Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 228 / 3837

1. Interrupts vs. Polling This question asks you to determine the overhead of se
1. Interrupts vs. Polling This question asks you to determine the overhead of servicing the network using each of polling and interrupt-driven I/O. All parts of this question assu…
1. Introduce a call-by-value function that computes the volume of a box. Hint: L
1. Introduce a call-by-value function that computes the volume of a box. Hint: Length, width, and height of a box is needed. 2. Introduce a call-by-reference function with void ou…
1. Introduce the concept of normalization in a letter to the executive and expla
1. Introduce the concept of normalization in a letter to the executive and explain the pros and cons. 2. Explain the problems associated with data redundancy as it pertains to eff…
1. Introduced by IBM with its System/360, the _________ is a set of computers of
1. Introduced by IBM with its System/360, the _________ is a set of computers offered with different price and performance characteristics that presents the same architecture to t…
1. Introduction (of the document)
1.    Introduction (of the document) <Write here in detail about what you have included in thisdocument> 2.    Class Diagram <Provide Class Diagram of the system> 3.  …
1. Introduction In this assignment, you will work with C conditional statements
1. Introduction In this assignment, you will work with C conditional statements to implement a simple Boolean calculator program. This program will also introduce you to Boolean o…
1. Introduction In this program, you will practice working with arrays. Your pro
1. Introduction In this program, you will practice working with arrays. Your program will read lines of text from the keyboard and use an array to track the number of times each l…
1. Introduction Use command line arguments and files in C so that a new command
1. Introduction Use command line arguments and files in C so that a new command may be designed. The command we will create is scopy i.e. selective copy that is a variation to cop…
1. Introduction We want to write a program to simulate a bank with multiple tell
1. Introduction We want to write a program to simulate a bank with multiple tellers. The goal of this simulation is to collect statistical information of the bank’s customers and …
1. Introduction to Problem Domain: Prefix, Postfix & Infix Notation During our s
1. Introduction to Problem Domain: Prefix, Postfix & Infix Notation During our studies we learn mathematics via infix notation.Our math instructors teach us to write operation…
1. Investigate the use of various UNIX commands. What do each of the following c
1.       Investigate the use of various UNIX commands. What do each of the following commands do? (Explain the full meaning of each command in English; don’t supply the computer o…
1. Is Multilevel Security policy mandatory or not, why? 2. Suppose we are runnin
1. Is Multilevel Security policy mandatory or not, why? 2. Suppose we are running Multics operating system. One process, running in ring 5, is with clearance level of TOP SECRET a…
1. Is each of the following a legal C++ variable name? (Answer yes or no.) myIDN
1. Is each of the following a legal C++ variable name? (Answer yes or no.)    myIDNumber this_is_a_var                 AMOUNT                                                      …
1. Is each of the following an absolute pathname, a relative pathname, or a simp
1. Is each of the following an absolute pathname, a relative pathname, or a simple filename?      a. milk_co    b. correspond/business/milk_co      c. /home/max      d. /home/max/…
1. Is the PC (program counter) unsigned? 2. When branching, is the \'label\' par
1. Is the PC (program counter) unsigned? 2. When branching, is the 'label' part of the instruction added to the PC or is the 'label' the location the PC jumps to irrespective of t…
1. Is the code snippet written below legal? Select one: a. Yes. b. No; there sho
1. Is the code snippet written below legal? Select one: a. Yes. b. No; there should be a semicolon at the end of line 2. c. No; for i = 3, s.substring(i, i + 1) will result in an …
1. Is the open system call in UNIX absolutely essential? What would the conseque
1. Is the open system call in UNIX absolutely essential? What would the consequences be of not having it? 2. A simple operating system supports only a single directory but allows …
1. Is the relation represented by the set S a partial ordering? S = { ( a , a ),
1. Is the relation represented by the set S a partial ordering? S = { (a, a), (b, b), (c, a), (c, c), (c, d), (d, c), (d, d) } If S is a partial ordering, then explain why. If S i…
1. Is there any port open in 192.168.60.3? Explain. 2. Was completed the three h
1. Is there any port open in 192.168.60.3? Explain. 2. Was completed the three hand shake between the source IP address 172.27.20.4 port 58173 and destination IP address 192.168.6…
1. Is this the correct statement ? short sh; short *ptr = &sh ; 2. int num [ 100
1.   Is this the correct statement ? short sh; short *ptr = &sh ; 2. int num [ 100 ] = { 19, 12, 23, 43, 87, 34 } ; num++; Is the above statement correct? Explain why or why n…
1. It is always interesting to begin firewall/security classes by asking everyon
1. It is always interesting to begin firewall/security classes by asking everyone how secure is your PC/Network. What measures do you currently use to protect your PC/Network? Wha…
1. It is generally assumed that arrays are passed in constant time (a valid assu
1.   It is generally assumed that arrays are passed in constant time (a valid assumption when passing a pointer, rather than the whole array). But consider these scenarios … a.   …
1. It is good practice to initialize private member variables in the function de
1. It is good practice to initialize private member variables in the function definition of the function they are being used? (T/F). 2. True or false: The operator function as a m…
1. It is legal to have both pass-by-value and pass-by-reference parameters in th
1. It is legal to have both pass-by-value and pass-by-reference parameters in the same function declaration. TRUE or FALSE 2. An array can store integers and doubles together. TRU…
1. It is possible that a foreign key column of a table can be NULL. ATrue BFalse
1. It is possible that a foreign key column of a table can be NULL. ATrue BFalse 2.From the list below, identify ALL the options to implement data integrity in the Database design…
1. It is possible to use the maximum vertical deflection on the oscilloscope scr
1. It is possible to use the maximum vertical deflection on the oscilloscope screen to find the current. Explain how a numerical value for current may be found. You may choose the…
1. JAVA Bob has a set, A, of n nuts and a set B of n bolts, such that each nut h
1. JAVA Bob has a set, A, of n nuts and a set B of n bolts, such that each nut has a unique matching bolt. Unfortunately, the nuts in A all look the same, and the bolts in B all l…
1. JSP embeds in ................ in ...................... A) Servlet, HTML B)
1. JSP embeds in ................ in ...................... A) Servlet, HTML B) HTML, Java C) HTML, Servlet D) Java, HTML 2. The class at the top of exception class hierarchy is .…
1. Java Web Start is a technology that can be used to deploy Java applications.
1. Java Web Start is a technology that can be used to deploy Java applications. A) True B) False 2. Which of the following Java 2D methods would be the best to used to draw circle…
1. Java allows you to declare methods with the same name in a class. This is cal
1. Java allows you to declare methods with the same name in a class. This is called ________. method duplication method overriding method overloading method redeclaration 2. All t…
1. Java does not allow nonboolean values for based on principles as to why this
1. Java does not allow nonboolean values for based on principles as to why this is useful or not. logical test, unlike other C-like languages. Argue Expand the Java method that im…
1. Java is strongly typed hence you must declare the data type of a variable bef
1. Java is strongly typed hence you must declare the data type of a variable before using it? T/F 2. Local variables are declared and used only within which of the following? Meth…
1. Java source code files can contain more than one class definition 2. package
1. Java source code files can contain more than one class definition 2. package is a reserved word modifier in Java that signals that a class's members 3. Abstraction is one of th…
1. JavaFX doesn\'t provide you with UI elements, shapes and text. So you must al
1. JavaFX doesn't provide you with UI elements, shapes and text. So you must always create your own graphics. O True O False 2. An Image is an object that describes the location o…
1. JavaScript code should be made generic as possible. A) True B) False 2. You c
1. JavaScript code should be made generic as possible. A) True B) False 2. You can randomize an array by using the slice method A) True B) False 3. Dynamic content is content crea…
1. JavaScript is a ______________ language. 2. In the following line, document i
1. JavaScript is a ______________ language. 2. In the following line, document is a(n) ________ which resides in the computers memory and contains information used by the script. …
1. Jermaine and Monica are in a really great band. They would really like to pla
1. Jermaine and Monica are in a really great band. They would really like to play more shows and get more people to listen to their music. The problem is that they live in a small…
1. Jonathan is building a system using an Intel i3 processor and has purchased a
1. Jonathan is building a system using an Intel i3 processor and has purchased a new motherboard from ASUS. He would like to use an old (but working) ATX power supply he has layin…
1. Journal writing (will be turned in): freewrite for 5 minutes about your own i
1. Journal writing (will be turned in): freewrite for 5 minutes about your own interpersonal relationships and potential examples of “fixed” patterns of communication in your own …
1. Juan\'s web server was down for an entire day last September. It experienced
1. Juan's web server was down for an entire day last September. It experienced no other downtime during that month. Which one of the following represents the web server uptime for…
1. LD R1, 45(R2) 2. DADD R7, R1, R5 3. DSUB R8, R1, R6 4. OR R9, R5, R1 5. DADD
1. LD R1, 45(R2) 2. DADD R7, R1, R5 3. DSUB R8, R1, R6 4. OR R9, R5, R1 5. DADD R10, R8, R5 6. XOR R2, R3, R4 By using the above code, answer the followingquestions: Q.1. identify…
1. Language that will be used and implementation plan (i.e. using student linked
1. Language that will be used and implementation plan (i.e. using student linked list class developed in COP 3530, using standard library, both algorithms implemented in one execu…
1. Layouts in android O A) Frame Layout 0 C) Relative Layout B) Linear Layout O
1. Layouts in android O A) Frame Layout 0 C) Relative Layout B) Linear Layout O D All of the above 1 polinto 2. Which component is not activated by an Intant O B) services D) broa…
1. Learn about the following documents: from how to use of each doc, who’s the a
1. Learn about the following documents: from how to use of each doc, who’s the audience, what input…etc. SRS RFP DFD Resource list Project charter 2. Ghant chart & advantages …
1. Least Squares Fit to a Data Set by a Linear Function The following nine data
1. Least Squares Fit to a Data Set by a Linear Function The following nine data points are nearly linear and can be approximated by a linear function   . X -1.0 0.0 2.1 2.3 2.4 5.…
1. Legitimate concerns about user privacy have led some researchers to be very c
1. Legitimate concerns about user privacy have led some researchers to be very cautious about the data that they collect with keyboard or activity loggers. This appropriate concer…
1. Let = {1, o} . Consider the following three languages a) [lol n 2 0] For each
1. Let = {1, o} . Consider the following three languages a) [lol n 2 0] For each, show if the given language is regular or not. For nonregular languages, try to give a CFG or a PD…
1. Let A = {0, 2, 4, 6, 8}, B = {0, 1, 2, 3, 4}, C = {0, 3, 6, 9}. Find (a) ABC
1. Let A = {0, 2, 4, 6, 8}, B = {0, 1, 2, 3, 4}, C = {0, 3, 6, 9}. Find (a) ABC (b) ABC (c) (AB)C (d) A(BC) (e) (AB)C 2. List the elements of each set and give its cardinality. A …
1. Let A and B be two languages. Assume that we know that A is polynomial- time
1. Let A and B be two languages. Assume that we know that A is polynomial- time reducible to B. Which of the following can we conclude from this? (Circle all that apply.) Explain …
1. Let A[1 .. n] be an array/sequence. Recall from lecture that a subsequence of
1. Let A[1 .. n] be an array/sequence. Recall from lecture that a subsequence of A is any sequence obtained by extracting elements from A in order; the elements need not be contig…