI) On a daily basis Swagger Distribution’s employees log in to the company’s network and utilize many different types of software and the internet. …
1. I have a Class C subnet mask of 255.255.255.240 a. How many subnets on the ne
1. I have a Class C subnet mask of 255.255.255.240 a. How many subnets on the network? b. How many host per subnet? c. What is the maximum number of unique host addresses on the n…
1. I have a file with the following permissions: -rw-r--r-- 1 jessica jessica ..
1. I have a file with the following permissions: -rw-r--r-- 1 jessica jessica ....... topsecret.jpg I want to change the permissions so that the file can be read and written to by…
1. I need help implenting this Arduino code to MSP430/Code composer. #include
1. I need help implenting this Arduino code to MSP430/Code composer. #include <RedBot.h> RedBotSensor left_sen = RedBotSensor(A3); RedBotSensor center_sen = RedBotSensor(…
1. I need help on (d) 1. Select the appropriate \"Big-Oh\" notation from among:
1. I need help on (d) 1. Select the appropriate "Big-Oh" notation from among: 0(1), 0(n), O(nlg n), 0(), 0(n*), 0(2n) for the number of times that “x (a) to (d). a) x+1" will be e…
1. I need to Modify the doSubmit() function so that it identifies the specific t
1. I need to Modify the doSubmit() function so that it identifies the specific text field that is missing data (such as Name is missing, Address is missing, etc.) 2. Create a simi…
1. I need to create a class named ValenciaCrs that includes data fields that hol
1. I need to create a class named ValenciaCrs that includes data fields that hold A. The department (for example, ENG) B. The course number (for example, 101) C. Th…
1. I need to read from the file 2. output whats on the file and the total of the
1. I need to read from the file 2. output whats on the file and the total of the file 3. write to the file and total the new data(number) file name: file Tony Gaddis 05/24/12 100 …
1. I select cells Al through A20. How many cells have I selected? a. 19 b. 20 c.
1. I select cells Al through A20. How many cells have I selected? a. 19 b. 20 c. 21 d. None of them e. All of the above f. None of the above 2. What's an easy way to remove all we…
1. IF STATEMENT PROBLEMS (1) Write a script where based on the score of a test (
1. IF STATEMENT PROBLEMS (1) Write a script where based on the score of a test (e.g. a number score, 74) returns a grade for that score, either "A", "B", "C", "D", or "F" (2) Writ…
1. IP addressing. a. Write the IP address 129.17.129.97 in its binary form. b. C
1. IP addressing. a. Write the IP address 129.17.129.97 in its binary form. b. Consider an IP subnet with prefix 129.17.129.97/27. Provide the range of IP addresses (of form xxx.x…
1. IP security mechanism can be not only used for security communications in Int
1. IP security mechanism can be not only used for security communications in Internet but also in local network or wide area network. a.True b.False 2. IP security is not transpar…
1. IP subnets (plz dont send spam if you dont know it) Are the two IP addresses
1. IP subnets (plz dont send spam if you dont know it) Are the two IP addresses 129.127.8.8 and 129.127.104.8 in the same subnet? Explain your answer. Are the two IP addresses 129…
1. Identify all the candidate keys of the relation, and then identify all the fu
1. Identify all the candidate keys of the relation, and then identify all the functional dependencies in the relation. 2. Examine the determinants of the functional dependencies. …
1. Identify and briefly describe the various classes of nonportable single-user
1. Identify and briefly describe the various classes of nonportable single-user computers. 2. What is Software as a Service (SaaS)? What advantages does it provide for meeting an …
1. Identify and briefly discuss several measures that private organization might
1. Identify and briefly discuss several measures that private organization might take to reduce the amount of company resources and time employees waste in nonproductive use of in…
1. Identify and briefly discuss several measures that private organization might
1. Identify and briefly discuss several measures that private organization might take to reduce the amount of company resources and time employees waste in nonproductive use of in…
1. Identify and discuss the serious data redundancy problems exhibited by the fi
1. Identify and discuss the serious data redundancy problems exhibited by the file structure shown in Figure P1.9. (The file is meant to be used as a teacher class assignment sche…
1. Identify at least two types of security events and baseline anomalies that mi
1. Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. 2. Given the following list of end-user policy violations and sec…
1. Identify global and local variables in the following program. Does a global v
1. Identify global and local variables in the following program. Does a global variable have a default value? Does a local variable have a default value? what will be the output o…
1. Identify primary key and foreign key for each of the following tables. Orders
1. Identify primary key and foreign key for each of the following tables. Orders Customers OH 1001 5/1/2015 0023 1002 5/3/2015 0023 1003 5/3/2015 0018 1004 5/6/2015 0021 0018 0019…
1. Identify primary key and foreign key for each of the following tables. Orders
1. Identify primary key and foreign key for each of the following tables. Orders Customers OH 1001 5/1/2015 0023 1002 5/3/2015 0023 1003 5/3/2015 0018 1004 5/6/2015 0021 0018 0019…
1. Identify the Foreign Keys in each table: NOTE: Primary Keys for each table ar
1. Identify the Foreign Keys in each table: NOTE: Primary Keys for each table are in BOLD LETTERS Employee DEPARTMENT DIVISION NOTE: Primary Keys for each table are in BOLD LETTER…
1. Identify the UMLS concepts and semantic relationships for malaria. 2. Conside
1. Identify the UMLS concepts and semantic relationships for malaria. 2. Consider the sentence, "Diabetes can be controlled through diet and exercise" Identify the semantic ambigu…
1. Identify the UMLS concepts and semantic relationships for malaria. 2. Conside
1. Identify the UMLS concepts and semantic relationships for malaria. 2. Consider the sentence, "Diabetes can be controlled through diet and exercise" Identify the semantic ambigu…
1. Identify the errors in the operator functions in Exercises a) through i) and
1. Identify the errors in the operator functions in Exercises a) through i) and suggest a solution in each case. a) void Pixel::operator+(Pixel &p1, Pixel &p2, int a) { p1…
1. Identify the normal form, then normalize the following database table: Hospit
1. Identify the normal form, then normalize the following database table: Hospital(Patient, Insurance, Doctor, {Test, Result}) Functional dependencies include: Patient -->…
1. Identify the worst-case time complexity for the algorithm below and prove you
1. Identify the worst-case time complexity for the algorithm below and prove your answer is correct. Please strongly justify your answer. You may make use of the identities below,…
1. Identify three companies that make the highest- s50 pre a. L quality products
1. Identify three companies that make the highest- s50 pre a. L quality products or services for an industry of your choice. Find the number of employees, total sales, total profi…
1. Identify three objects that might belong to each of the following classes: a.
1. Identify three objects that might belong to each of the following classes: a. Automobile b. NovelAuthor c. CollegeCourse 2. Identify three different classes that might…
1. Identifying the header lines / prototypes of the following functions: a. A fu
1. Identifying the header lines / prototypes of the following functions: a. A function called lastChars which uses a string as input and returns the last two characters in the str…
1. Identifying the header lines / prototypes of the following functions: a. A fu
1. Identifying the header lines / prototypes of the following functions: a. A function called lastChars which uses a string as input and returns the last two characters in the str…
1. If 110 b = 12 10 , what is b (in base 10)? a. 8 b. 4 c. 3 d. 2 1. Which of th
1. If 110b= 1210, what is b (in base 10)? a. 8 b. 4 c. 3 d. 2 1. Which of the following number will represent a number X, where -8 ? X ? 7, in four …
1. If 4 bits are used to differentiate light intensity of an LED how many levels
1. If 4 bits are used to differentiate light intensity of an LED how many levels of intensity are possible __________. 2. When an I/O device or timer needs attention a ___________…
1. If A = {a,b,c} and B = { 1, 2 } then how many relations with 3 tuples are pos
1. If A = {a,b,c} and B = { 1, 2 } then how many relations with 3 tuples are possible using the Cartesian product A x B a.6C6 b.6C3 c.16C3 d.None of the above 2. If A = {a,b,c} th…
1. If A and B are two 8-bit numbers represented in 2\'s complement, adding A and
1. If A and B are two 8-bit numbers represented in 2's complement, adding A and B results in an overflow condition. A = 01001010 B = 11100010 True/False 2. Adding the 2 8-bit unsi…
1. If A is a subset of B, then every element of set A is also an element of set
1. If A is a subset of B, then every element of set A is also an element of set B. 2. There are no elements in the empty set. 3. If A is a proper subset of B, then A is a subset o…
Subject
Web development and programming
Use Browse or pick another subject.