Web development and programming
191828 questions • Page 233 / 3837
1. Overwriting file viruses have a limitation. What is it? 2. Despite limitation
1. Overwriting file viruses have a limitation. What is it? 2. Despite limitations, overwriting file viruses has a benefit. What is it? 3. What are boot viruses? 4. How do boot vir…
1. PROGRAMMING ASSIGNENT 1 Read CSE 11 Laboratory Guide Read Deitel: Ch 1-4, App
1. PROGRAMMING ASSIGNENT 1 Read CSE 11 Laboratory Guide Read Deitel: Ch 1-4, Appendix A-D, (F on ang: Ch 1-3, 4.6, Appendix A-c Programming: Name your application progran aturday,…
1. PROGRAMMING ASSIGNENT 1 Read CSE 11 Laboratory Guide Read Deitel: Ch 1-4, App
1. PROGRAMMING ASSIGNENT 1 Read CSE 11 Laboratory Guide Read Deitel: Ch 1-4, Appendix A-D, (F on ang: Ch 1-3, 4.6, Appendix A-c Programming: Name your application progran aturday,…
1. PYTHIAS Inc, a company which builds branch prediction units has consulted you
1. PYTHIAS Inc, a company which builds branch prediction units has consulted you about a new processor they are designing. (a)[10] The processor has allocated a single bit for a s…
1. Packet sniffing can be a controversial subject. Discuss any issues related to
1. Packet sniffing can be a controversial subject. Discuss any issues related to ethics that might arise when an organization monitors the electronic activity of its employees. 2.…
1. Palindrome Detector (30 pts) : MUST BE IN JAVA...A palindrome is a phrase tha
1. Palindrome Detector (30 pts) : MUST BE IN JAVA...A palindrome is a phrase that reads the same forwards as it does backwards. For example, "a man, a plan, canal, Panama." is…
1. Paraphrase and symbolize each of the following sentences that can reasonably
1. Paraphrase and symbolize each of the following sentences that can reasonably be paraphrased as a truth-functional compound. If a sentence cannot be so paraphrased, explain why …
1. Parent classes are than their child classes. a. less specific b. more specifi
1. Parent classes are than their child classes. a. less specific b. more specific c. easier to understand d. more cryptic 2. Abstract classes differ from other classes in that you…
1. Part A Create a class called Pet. There should be 4 instance variables, the n
1. Part A Create a class called Pet. There should be 4 instance variables, the name (a String), the animal (a String: dog, cat, parrot,... ), the number of legs (an int), and the …
1. Password generator. Your program should generate a random password that satis
1. Password generator. Your program should generate a random password that satises the following constraints: (a) The only valid characters are a{z A{Z 1{9 * @ % $ + - (b) The pas…
1. Paste the code below into your Java IDE and make sure it runs correctly. 2. C
1. Paste the code below into your Java IDE and make sure it runs correctly. 2. Create a program that receives numeric data from the user and then adds it to a queue. 3. Create a p…
1. Perform a program of an arrangement of 20 positions. Each position will repre
1. Perform a program of an arrangement of 20 positions. Each position will represent the seat of a bus. By means of a menu can be made: to. Tickets sale B. Inquiries C. Report D. …
1. Perform the following addition of the two but patterns that are expressed usi
1. Perform the following addition of the two but patterns that are expressed using 4-bits two complement notation. 2. The following fraction 111.011 is represented in binary notat…
1. Perform the following addition on unsigned integers assuming a nine-bit cell.
1. Perform the following addition on unsigned integers assuming a nine-bit cell. Show the effect on the carry bit: 111111111 add 111111111 c= ___________ 2.Perform the …
1. Person Data L10 marks] Step 1 Person Data, CustomerData [12 marks] Design a c
1. Person Data L10 marks] Step 1 Person Data, CustomerData [12 marks] Design a class named PersonDatawwith the following member variables lastName firstName address city state Zip…
1. Pine Valley Furniture In order to determine the requirements for the new Cust
1. Pine Valley Furniture In order to determine the requirements for the new Customer Tracking System, several JAD sessions, interviews, and observations were conducted. Resulting …
1. Pipeline Basics [20 marks] Consider the f | d|xIm| w pipeline, where the \'l\
1. Pipeline Basics [20 marks] Consider the f | d|xIm| w pipeline, where the 'l' are the pipeline latches. Latch names are derived from the box names on either side 11 x-box> f/…
1. Pipeline hazard (10 points) The execution flow in a pipelined CPU can be visu
1. Pipeline hazard (10 points) The execution flow in a pipelined CPU can be visualized by drawing the pipeline execution diagram, An example is shown below: IF ID : EX' MEM ' wB I…
1. Piplelining Assume each instruction will divide into IF, Decode, EXE, MEM, an
1. Piplelining Assume each instruction will divide into IF, Decode, EXE, MEM, and WB stages. Consider executing the following code on the pipelined datapath of figure on slide 21 …
1. Pixels: a. We can see nearby objects easily, but to see distant objects clear
1. Pixels: a. We can see nearby objects easily, but to see distant objects clearly we need a telescope. Also, we need microscopes to see small objects clearly. For some reason, we…
1. Place a check mark beside the statements that are correct regarding an Ethern
1. Place a check mark beside the statements that are correct regarding an Ethernet MAC address. _ The left-most 24 bits in an Ethernet Mac address are the vendor's code number. _ …
1. Place function prototypes before main() to a. avoid compilation errors. b. re
1. Place function prototypes before main() to a. avoid compilation errors. b. reuse the function. c. avoid run-time errors. d. avoid linker errors. 2. What is wrong with this func…
1. Place parenthesis in the following expressions to explicitly show the order o
1. Place parenthesis in the following expressions to explicitly show the order of evaluation. For example, b) w++ z c) 1-a>= b * 6 + 71c 2. Convert the following switch-case co…
1. Plastic optical fiber (POF) is a low-cost alternative to standard fiber optic
1. Plastic optical fiber (POF) is a low-cost alternative to standard fiber optic cable.The core is of either Poly(methyl methacrylate) or Polystyrene and the cladding is usually o…
1. Playing cards are used in many computer games, including versions of such cla
1. Playing cards are used in many computer games, including versions of such classics as solitaire, hearts, and poker. Design a Card class that contains a character data field to …
1. Pleae choose one stock data from Yahoo Finance website. 2. Please use RStudio
1. Pleae choose one stock data from Yahoo Finance website. 2. Please use RStudio program for data analysis. 3. Please do (1) Polinomial equation modeling, (2)ARIMA modeling, (3)Mo…
1. Please (in your own words) summarize the dealer-broker record retention requi
1. Please (in your own words) summarize the dealer-broker record retention requirements from the passage below: In 1937, the Securities and Exchange Commission (SEC) set out rules…
1. Please answer all the follwing infulstructure for data warehousing quetions.
1. Please answer all the follwing infulstructure for data warehousing quetions. Please also share all of your answers. Chapter 8: What is the composition of the operational infras…
1. Please answer the following in Python 3 code. Please answer all questions and
1. Please answer the following in Python 3 code. Please answer all questions and share code and ouputs. Bus arrival times. Shuttle buses arrive at an airport to fetch passengers w…
1. Please answer the following questions. (20 points) We define the following 2-
1. Please answer the following questions. (20 points) We define the following 2-D array; int[][][]x=new in [2][3][4]; Answer questions 1.1 -13. 1.1 What is the memory size of x (i…
1. Please create a simple webpage that will collect: first name, last name, phon
1. Please create a simple webpage that will collect: first name, last name, phone number, email, and mailing address. All of those filed should be validated by a proper regular ex…
1. Please define the differences between eavesdropping, dumpster diving, & socia
1. Please define the differences between eavesdropping, dumpster diving, & social engineering in the IT world? 2. Define sidejacking and provide examples. 3. Define phishing a…
1. Please describe a brief project summary, summary of database requirement. (P.
1. Please describe a brief project summary, summary of database requirement. (P. 33 of textbook). (Example) Wedgewood Pacific Corporation (WPC) WPC has grown into an international…
1. Please describe the relationship between Data, Primitive Data Types, and Data
1. Please describe the relationship between Data, Primitive Data Types, and Data Structures in programming. 2. Explain the “trade offs or decisions” required when writing/creating…
1. Please describe what is SMTP and what is basic electronic mail operation(send
1. Please describe what is SMTP and what is basic electronic mail operation(sending email and receiving email). What is the difference between POP and IMAP? 2. Please describe wha…
1. Please describe, in a short 1-2 paragraph answer, just how a “Correlated Subq
1. Please describe, in a short 1-2 paragraph answer, just how a “Correlated Subquery “ actual works. How does the inner query interact with the outer query? Just how many times…
1. Please draw me a class diagram corresponding to the code. 2. And this code wo
1. Please draw me a class diagram corresponding to the code. 2. And this code won't let me input data about second person. check that for me please thanks // Data.java public clas…
1. Please give the algorithm and python source code for the following questions.
1. Please give the algorithm and python source code for the following questions. a. Write a program that will compute a 6% sales tax on a purchase. The user is to input the cost o…
1. Please help me debug my program 2. How to create a makefile to link them toge
1. Please help me debug my program 2. How to create a makefile to link them together ? This is my account.cpp below //Main program main.cpp #include "Person.h" #include "Person.cp…
1. Please help! :) Simple C++ Programming. Please make sure it compiles. FinalPr
1. Please help! :) Simple C++ Programming. Please make sure it compiles. FinalProb1.txt: John Harris 1000 50000.00 Lisa Smith 1002 75000.00 Adam Johnson 1007 96000.00 Sheila Smith…
1. Please implement this Paul\'s Bank Koester Bank Fort Worth, Texas 2. The End
1. Please implement this Paul's Bank Koester Bank Fort Worth, Texas 2. The End of Month button causes each 240000 account to be updated as described above. Note Account ID Amount …
1. Please show only structural hazards. mov [100], [150] mov [200], [250] add [1
1. Please show only structural hazards. mov [100], [150] mov [200], [250] add [150], [250], r3 sub r3, #5, r4 add r3, #2, r5 div r4, r5, IS Fi IDi Co IFo Ei W Instruction encoding…
1. Please use Python 3 and django (1,8) to create the following program. Please
1. Please use Python 3 and django (1,8) to create the following program. Please show all outputs. Here are the import and Post model for myapp/models.py Here is the PostTestCase t…
1. Please use Python 3 to write the follwing functions: Please do not write by h
1. Please use Python 3 to write the follwing functions: Please do not write by hand show all outputs and please share code. 2. Please show all outputs. PLEASE JUST ANSWER #3 BASED…
1. Please use R-programing to write the following code. Please show all steps, a
1. Please use R-programing to write the following code. Please show all steps, and outputs. Please also share you code and aswer all questions given in the format below. Aswer in …
1. Please use SelectionSort method we developed today in class to have a program
1. Please use SelectionSort method we developed today in class to have a program to sort through an array of double variables. Use can use example on page 270 (Listing 7.8)to code…
1. Please use c++ for the following question. 2. PLEASE SHOW ALL OUTPUT. 3. Writ
1. Please use c++ for the following question. 2. PLEASE SHOW ALL OUTPUT. 3. Write CppUnitLite tests to verify class functionality. 4. Define a class CharQueue with the public inte…
1. Please use your own words to define (a) intelligence; (b) artificial intellig
1. Please use your own words to define (a) intelligence; (b) artificial intelligence; (c) agent; and (3) rational agent (1 pt) 2. What is PEAS task environment description for int…
1. Please write a C++ program to display the star pattern on the American flag.
1. Please write a C++ program to display the star pattern on the American flag. In this program, you don't have to define a class, just use the main function and some user defined…
1. Please write a Python 3 Program and show all outputs. Write some functions th
1. Please write a Python 3 Program and show all outputs. Write some functions that: return a sequence with the first and last items exchanged. return a sequence with every other i…
Subject
Web development and programming
Use Browse or pick another subject.