Web development and programming
191828 questions • Page 226 / 3837
1. In cell M11, create a dcount to determine the number of orders that were plac
1. In cell M11, create a dcount to determine the number of orders that were placed for pencils. Use the criteria range starting in cell O1. 2. In cell M12, create a daverage form…
1. In choosing a toilet stall in a public bathroom, people want privacy and refu
1. In choosing a toilet stall in a public bathroom, people want privacy and refuse to use one adjacent to an occupied stall. So, given a row of n stalls, the first person to arriv…
1. In class we developed a procedure or algorithm to find the largest of three n
1. In class we developed a procedure or algorithm to find the largest of three numbers. Suppose we want to pick the largest of four numbers instead of three. We can of course, use…
1. In class we developed a procedure or algorithm to find the largest of three n
1. In class we developed a procedure or algorithm to find the largest of three numbers. Suppose we want to pick the largest of four numbers instead of three. We can of course, use…
1. In client server architecture for ecommerce the following clients apply: a. E
1. In client server architecture for ecommerce the following clients apply: a. Ecommerce managers b. Javascripts c. Customers d. Both …
1. In contrast to pointers, a reference in C++: a. must be initialized b. cannot
1. In contrast to pointers, a reference in C++: a. must be initialized b. cannot have its value displayed c. is automatically dereferenced when used d. none of the above e. all of…
1. In federal civil organizations, and buyers (or tax payers) are individuals. a
1. In federal civil organizations, and buyers (or tax payers) are individuals. a. business-to-employee b. consumer-to-consumer c. consumer-to-business d. government-to-citizen e. …
1. In function main, prompt the user for a time in seconds. Call a function to c
1. In function main, prompt the user for a time in seconds. Call a function to calculate the equivalent time in hours, minutes, and seconds. Parameters should be the time in total…
1. In how many ways can we place r red balls and w white balls in n boxes so tha
1. In how many ways can we place r red balls and w white balls in n boxes so that each box conta ins one ball of each color? 2. (a) How many sequences (lists) of m Os and n 1s are…
1. In hypothesis testing, the tentative assumption about the population paramete
1. In hypothesis testing, the tentative assumption about the population parameter is a. the alternative hypothesis b. the null hypothesis …
1. In lecture we defined our own 8-bit floating-point number definition with the
1. In lecture we defined our own 8-bit floating-point number definition with the following attributes: First bit represents the sign of the number .Bits 2-4 represent the signed e…
1. In main(), declare a variable N , input an integer less than 10 from standard
1. In main(), declare a variableN, input an integer less than 10 from standardinput (keyboard). Then, define a function Fibonacci tocalculate the Fibonacci number, which is: …
1. In main(), define an integerarray with 20 elements, assign random numbers usi
1. In main(), define an integerarray with 20 elements, assign random numbers using rand(); findthe largest one and smallest one, and output the results (print allnumbers first and…
1. In main(0, use a loop to control and output a starpatternas follows: declarin
1. In main(0, use a loop to control and output a starpatternas follows: declaring a integer N (usingcin to assign N). Output areverse triangle with N row, the first row of the rev…
1. In main(0, use a loop to control and output a starpatternas follows: declarin
1. In main(0, use a loop to control and output a starpatternas follows: declaring a integer N (usingcin to assign N). Output areverse triangle with N row, the first row of the rev…
1. In man(), define an integer pointer variable, and use this pointer and new to
1. In man(), define an integerpointer variable, and use this pointer andnew to dynamically allocate an integer array with10 elements. Then generate 10 random numbers in range (0…
1. In man(), define an integer pointer variable, and use this pointer and new to
1. In man(), define an integerpointer variable, and use this pointer andnew to dynamically allocate an integer array with10 elements. Then generate 10 random numbers in range (0…
1. In modern network communication, 2. A certificate authority (CA) 3. We must a
1. In modern network communication, 2. A certificate authority (CA) 3. We must assume that Trudy can do all of these except 4. A firewall 5. A VPN (Virtual Private Network) 6. WEP…
1. In multiple Arrays, in where the elements match by subscript are considered _
1. In multiple Arrays, in where the elements match by subscript are considered _________ arrays. A. matrix B. n…
1. In order to handle an event from a JRadioButton object button1, what does a p
1. In order to handle an event from a JRadioButton object button1, what does a programmer need to do? A.Create a nested inner class that implements the ItemListener inte…
1. In our communications lecture we talked about different ways of defining comm
1. In our communications lecture we talked about different ways of defining communications: - Persistent vs Transient - Synchronous vs Asynchronous - …
1. In our communications lecture we talked about different ways of defining comm
1. In our communications lecture we talked about different ways of defining communications: - Persistent vs Transient - Synchronous vs Asynchronous - …
1. In our design of the database, we need store each participant\'s customerlD,
1. In our design of the database, we need store each participant's customerlD, name, and contact info along with the reservation. Also, we put the tripID, trip date, price. Assume…
1. In our previous lectures we studied complexity classes P and NP, as well as N
1. In our previous lectures we studied complexity classes P and NP, as well as NP complete problems. The relations between those classes are shown in the following diagram: NP Pro…
1. In terms of physical-level, security for stand-alone PC: 1.1 It is more secur
1. In terms of physical-level, security for stand-alone PC: 1.1 It is more secure than networked one 1.2 Has the same level of security as networked PC; 1.3 Depends on the protoco…
1. In terms of physical-level, security for stand-alone PC: 1.1 It is more secur
1. In terms of physical-level, security for stand-alone PC: 1.1 It is more secure than networked one 1.2 Has the same level of security as networked PC; 1.3 Depends on the protoco…
1. In terms of the master recurrence theorem, where does the equation T (n) = T
1. In terms of the master recurrence theorem, where does the equation T (n) = T ( n ) + 1 fall? 4 (A) case 1 (B) case 3 (C) between case 1 and case 2 (D) between case 2 and case 3…
1. In the AList implementation, when an array-based list is empty Select one or
1. In the AList implementation, when an array-based list is empty Select one or more: A. the numberOfEntries field contains 0 B. the array is set to null C. the array is re-sized …
1. In the Account class, write a method called transferTo , which transfers mone
1. In theAccount class, write a method calledtransferTo, which transfers money between 2 accounts. Themethod takes 2 parameters. The 1st parameter is the amount of moneythat needs…
1. In the Boxcar class definition on the next page, fill in top portions of each
1. In the Boxcar class definition on the next page, fill in top portions of each of the three the method declarations (the underlined areas). Then implement the addCargo method ac…
1. In the Domino Tiling problem, you are given a 2^k x 2^k checkerboard with alt
1. In the Domino Tiling problem, you are given a 2^k x 2^k checkerboard with alternating black and white squares. Two squares already have red tiles placed on them. You are requir…
1. In the Entity-Relationship Model, relationships can have attributes. T/F 2. A
1. In the Entity-Relationship Model, relationships can have attributes. T/F 2. Attributes are the smallest division of data in ER diagram. T/F 3.Which level of abstraction is the …
1. In the LinkedBag implementation, when a bag implemented with linked nodes is
1. In the LinkedBag implementation, when a bag implemented with linked nodes is empty, which of of the following is true? Select all that apply. d/ the bag object itself is null 2…
1. In the MVC pattern, models are A. user interface (UI) components B. classes t
1. In the MVC pattern, models are A. user interface (UI) components B. classes that deal with user interaction C. classes that process user input D. classes that deal with data E.…
1. In the Quiz class, the foo method has the following API: public char foo( int
1. In the Quiz class, the foo method has the following API: public char foo( int i, String s, double c ) Which method call(s) could be correct assuming a is an int and y is an int…
1. In the SelectionSorter\'s minimumPosition(int from) method, explain why the f
1. In the SelectionSorter's minimumPosition(int from) method, explain why the for loop starts with "i = from + 1" instead of "i = 0"? 2.Assume a LinearSearcher object named "searc…
1. In the System.Media.SoundPlayer class what method is used to load a sound usi
1. In the System.Media.SoundPlayer class what method is used to load a sound using a new thread? 2. What is used to implement event in C#? 3. You can update a GUI from any thread …
1. In the Towers of Hanoi puzzle there are __________________ disks of different
1. In the Towers of Hanoi puzzle there are __________________ disks of different diameters. a) 2 b) 3 c) 4 d)5 e) The Towers of Hanoi puzzle can include any number of disks of dif…
1. In the Towers of Hanoi puzzle there are __________________ disks of different
1. In the Towers of Hanoi puzzle there are __________________ disks of different diameters. a) 2 b) 3 c) 4 d)5 e) The Towers of Hanoi puzzle can include any number of disks of dif…
1. In the USA, the denominations of currency are penny, nickel, dime, quarter, o
1. In the USA, the denominations of currency are penny, nickel, dime, quarter, one dollar, two dollar, ve dollar, ten dollar, twenty dollar, fty dollar and one hundred dollar. It …
1. In the accompanying figure, the arrow labeled 3 is pointing to ____. a. the c
1. In the accompanying figure, the arrow labeled 3 is pointing to ____. a. the current themes b. recommended themes c. deleted themes d. installed themes Normal view displays slid…
1. In the accompanying figure, the arrow labeled 3 is pointing to ____. a. the c
1. In the accompanying figure, the arrow labeled 3 is pointing to ____. a. the current themes b. recommended themes c. deleted themes d. installed themes Normal view displays slid…
1. In the context of information processing, computer security and trusted syste
1. In the context of information processing, computer security and trusted systems, explain what is meant by the following terms and why we want to use them: %u2022 Authentication…
1. In the domain of all movies, let Vx) be the predicate \"x is violent\". Write
1. In the domain of all movies, let Vx) be the predicate "x is violent". Write the following statements in the symbols of predicate logic. (a) Some movies are violent. b) Some mov…
1. In the figure, a spring with a spring constant k is at the top of a frictionl
1. In the figure, a spring with a spring constant k is at the top of a frictionless incline of angle ?. The lower end of the incline is a distance D from the end of the spring, wh…
1. In the figure, a spring with a spring constant k is at the top of a frictionl
1. In the figure, a spring with a spring constant k is at the top of a frictionless incline of angle . The lower end of the incline is a distance D from the end of the spring, whi…
1. In the fission reaction 1/0 n + 235/92 U ---> 88/38 Sr+136/54 Xe+x(1/0n) how
1. In the fission reaction 1/0 n + 235/92 U ---> 88/38 Sr+136/54 Xe+x(1/0n) how many neutrons are produced? a. 3 b. 1 c. 2 d. 12 2. A circuit has two resistors in series.…
1. In the following code, the value in AL is intended to be a signed byte Explai
1. In the following code, the value in AL is intended to be a signed byte Explain how the Overflow flag helps, or does not help you, to determine whether the final value in AL fal…
1. In the following code, the value in AL is intended to be a signed byte. Expla
1. In the following code, the value in AL is intended to be a signed byte. Explain how the Overflow flag helps, or does not help you, to determine whether the final value in AL fa…
1. In the following instruction sequence, show the values of the Carry, Zero, an
1. In the following instruction sequence, show the values of the Carry, Zero, and Sign flags where indicated: mov al,00001111b test al,00000010b ; a. CF= ZF= SF= mov al,00000110b …
Subject
Web development and programming
Use Browse or pick another subject.