Web development and programming
191828 questions • Page 229 / 3837
1. Let H be a cryptographic hash function, e.g., MD5, or SHA-1. And let M1 and M
1. Let H be a cryptographic hash function, e.g., MD5, or SHA-1. And let M1 and M2 be any two given messages. If the hash values of these two messages are equal, is it then true th…
1. Let S and T be two arrays of m and n elements, respectively. Write an algorit
1. Let S and T be two arrays of m and n elements, respectively. Write an algorithm that finds all the common elements and stores them in an array U. Show that can be done in Q(n +…
1. Let S, T and V be sets, where S = { abaa, ba, a }, T = Ø, and V = { all strin
1. Let S, T and V be sets, where S = { abaa, ba, a }, T = Ø, and V = { all strings of length at least 1 over the alphabet {a,b} that start with the character ‘a’ }. What is S U T …
1. Let T be a Binary Search Tree (BST) with n keys. Select all the statements be
1. Let T be a Binary Search Tree (BST) with n keys. Select all the statements below which are TRUE. If the BST T has height 3, then the maximum number of nodes in T is 16. The fir…
1. Let X and Y be two decision problems. Suppose we know that X reduces to Y in
1. Let X and Y be two decision problems. Suppose we know that X reduces to Y in polynomial time. Which of the following can we infer? Explain a. If Y is NP-complete then so is X. …
1. Let f (n) and g(n) be asymptotically nonnegative functions. Using the basic d
1. Let f (n) and g(n) be asymptotically nonnegative functions. Using the basic definition of notation, prove that max (fin), g(n)) = (f(n) + g(n)) 2. Prove that o(g(n)) n a(g(n) i…
1. Let the functions f: R # R # and g: R # R # be defined by f(x) = 2x -3 and g(
1. Let the functions f: R# R# and g: R# R# be defined by f(x) = 2x -3 and g(x) = x2 + 5. Find f(5). A. 7 B. 13 C. 1 D. 30 2. Let the functions f: R# R# and g: R# R# be defined by …
1. Let the number be a (you are given that a 0 2·Let zo = 1. d Cunpate saccesiwe
1. Let the number be a (you are given that a 0 2·Let zo = 1. d Cunpate saccesiwet 01 T- 4. The iteration clearly goes on forever, so we set a tolerance to stop the iteration 5. St…
1. Lets assume you are a DBA and you manage a very large OLAP database that need
1. Lets assume you are a DBA and you manage a very large OLAP database that need to have a backup policy. What is/are your best option(s)? A). Perform a nightly full backup and ho…
1. Let’s consider a network that consists of 300 computers. Let’s assume the 300
1. Let’s consider a network that consists of 300 computers. Let’s assume the 300 computers all want to use public key cryptosystems to avoid the key management problems associated…
1. Let’s consider the network shown in Figure 1 where Snort is deployed. 1.1: In
1. Let’s consider the network shown in Figure 1 where Snort is deployed. 1.1: In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? (9 points) 1.2: In Fig…
1. Library Fines A local public library needs a program to calculate the overdue
1. Library Fines A local public library needs a program to calculate the overdue fines owed by its patrons. The library needs the clerk to enter the patron’s library card num…
1. Library Fines A local public library needs a program to calculate the overdue
1. Library Fines A local public library needs a program to calculate the overdue fines owed by its patrons. The library needs the clerk to enter the patron’s library card num…
1. Lily is beginning her research about the potential effects of using light the
1. Lily is beginning her research about the potential effects of using light therapy to treat depression. Which strategy will be most effective to begin her search? a) she should …
1. LinkedList: o Create an empty list, adding to the front or rear of the list.
1. LinkedList: o Create an empty list, adding to the front or rear of the list. o Count the number of nodes in the list, delete element at the beginning or end of the list,…
1. Lisa granted the CREATE TABLE privilege WITH ADMIN OPTION to Sharon. Sharon g
1. Lisa granted the CREATE TABLE privilege WITH ADMIN OPTION to Sharon. Sharon granted the privilege to Bob. If Lisa’s privileges are revoked, who else will lose their privilege…
1. List 10 technologies, products, and devices you no longer need to have or car
1. List 10 technologies, products, and devices you no longer need to have or carry with you if you have a smartphone. (Note: You can not list camera or landline or encyclopedias a…
1. List Java\'s 8 primitive data types: Part 2: Declaring variables (4 pts. each
1. List Java's 8 primitive data types: Part 2: Declaring variables (4 pts. each) 2. Write the code to declare a float variable named weight and give it the value 115.5; 3. Write t…
1. List all the employees in the emp table. If they work for department Accounti
1. List all the employees in the emp table. If they work for department Accounting, then add 1200 to their salary. If they work for department Sales, then add 100 to their salary,…
1. List and briefly explain three factors in Table 10.5 that make you, or would
1. List and briefly explain three factors in Table 10.5 that make you, or would make you, happy at work. You may include factors that are important to you that are not listed in t…
1. List and briefly explain three of the attributes of an effective leader liste
1. List and briefly explain three of the attributes of an effective leader listed in Table 10.1 that you have observed in a favorite teacher, manager, or other leader. List and br…
1. List each donor who has made a pledge and indicated a single lump sum payment
1. List each donor who has made a pledge and indicated a single lump sum payment. Include first name, last name, pledge date, and pledge amount. 2. List each donor who has made a …
1. List first name,last name and the current salary of all current employees mak
1. List first name,last name and the current salary of all current employees making more than $90,000 (assume that for current employees to_date field = '9999-01-01' ). 2. List fi…
1. List products (names only) with their categories and manufacturer name of san
1. List products (names only) with their categories and manufacturer name of sandals, sneakers, and casual shoes which are manufactured by 'Buyers Picks' or by 'Radii Footwear'. 2…
1. List some of the major tasks that should be accomplished in the design phase.
1. List some of the major tasks that should be accomplished in the design phase. 2. What are the layers in the Cisco hierarchical network design model? 3. To determine how IP addr…
1. List the author number, first name, and last name for all authors. The first
1. List the author number, first name, and last name for all authors. The first name should appear in lowercase letters and the last name should appear in uppercase letters. 2. Li…
1. List the event number, date requested, date authorized, plan number, work dat
1. List the event number, date requested, date authorized, plan number, work date, and name of the supervising employee of events meeting the following conditions: (1) the date re…
1. List the guide number, first name, and last name for all guides. The first na
1. List the guide number, first name, and last name for all guides. The first name should appear in lowercase letters and the last name should appear in uppercase letters. 2. List…
1. List the processes (threads) running when you run the application 2. Which on
1. List the processes (threads) running when you run the application 2. Which one of them are sharing information? 3. What kind of sharing mechanism is being used and how? import …
1. List the taxonomy of software system testing. 2. Define functional requiremen
1. List the taxonomy of software system testing. 2. Define functional requirements testing. 3. What are the steps involved in functional testing? 4. What is Pairwise Testing? 5. D…
1. List the three visual elements. Briefly describe each. 2. What is the PCL? Gi
1. List the three visual elements. Briefly describe each. 2. What is the PCL? Give an example of how it is used. 3. What is the file ending for an Android project? Windows Project…
1. List the top 5 best-selling products based on the total sales amount in the d
1. List the top 5 best-selling products based on the total sales amount in the data set. Show both the product number (PRODUCT_NBR) and the SUM of total dollar amount (TOTAL_LINE_…
1. List the top 5 best-selling products based on the total sales amount in the d
1. List the top 5 best-selling products based on the total sales amount in the data set. Show both the product number (PRODUCT_NBR) and the SUM of total dollar amount (TOTAL_LINE_…
1. List the total number of parts ordered on each day. Rank your results in asce
1. List the total number of parts ordered on each day. Rank your results in ascending order on order date. 2. List the full name and mailing address of customers who placed an ord…
1. List the total number of parts ordered on each day. Rank your results in asce
1. List the total number of parts ordered on each day. Rank your results in ascending order on order date. 2. List the full name and mailing address of customers who placed an ord…
1. List the vertexes in the order of a Depth First Search starting from “Start”
1. List the vertexes in the order of a Depth First Search starting from “Start” 2. List the vertexes in the order of a Breadth First Search starting from “Start” 3. Which traversa…
1. List three clauses in the Software Engineering Code of Ethics that are upheld
1. List three clauses in the Software Engineering Code of Ethics that are upheld and two which may be violated by a whistleblower? Mention how they relate to whistleblowing. 2. Li…
1. List three situations that might demand a real-time operating system and expl
1. List three situations that might demand a real-time operating system and explain in detail the system characteristics that persuade you to do so. 2. Give at least two reasons w…
1. List three social engineering attacks that someone might use to try to get cr
1. List three social engineering attacks that someone might use to try to get credentials from an employee. In each case, state what type of training might help make the employee …
1. List two important differences between lists andsets.________________________
1. List two important differences between lists andsets.__________________________ ________________________________________________________ 2. ________T/F SetmySet; is a leg…
1. Load the file thermo scores.dat provided by your instructor. Please perform t
1. Load the file thermo scores.dat provided by your instructor. Please perform the following: (a) Extract the scores and student number for student 5 into a row vector named stude…
1. Look at the first frame. What is the role of a Beacon frame in IEEE 802.11? W
1. Look at the first frame. What is the role of a Beacon frame in IEEE 802.11? Why is this frame not necessary in IEEE 802.3 Ethernet? 2. Which device on the wireless LA…
1. Look at the following IPv6 Address. Shorten it to its optimal length. 2001:ba
1. Look at the following IPv6 Address. Shorten it to its optimal length. 2001:bac1:45df:0:0:0420:0:0001/64 2. Define the following terms for IPv6: a. Unicast b. Anycast c. Multica…
1. Look at the following array definition int 1 values 2, 5, 6, 4,7; What is the
1. Look at the following array definition int 1 values 2, 5, 6, 4,7; What is the output of the following lines? System.out.println(values[2]) x-values 1] 2 values[4 System.out.pri…
1. Look at the following code. int numbers[] = {0, 1, 2, 3, 4 }; int *ptr = numb
1. Look at the following code. int numbers[] = {0, 1, 2, 3, 4 }; int *ptr = numbers; ptr++; After this code executes, which of the following statements is true? A) ptr…
1. Look at the following declaration: String cafeName=\"Broadway Cafe\"; String
1. Look at the following declaration: String cafeName="Broadway Cafe"; String str; Which of the following methods would you use to make str are referenced the street and "Broadway…
1. Lowercase letters are most commonly used to refer toindicate columns. 2. The
1. Lowercase letters are most commonly used to refer toindicate columns. 2. The sheet tab is the term in excel for file name. 3. The pixel is a point of light measured in dots per…
1. Lunch Money This is not a complete program just the JAVA statements needed Yo
1. Lunch Money This is not a complete program just the JAVA statements needed You may check your answers in Eclipse. Write Java statements that will declare and initialize a…
1. MAIN OBJECTIVE The goal of this project is to design and implement a universi
1. MAIN OBJECTIVE The goal of this project is to design and implement a university administration system. The system consists of classes of these types: Person (Student, Teacher) …
1. MULTI-FUNCTION CLIENT AND SERVER: This problem involves the development of a
1. MULTI-FUNCTION CLIENT AND SERVER: This problem involves the development of a simple client-server application. Upon execution, the client should print a menu of possible comman…
Subject
Web development and programming
Use Browse or pick another subject.