Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 231 / 3837

1. Modify the MergeSorter class to convert it into a parallelized MergeSort that
1. Modify the MergeSorter class to convert it into a parallelized MergeSort that uses multiple threads to perform the sorting task. The maximum number of threads to be used should…
1. Modify the Stack class provided below so that it can be used for different ty
1. Modify the Stack class provided below so that it can be used for different types. 2. Construct a class 'Main.java' from scratch to test your Stack class, using methods and cons…
1. Modify the \"Lookup\" program given in the textbook (program 4.4.1) to make a
1. Modify the "Lookup" program given in the textbook (program 4.4.1) to make a program LookupMultipleNumber that prints out multiple values having the same key. Mo7.1] Notes: The …
1. Modify the application so it will only customer types r and c, it should disc
1. Modify the application so it will only customer types r and c, it should discard any extra entries on the customer line type. if the user enters a invalid code the app should d…
1. Modify the application so it will only customer types r and c, it should disc
1. Modify the application so it will only customer types r and c, it should discard any extra entries on the customer line type. If the user enters a invalid code the app should d…
1. Modify the class ArrayList given in the lecture by adding to it the functions
1. Modify the class ArrayList given in the lecture by adding to it the functions listed below for Exercise 2. In each case, the appropriate error message should be generated if an…
1. Modify the client and server so that they support multiple file transfers. Th
1. Modify the client and server so that they support multiple file transfers. The server must run until terminated by the user via eclipse. 2. The server should be able to handle …
1. Modify the code have a second model using k neighbors regression with n neigh
1. Modify the code have a second model using k neighbors regression with n neighbors value of 3. 2. Compare the results between the linear regression and k neighbors regression. E…
1. Modify the code in the handout to include memoization. Modify it additionally
1. Modify the code in the handout to include memoization. Modify it additionally so that it prints the actual shortest path as well as its cost. The path should be output as the s…
1. Modify the code so that the guess word can be any length (utilize the length
1. Modify the code so that the guess word can be any length (utilize the length method for this). 2. Add code to display the number of guesses left. 3. Add code to determine if th…
1. Modify the code to ensure that any whitespace the user might have inadvertent
1. Modify the code to ensure that any whitespace the user might have inadvertently entered at the beginning or end of his search term is stripped Ssearchterm S_POST['searchtermD 2…
1. Modify the doubly linked list code in Listing 5.8 so that it becomes an order
1. Modify the doubly linked list code in Listing 5.8 so that it becomes an ordered linked list. Besides the constructor, the DoublyLinkedList class should have the following metho…
1. Modify the following code as needed to run in your environment. As well as th
1. Modify the following code as needed to run in your environment. As well as the values for M and N given in the code, test all combinations of values of M = 2, 3, 5, 10 and N = …
1. Modify the program below so that listener classes are derived from the approp
1. Modify the program below so that listener classes are derived from the appropriate adapter classes for handling mouse events. Also, remove all unnecessary code. Hint, mousePres…
1. Modify the ruby virtual crazy 8-ball game so that, in addition to welcoming t
1. Modify the ruby virtual crazy 8-ball game so that, in addition to welcoming the player at the beginning of the game, it displays instructions for how to play. Implement this ch…
1. Modify the thread function to report the thread creation sequence (that is, “
1. Modify the thread function to report the thread creation sequence (that is, “Hello Thread 0”, “Hello Thread 1”, “Hello Thread 2”, and so on). Hint: Use the CreateThread() loop …
1. Modify this code so that it computes the score for each alignment using the f
1. Modify this code so that it computes the score for each alignment using the following scoring: match = +1 mismatch = 0 gap = -1 The program should find the optimal alignment(s)…
1. Modularity can have a negative as well as positive effect. A program that is
1. Modularity can have a negative as well as positive effect. A program that is over modularized performs its operations in very small modules, so a reader has trouble, acquiring …
1. Modulation can be used to make a signal conform to a specific pathway. A) Tru
1. Modulation can be used to make a signal conform to a specific pathway. A) True B) False 2. In every NOS, groups form the basis for resource and account management. A) True B) F…
1. Modulation can be used to make a signal conform to a specific pathway. A) Tru
1. Modulation can be used to make a signal conform to a specific pathway. A) True B) False 2. In every NOS, groups form the basis for resource and account management. A) True B) F…
1. Moore\'s Law states that integrated circuit resources double every 18 - 24 mo
1. Moore's Law states that integrated circuit resources double every 18 - 24 months. TRUE/FALSE 2. Which of the following is not a design decision employed to increase performance…
1. More About CSS We’ve seen how CSS styles can be specified as an attribute of
1. More About CSS We’ve seen how CSS styles can be specified as an attribute of an HTML element: <p style=”text-align:center”>This text is centered!<p> In this case, t…
1. More OOP A) Write a subclass of Vegetable called \"Carrot\". Include a privat
1. More OOP A) Write a subclass of Vegetable called "Carrot". Include a private String variable called "variety". Include a getter and setter for the variety. Include a toString m…
1. Most computers are meant to be used by only one _____________ at a time. a. c
1. Most computers are meant to be used by only one _____________ at a time. a. company b. program c. organization d. person 2. Which of the following devices stores instructions t…
1. Most employees will: a) look for the easiest way to do their jobs. b) unneces
1. Most employees will: a) look for the easiest way to do their jobs. b) unnecessarily complicate tasks with extra steps. c) unintentionally skip valuable steps and tasks. d) find…
1. Most modern TCP implementations use pseudo-random number generators(PRNG) to
1. Most modern TCP implementations use pseudo-random number generators(PRNG) to determine starting sequence numbers for TCP sessions. With such generators, it is difficult to comp…
1. Moving a file to a different directory on the same disk does not require maki
1. Moving a file to a different directory on the same disk does not require making a new copy of the data in the file. Explain why not. What does happen when a file is moved from …
1. Moving packets from one machine to another cannot be done with only host name
1. Moving packets from one machine to another cannot be done with only host names, it must be done with addresses. Describe the high-level/conceptual process for resolving a hostn…
1. Mrs. Rodgers owns 20 apartment buildings. Each building contains 15 units tha
1. Mrs. Rodgers owns 20 apartment buildings. Each building contains 15 units that he rents for $800 per month each. Design the application that would output 12 payment coupons for…
1. Multiple Choice Circle the letter of the corect choice 2(a) Which of the foll
1. Multiple Choice Circle the letter of the corect choice 2(a) Which of the following exceptions is/are throwable exceptions? A. FilcNot FoundExecption B. NullPointerException C. …
1. Multiple Choice Questions (MCQs), [15 points, 3 points/MCQ] (a) An ALU (Arith
1. Multiple Choice Questions (MCQs), [15 points, 3 points/MCQ] (a) An ALU (Arithmetic Logic Unit) is a —— . i. combinational logic circuit ii. sequential logic circuit iii. none o…
1. My HP DV6113US running XP loses time on the start bar clock if it does not ha
1. My HP DV6113US running XP loses time on the start bar clock if it does not have either AC or a battery attached to the unit. When I say losing time I mean hours over just a day…
1. My HP DV6113US running XP loses time on the start bar clock if it does not ha
1. My HP DV6113US running XP loses time on the start bar clock if it does not have either AC or a battery attached to the unit. When I say losing time I mean hours over just a day…
1. My codes are below for the control using OpenCV to identify a particular colo
1. My codes are below for the control using OpenCV to identify a particular color: 2. The code in italics and close to the bottom with the asterisk is what I need help with. I wan…
1. MySQL is ACID compliant False 1. The COUNT, MAX, and MIN functions can be app
1. MySQL is ACID compliant False 1. The COUNT, MAX, and MIN functions can be applied to any datatype. False When selecting data, you should: O Get as much as possible - more is al…
1. Name 5, I/O [input/output] interfaces typically available on a computer 2. Wh
1. Name 5, I/O [input/output] interfaces typically available on a computer 2. What is the typical unit of measure in describing how fast IP packets are transmitted from a computer…
1. Name Pick an algorithm that can be implemented recursively and non-recursivel
1. Name Pick an algorithm that can be implemented recursively and non-recursively. What is the name of the algorithm? Describe what the algorithm does. 2. 3. 4 Implement the non-r…
1. Name four fields in the TCP header 2. ATM network technology is an example of
1. Name four fields in the TCP header 2. ATM network technology is an example of: 3. the network layer is implemented in 4. the main advantage of the virtual circuit network servi…
1. Name some commonly known application layer protocols. 2. What is HTTP and wha
1. Name some commonly known application layer protocols. 2. What is HTTP and what do we use it for? 3. What is DHCP used for? 4. The protocols SMTP, POP3, and IMAP are e-mail-rela…
1. Name the four ways in which signed integers can be represented in digital com
1. Name the four ways in which signed integers can be represented in digital computers, and explain the differences. 2. Which one of the four representations for signed integers i…
1. Name this program math.c – This program takes three command line arguments. T
1. Name this program math.c – This program takes three command line arguments. The first is an integer. The second is an operator, one of +– * / %. The third is a second integer. …
1. Name this program reverse.c- This program prints all the comm nand-line argum
1. Name this program reverse.c- This program prints all the comm nand-line arguments backwards (from the last argument to the first, printing each word backwards). Two sample exec…
1. Name this program reverse.c-This program prints all the command-line argument
1. Name this program reverse.c-This program prints all the command-line arguments last argument to the first, printing each word backwards). Two sample executions are shown below …
1. Name two advantages of digital data as compared to analog data. 2. What is th
1.      Name two advantages of digital data as compared to analog data. 2.      What is the base-10 value for the binary number 11012? 3.      What are the respective weights of t…
1. Name two general or specialized search engines you could use to locate audio
1. Name two general or specialized search engines you could use to locate audio and video files. 2. In order to use Creative Commons material such as text, video, or a photograph …
1. Name two major benefits of object programming. 2. Every class definition cont
1. Name two major benefits of object programming. 2. Every class definition contains the keyword 3. A class definition is typically stored in a file with thefilename extension. 4.…
1. Name your source code file hw02-05.s. Write the code for the .data section th
1. Name your source code file hw02-05.s. Write the code for the .data section that would, Define a global int variable named n which is not initialized (however, because n is loca…
1. Name your source code file hw02-05.s. Write the code for the .data section th
1. Name your source code file hw02-05.s. Write the code for the .data section that would, Define a global int variable named n which is not initialized (however, because n is loca…
1. Navigate to the SQL command window and create a SQL query that will give the
1. Navigate to the SQL command window and create a SQL query that will give the product ID, product description and product list price from the PRODUCT_INFORMATION table. Use the …
1. Need help to run this following 1-dimensional array 8 queens program. How can
1. Need help to run this following 1-dimensional array 8 queens program. How can I fix the (print section) and What do I have to add to the (print section) at the end to run this …