Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 225 / 3837

1. In ARQ, a NAK is sent by the recipient if the message was received incorrectl
1. In ARQ, a NAK is sent by the recipient if the message was received incorrectlY? True/False 2. Distance vector routing finds the quickest, least busy route to take? True/False 3…
1. In C Which of these is the correct way to set the value of a string variable?
1. In C Which of these is the correct way to set the value of a string variable? (a) destination_string = "This is the string contents that I want."; (b) strcpy(destination_string…
1. In C#, create a class named Game that contains a string with the name of the
1. In C#, create a class named Game that contains a string with the name of the Game and an integer that holds the maximum number of players. Include properties with get and set a…
1. In C++ \" _____ variables are declared using the qualifier static. 2. The pur
1. In C++ " _____ variables are declared using the qualifier static. 2. The purpose of a "_____" is to deallocate memory to class instances. 3. Class or Variable "_____ serve as a…
1. In C++, is cin an object or a class? Is string an object or a class? 2. When
1. In C++, is cin an object or a class? Is string an object or a class? 2. When using a string object, you do not know how it stores its characters. How can you access them? 3. De…
1. In C++, operator
1. In C++, operator<< comes in two overloaded forms, one that takes one argument and one that takes two arguments.(T/F) 2. Which of the following statements is a valid way t…
1. In C++, the largest integer is 2,147,483,647. To manipulate numberslarger tha
1.                 In C++, the largest integer is 2,147,483,647. To manipulate numberslarger than this we can store each digit of the number in an array.Write a program that input…
1. In Chapter 1, you created a class called RandomGuess. In this game, the appli
1. In Chapter 1, you created a class called RandomGuess. In this game, the application generates a random number for a player to guess. In Chapter 5, you improved the application …
1. In Chapter 3, on pages 96 and 97 there is a Bank Account program. The origina
1.     In Chapter 3, on pages 96 and 97 there is a Bank Account program. The original tester is on page 103. a.     Modify the BankAccount program as follows:                     …
1. In Figure 1, which is true of the relationship between F and G? A. The owners
1.   In Figure 1, which is true of the relationship between F and G? A.   The ownership of F is a policy decision. B.   F contains G, and G may not be part of other aggregations. …
1. In Figure 1-26 (page 30 of the textbook), when Host A transmits a packet alon
1. In Figure 1-26 (page 30 of the textbook), when Host A transmits a packet along the data link shown, a) How many physical links are there along the data link shown? There are th…
1. In Figure 18-10 ( ), assume that the link between R1 and R2 is upgraded to 17
1. In Figure 18-10 ( ), assume that the link between R1 and R2 is upgraded to 170 kbs; and the link between the source host and R1 is downgraded to 160 kbs. What is the throughput…
1. In Java declare and initialize two arrays (different array names please) with
1. In Java declare and initialize two arrays (different array names please) with 100,000 integers each. The integers should be consecutive. In one of the arrays, change two of the…
1. In Java the statement used to tell the compiler that the current source file
1. In Java the statement used to tell the compiler that the current source file is using classes from a specified package is ______________. a. include b. access c. library d. imp…
1. In Java, write a program to implement the selection sort, the bubble sort, th
1. In Java, write a program to implement the selection sort, the bubble sort, the insertion sort, and the modified bubble sort. Obtain the size of the input (array) from the user …
1. In Linux, the privileged account that can perform system-level operations (ik
1. In Linux, the privileged account that can perform system-level operations (ike account account creation) is called the a. absolute b. administrator c. master d. root e. system …
1. In MIPS, when you load a byte from memory into a register: - What happens to
1. In MIPS, when you load a byte from memory into a register: - What happens to its value? (There are two options.) - Why do we do this? This class focuses mainly using MIPS 1. Wh…
1. In Oracle, create a CUSTOMERS table with the following fields. (You may use v
1. In Oracle, create a CUSTOMERS table with the following fields. (You may use varchar2 if you like ) SQL> describe customers Name Null? Type SSN LASTNAME FIRSTNME MIDDLE PHONE…
1. In PHP, groups of statements that you can execute as a single unit are called
1. In PHP, groups of statements that you can execute as a single unit are called 2. A is a variable that is declared outside a function and is available to all parts of your progr…
1. In Playland example project, there is: myImage.Source = myBitmapImage; myImag
1. In Playland example project, there is: myImage.Source = myBitmapImage; myImage.Source property is System.Windows.Media.ImageSource type. ImageSource class is an abstract class,…
1. In Playland example project, there is: myImage.Source = myBitmapImage; myImag
1. In Playland example project, there is: myImage.Source = myBitmapImage; myImage.Source property is System.Windows.Media.ImageSource type. ImageSource class is an abstract class,…
1. In UNIX, a program tries to run ls command. Describe the differences between
1. In UNIX, a program tries to run ls command. Describe the differences between the following two different approaches: (a) directly executing execvp() system call to run the ls c…
1. In Windows 8 operating systems, a unit of execution that must be manually sch
1. In Windows 8 operating systems, a unit of execution that must be manually scheduled by the application is called (A) Job (B) Fiber (C) Thread Pool (C) UMS (D) Multithread (E) N…
1. In Windows 8 operating systems, a unit of execution that must be manually sch
1. In Windows 8 operating systems, a unit of execution that must be manually scheduled by the application is called (A) Job (B) Fiber (C) Thread Pool (C) UMS (D) Multithread (E) N…
1. In Windows 8 operating systems, a unit of execution that must be manually sch
1. In Windows 8 operating systems, a unit of execution that must be manually scheduled by the application is called (A) Job (B) Fiber (C) Thread Pool (C) UMS (D) Multithread (E) N…
1. In a C++ class definition for an abstract data type WordTree of strings, stor
1. In a C++ class definition for an abstract data type WordTree of strings, store the words and the counts of the words in a single binary search tree. Each word occurring in the …
1. In a Junit Test Case class, the method with notation @Before is executed befo
1. In a Junit Test Case class, the method with notation @Before is executed before each test method. True or False? 2. Consider the following class Computation public class Comput…
1. In a call to a method in another class, the method name is usually preceded b
1. In a call to a method in another class, the method name is usually preceded by another word and a dot. What is this other word: a) when the method is a class method? b) when th…
1. In a catch statement, what does the following code do? System.out.println(e.g
1. In a catch statement, what does the following code do? System.out.println(e.getMessage()); It prints the stack trace It prints the error message for an exception It prints the …
1. In a computer CPU where are the arithmetic calculations performed? . 2.0 If a
1. In a computer CPU where are the arithmetic calculations performed? . 2.0 If a CPU uses polling to retrieve data from an I/O device it must always check and then reset the _____…
1. In a computer, the ____ devices include a keyboard, a mouse, and a microphone
1. In a computer, the ____ devices include a keyboard, a mouse, and a microphone. a. memory c. input b. CPU d. output ____ 2. ____ programming languages resemble English and allow…
1. In a database, a ________________ is made up of individual pieces of informat
1. In a database, a ________________ is made up of individual pieces of information that are related in some way. A. File B. Field C. Chart D. Record E. Folder 2.The portion of a …
1. In a heap, the upper bound on the number of leaves is: (A) O(n) (B) O(1) (C)
1. In a heap, the upper bound on the number of leaves is: (A) O(n) (B) O(1) (C) O(logn) (D) O(nlogn) 2. In a heap, the distance from the root to the furthest leaf is: (A) (nlogn) …
1. In a large western states an agency that dispatches mobile units to disaster
1. In a large western states an agency that dispatches mobile units to disaster areas to monitor the disaster sites for hazardous chemical and biological contamination requires re…
1. In a mobile phone threat model, what would be different ways to attack the av
1. In a mobile phone threat model, what would be different ways to attack the availability of the phone (data, voice, apps, and other services)? 2. What would be ideal ways to def…
1. In a multiprogramming and time-sharing environment, several users share the s
1. In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in various security problems. a. What are two such …
1. In a networking context, what is a protocol? 2. what is the major protocol us
1. In a networking context, what is a protocol? 2. what is the major protocol used on the Internet? 3. At what OSI/ISO layer does IP operate? 1. What three pieces of information d…
1. In a particular factory, a team leader is an hourly paid production worker th
1. In a particular factory, a team leader is an hourly paid production worker that leads a small team. In addition to hourly pay, team leaders earn a fixed monthly bonus. Team lea…
1. In a single server queue node, is it correct to obtain the following time ave
1. In a single server queue node, is it correct to obtain the following time average statistics and why? Time average job in the node = 2.1, time averaged job number in the queue …
1. In a sliding window error-control system, Station A sends a packet with bytes
1.In a sliding window error-control system, Station A sends a packet with bytes 501–700, followed immediately by a packet with bytes 701–900. Create a diagram of this error- contr…
1. In a supertype subtype relationship a.Subtype entities inherit attributes and
1. In a supertype subtype relationship a.Subtype entities inherit attributes and relationships of supertype b.All entity subtypes inherit their primary key attribute from their su…
1. In a traditional UNIX file access model, the system provides a default settin
1. In a traditional UNIX file access model, the system provides a default setting for newly created files and directories, which can be changed by the owner later. The default is …
1. In a typical TCP connection establishment, the two flags used in the core han
1. In a typical TCP connection establishment, the two flags used in the core handshake are the ___ and ___ flags. 2.  TCP uses _____ to manage the transmission between senders and…
1. In about 100 words, summarize the main points of Chapter 4 of the Text. 2. Us
1. In about 100 words, summarize the main points of Chapter 4 of the Text. 2. Using the method discussed in class, convert (long hand) a. Decimal (that is, base 10) 8888 to binary…
1. In an 8-bit binary number, which is the most significant bit (MSB)? 2. In the
1. In an 8-bit binary number, which is the most significant bit (MSB)? 2. In the following code, the value in AL is intended to be a signed byte. Explain how the Overflow flag hel…
1. In an 8-bit binary number, which is the most significant bit (MSB)? 2. In the
1. In an 8-bit binary number, which is the most significant bit (MSB)? 2. In the following code, the value in AL is intended to be a signed byte. Explain how the Overflow flag hel…
1. In an 8-bit binary number, which is the most significant bit (MSB)? 2. In the
1. In an 8-bit binary number, which is the most significant bit (MSB)? 2. In the following code, the value in AL is intended to be a signed byte. Explain how the Overflow flag hel…
1. In an MPLS network, a routing label is affixed in front of the IP header to p
1. In an MPLS network, a routing label is affixed in front of the IP header to provide quality-of-service information, thus enabling prioritization of the packet through an MPLS n…
1. In an ideal implementations of a stack and a queue, all operations are ______
1. In an ideal implementations of a stack and a queue, all operations are ______________________ . O(1) O(n) O(n log n) O(n2) it depends on the operation 2. In a radix sort, the r…
1. In cell E2, enter a formula using the HLOOKUP function to determine a staff m
1.        In cell E2, enter a formula using the HLOOKUP function to determine a staff member’s base salary (which is based on the number of years of service). a.        Use a stru…