Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 235 / 3837

1. Process can be in different states to allocate the resources better. List the
1. Process can be in different states to allocate the resources better. List the symbol and meaning for each of these states. (10 points) 2. What does it mean to spawn a process? …
1. Processes can incur a race condition when running on an OS with ________ kern
1. Processes can incur a race condition when running on an OS with ________ kernel.        a non-preemptive        a preemptive        both a preemptive and a non-preemptive 2. Th…
1. Processes consume two resources: processing time and ____. A. bandwidth B. st
1. Processes consume two resources: processing time and ____. A. bandwidth B. storage C. I/O D. Memory 2. Sequential search is also called polynomial search. A. True B. False 3. I…
1. Procurement is an operational process executed hundreds or thousands of times
1. Procurement is an operational process executed hundreds or thousands of times a day in a large organization. 2. Finding reliable suppliers is a procurement objective among orga…
1. Produce a menu system that looks EXACTLY like the following illustration Java
1. Produce a menu system that looks EXACTLY like the following illustration Java Vending Machine (1) : Chewing Gum -- 40c (2) : Potato Chips -- 75c (3) : Snickers -- 80c (4) : Pop…
1. Produce a menu system that looks EXACTLY like the following illustration Java
1. Produce a menu system that looks EXACTLY like the following illustration Java Vending Machine (1) : Chewing Gum -- 40cent (2) : Potato Chips -- 75cent (3) : Snickers -- 80cent …
1. Produce a report on why sensitive information 3. Write a security policy for
1. Produce a report on why sensitive information 3. Write a security policy for company-owned cell should not be sent over the Wireless Application Protocol phones that use the Bl…
1. Programmers at the Application layer use syntax and semantics to make use of
1. Programmers at the Application layer use syntax and semantics to make use of a common computer language. One of these things are grammatical structure rules the other is how a …
1. Programming (non-collaborative) -Due at the end of Module 9. Given an array,
1. Programming (non-collaborative) -Due at the end of Module 9. Given an array, a[i],... ,alj] with J-1-2, let k = 1(it j)/2 and choose as the partition element for QUICKSORT the …
1. Programming Assignment For this lab, there are two parts. The first part deal
1. Programming Assignment For this lab, there are two parts. The first part deals with pass-by-reference or call-by-reference. The second part deals with pointers. 1.1.    Pass-by…
1. Programming Assignment For this lab, we are going to use a pointer in a class
1.   Programming Assignment For this lab, we are going to use a pointer in a class definition. Note: The lab files (Student.h, and lab6.cpp) are available on GL in the directory: …
1. Programming Exercise #3 (How Much Insurance) The program should consist of a
1. Programming Exercise #3 (How Much Insurance) The program should consist of a main function, which asks the user to enter the replacement cost of a building, a function called c…
1. Programming Exercise House Renovation Your program must work for any valid nu
1.      Programming Exercise House Renovation Your program must work for any valid number of feet including fractions and for any valid cost per square foot. Each run of your prog…
1. Programming Exercise House Renovation(java programing) Your java program must
1.       Programming Exercise House Renovation(java programing) Your java program must work for any valid number of feet including fractions and for any valid cost per square foot…
1. Programming with Stacks Write a program that uses Stacks to determine if a li
1.         Programming with Stacks Write a program that uses Stacks to determine if a line written with parentheses is well-formed or not. This is a subtask similar to what compil…
1. Prompt User at the Command Line to: 1. Enter type of dog (give a list of 3 to
1. Prompt User at the Command Line to: 1. Enter type of dog (give a list of 3 to 5 types to choose from) 2. Enter type of service( 1.shampoo 2.grooming or 3.both) 3. Enter option …
1. Prompt and read in the x and y coordinates of the center of circle A: 2. Prom
1. Prompt and read in the x and y coordinates of the center of circle A: 2. Prompt and read in the radius of circle A 3. Prompt and read in the x and y coordinates of the center o…
1. Prompt the user fordesired altitude and a number of time steps. 2. Cause the
    1. Prompt the user fordesired altitude and a number of time steps.     2. Cause the balloon toascend to one-third of the specified altitude, then cruise forone-quarter of the …
1. Prompt the user to input a character and a real number, and output them. 2. I
1. Prompt the user to input a character and a real number, and output them. 2. If the character is ‘A’ and the number is positive, calculate the area of a circle using the number …
1. Prove or disprove formally: (a) The largest even prime number is 2. For the f
1. Prove or disprove formally: (a) The largest even prime number is 2. For the following, study the definitions in the notes on Binary Trees. (b) The number of leaf nodes (nodes w…
1. Prove that 1*2*3 + 2*3*4 +...+ n(n+1)(n+2) = n(n + 1)(n + 2)(n + 3)/4 by indu
1. Prove that 1*2*3 + 2*3*4 +...+ n(n+1)(n+2) = n(n + 1)(n + 2)(n + 3)/4 by induction on n. 2. Suppose there are n people in a group, and each person knows a secret that no other …
1. Prove that the difference of two odd integers is even. Give a justification a
1. Prove that the difference of two odd integers is even. Give a justification at each step. (20 points) 2. Prove that the sum of any two rational numbers is a rational number. Gi…
1. Provide a good descriptive function name (correct syntax) that would be appro
1. Provide a good descriptive function name (correct syntax) that would be appropriate for each of the following: a. function1() takes no arguments and returns no arguments b. fun…
1. Provide a single MIPS assembly instruction or a sequence of MIPS assembly ins
1. Provide a single MIPS assembly instruction or a sequence of MIPS assembly instructions that performs: a. incrementing register $10 by 1020 b. loading register $10 with value -3…
1. Provide a technical description of 4B/5B Digital Encoding Scheme. Contrast it
1. Provide a technical description of 4B/5B Digital Encoding Scheme. Contrast it with the Manchester scheme. Explain how and why it provides better data rates. 2. Create a ranked …
1. Provide algorithms that are sensitive to the relative sizes of n and m. (a) L
1. Provide algorithms that are sensitive to the relative sizes of n and m. (a) Let R1 be a red-black tree with n elements. Let R2 be a red-black tree with m elements, where m ? n.…
1. Provide an example JavaScript code for allocating memory for array of 1000 el
1. Provide an example JavaScript code for allocating memory for array of 1000 elements. 2. Provide an example JavaScript code for declaring an array. 3. Provide an example JavaScr…
1. Provide an example of how you would use a pointer in a program. Explain an ad
1. Provide an example of how you would use a pointer in a program. Explain an advantage of using a pointer versus using a nonpointer variable. 2. a pointer variables holds the add…
1. Provide an executive overview that addresses the following: %u2026Explain the
1.            Provide an executive overview that addresses the following: %u2026Explain the benefits and current trends of data warehousing and data mining. %u2026Provide two (2) …
1. Provide the definition of the following class MyString. The test function and
1. Provide the definition of the following class MyString. The test function and the expected output are provided. else } 2. Below is an example of a sorting algorithm that sorts …
1. Provide the definition of the following class MyString. The test function and
1. Provide the definition of the following class MyString. The test function and the expected output are provided. else } 2. Below is an example of a sorting algorithm that sorts …
1. Provided the network schematics as shown below. A special scenario where two
1. Provided the network schematics as shown below. A special scenario where two hosts H H2 send TCP and UDP traffic to the same host H3 respectively both at 100MBits/s. All of the…
1. Providing access to the Web for all people is an important issue. Visit WebAI
1. Providing access to the Web for all people is an important issue. Visit WebAIM's Accessibility training at http://webaim.org/intro/. View additional pages at the site as necess…
1. Providing array values is sometimes called ____. 2. Arrays cannot be used if
1. Providing array values is sometimes called ____. 2. Arrays cannot be used if you need to search for a range of values. 3. When you search through a list from one end to the oth…
1. Q1 - Quiz 6 (Points: 10) Do not make this question complicated; It is a simpl
1. Q1 - Quiz 6 (Points: 10) Do not make this question complicated; It is a simple exercise on structure before we get to classes and more objects. Consider a bank certificate of d…
1. Q: Objectives are long-term, ongoing and qualitative statements of a state or
1. Q: Objectives are long-term, ongoing and qualitative statements of a state or condition that the organization is seeking to establish and maintain. A: True or False 2. Q: Each …
1. Quadratic Equation: Design and write a C++ code that solves a quadratic equat
1. Quadratic Equation: Design and write a C++ code that solves a quadratic equation ax^2 + bx + c = 0. Please use class and object definitions and do not use procedural style. Let…
1. Quality Control of Suture Packaging Sutures are strands or fibers used to sew
1. Quality Control of Suture Packaging Sutures are strands or fibers used to sew living tissue together after an injury or an operation. Packages of sutures must be sealed careful…
1. Question 1 Given a tree whose head is a pointer r and in which each vertex ha
1. Question 1 Given a tree whose head is a pointer r and in which each vertex has a pointer lef t(x) to the left child and r(x) for the right child. Give an algorithm that finds t…
1. Question: (TCO 4) User input values should always be checked for Your Answer:
1. Question: (TCO 4) User input values should always be checked for Your Answer: Reasonableness Division by zero, if division is taking place Appropriate range All of the above Co…
1. Question: The following pseudo code IF AVG > 93 THEN GRADE = \"A\" ELSE GRADE
1. Question: The following pseudo code IF AVG > 93 THEN GRADE = "A" ELSE GRADE = "B" ENDIF IF AVG > 73 THEN GRADE = "C" ELSE GRADE = "F" ENDIF represents a sequential IF-THE…
1. Quiz15 MC01 What is the binary value of AL after the following instructions h
1. Quiz15 MC01 What is the binary value of AL after the following instructions have executed? mov al,1000 0101b clc rcr al,1 a. 0 b. 0100 0010 c. 0 d. 0 2. Quiz15 MC02 What is the…
1. R6.31 Section 6.8.8 shows that you must be careful about updating the index v
1. R6.31 Section 6.8.8 shows that you must be careful about updating the index value when you remove elements from an array list. Show how you can avoid this problem by traversing…
1. Read a value in two’scomplement notation from a file named input8.txt. 2. Con
1.      Read a value in two’scomplement notation from a file namedinput8.txt. 2.      Convert the value fromtwo’s complement notation to decimal notation. 3.      Output tooutput8…
1. Read data from a user defined file name. (the data tobe used can be obtained
1. Read data from a user defined file name. (the data tobe used can be obtained here) 2. Design and implement an array(s) to read in and storethe data in that file 3. Traverse the…
1. Read in the bowler info below from a file. Calculate the average for the 3 ga
1. Read in the bowler info below from a file. Calculate the average for the 3 games. If the average is 100 or below, print out bad bowler, if the average is 101-200, print out goo…
1. Read the Bellingham, Washington, Control System Case and then answer the foll
1. Read the Bellingham, Washington, Control System Case and then answer the following question: What do you think could/should have been done to prevent this incident (relate your…
1. Read the contents of a data file (mytext.dat); 2. Process the frequency of ch
1. Read the contents of a data file (mytext.dat); 2. Process the frequency of characters (a-z) that appear in the data file 3. Print the frequency of characters in the file to the…
1. Read the image data file “original.txt” into your program, (file contains the
1. Read the image data file “original.txt” into your program, (file contains the following numbers): 1122333444 0011223334 0000011223 5000000001 5550000000 5555550000 5555555555 t…
1. Read the story. 2. Identify all of the Unix commands and utilities to which i
1. Read the story. 2. Identify all of the Unix commands and utilities to which it refers. 3. Look up each command or utility in the man pages. 4. In your lab report, include a des…