Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 236 / 3837

1. Reading Data from Files Input data read from the keyboard and output data wri
1. Reading Data from Files Input data read from the keyboard and output data written to the screen are temporary and will be lost when the program ends. In this lab component, you…
1. Reading From/Writing To a File Every input or output file seems to have two n
1. Reading From/Writing To a File Every input or output file seems to have two names. The actual name, or external file name, is the name of the file as it appears on your compute…
1. Rearrange the following numbers from largest to smallest (show work): 0110010
1. Rearrange the following numbers from largest to smallest (show work): 0110010 17H 88 2. Perform the Operations: 00101100 + 01001101= ? 6D + 2A = ? 3. Evaluate the following ari…
1. Recall the activity from the first day of class » Every student starts with a
1. Recall the activity from the first day of class » Every student starts with a piece of paper with their name, the month and day of their birthday, Suml -1 and Sum2 1. » Repeat …
1. Recall the activity from the first day of class: .Every student starts with a
1. Recall the activity from the first day of class: .Every student starts with a piece of paper with their name, the month and day of their birthday, Sumi 1 and Sum2 1 .Repeat unt…
1. Recall the language TSP = (G, k | k is an integer; G is an undirected, weight
1. Recall the language TSP = (G, k | k is an integer; G is an undirected, weighted, complete graph with non-negative integer weights with a tour of weight k) Note that we require …
1. Recover the key A key is a string of n digits. A sliding window ofsize w (2 m
1. Recover the key A key is a string of n digits. A sliding window ofsize w (2 moves from the start to the end ofthe key, generating n-w+1 overlapping-fragments in the process. Ea…
1. Recursive Multiplication Write a recursive function that accepts two argument
1. Recursive Multiplication Write a recursive function that accepts two arguments into the parameters x and y. The function should return the value of x times y. Remember, multipl…
1. Recursive Multiplication Write a recursive function that accepts two argument
1. Recursive Multiplication Write a recursive function that accepts two arguments into the parameters x and y. The function should return the value of x times y. Remember, multipl…
1. Redefine CDAccount from Display 10.1 so that it is a class rather than a stru
1. Redefine CDAccount from Display 10.1 so that it is a class rather than a structure. Use the same member variables as in Display 10.1 but make them private. Include member funct…
1. Refer to table 1.0 Using the SELECT statement below what would be the possibl
1. Refer to table 1.0 Using the SELECT statement below what would be the possible output: SELECT NAME, ORG, POSITION FROM ORGCHAR WHERE NAME LIKE ‘%A’; Select one: a. Incorrect SE…
1. Refer to the following diagram, where a switch with ports 1 to 8 is connected
1. Refer to the following diagram, where a switch with ports 1 to 8 is connected to devices with MAC addresses A to H 7 12 3 4 Port Number Access Poin Devices Assume that the forw…
1. Refer to the following diagram, where a switch with ports 1 to 8 is connected
1. Refer to the following diagram, where a switch with ports 1 to 8 is connected to devices with MAC addresses A to H 7 12 3 4 Port Number Access Poin Devices Assume that the forw…
1. Referencing an Array implementation of a Queue; Illustrate by drawing the imp
1. Referencing an Array implementation of a Queue; Illustrate by drawing the implementation of what happens if the front or rear advances past the last array position (it is reset…
1. Referential integrity means Select one: a. Do not enter a value in the foreig
1. Referential integrity means Select one: a. Do not enter a value in the foreign key field of a child table if that value does not exist in the primary key of the parent table b.…
1. Registry conditions: A. Show how the decimal integer * -120 would be stored i
1. Registry conditions:         A. Show how the decimal integer          * -120 would be stored in 16 bits          * -120 would be stored in 8 bits          * -32456 would be sto…
1. Regular Track Write a C+ OOP simul two classes. One must be general vending m
1. Regular Track Write a C+ OOP simul two classes. One must be general vending machine. The other can be either vending machine of soda, or vending machine of snack. These vending…
1. Regular Track Write a C+ OOP simul two classes. One must be general vending m
1. Regular Track Write a C+ OOP simul two classes. One must be general vending machine. The other can be either vending machine of soda, or vending machine of snack. These vending…
1. Regular track: Write an online store website (typically online store) with HT
1. Regular track: Write an online store website (typically online store) with HTML, CSS, and PHP using WebMatrix. HTML forms are required. The website must contain dynamic content…
1. Relational Operators and the if Statement Consider the following code // This
1. Relational Operators and the if Statement Consider the following code // This program tests whether or not an initialized value // is equal to a value input by the user // PLAC…
1. Relational Operators and the if Statement Consider the following code // This
1. Relational Operators and the if Statement Consider the following code // This program tests whether or not an initialized value // is equal to a value input by the user // PLAC…
1. Remembering the rules of precedence and associativity write the calue of the
1. Remembering the rules of precedence and associativity write the calue of the following arithmetic expressions or error if an error would occur: a. 4 + 8 * 2 b. 6 + 17 % 3 / 2 c…
1. Research and write below the prototype of the standard C++ function which con
1. Research and write below the prototype of the standard C++ function which converts a character to a lowercase form of the same character. 2. In several standard C++ functions t…
1. Research new network observation tools that use enhanced techniques, such as
1. Research new network observation tools that use enhanced techniques, such as virtual machine-based code execution, to detect unwanted network traffic, e.g., botnet activity or …
1. Research on the Internet to obtain an estimate of how often a person sneezes
1. Research on the Internet to obtain an estimate of how often a person sneezes in a day. import java.util.Scanner; public class HealthData { public static void main (String[] arg…
1. Research online to find 3 possible software products that you might use to im
1. Research online to find 3 possible software products that you might use to implement the CRM Term Project. Submit the vendor names, product names and links with in your drop bo…
1. Research the practice of key logging. Describe what it is, and explain why so
1. Research the practice of key logging. Describe what it is, and explain why some people defend the practice and while others do not. Finally, give your own opinion and defend it…
1. Research the topic of Computer Ethics on the Internet. 2. In your own words,
1. Research the topic of Computer Ethics on the Internet. 2. In your own words, write an report on Computer Ethics by addressing one of the questions below. 3. The report should b…
1. Researchers created the interdisciplinary design science of human-computer in
1. Researchers created the interdisciplinary design science of human-computer interaction by applying the methods of experimental psychology to the powerful tools of computer scie…
1. Resolving collisions by using buckets that are linked chains is called a.. se
1. Resolving collisions by using buckets that are linked chains is called a.. separate chaining b, bucket chaining c. st resolution d. joint chaining 2. The most efficient approac…
1. Retail Price Calculator : Create a GUI calculator where the user enters a who
1. Retail Price Calculator : Create a GUI calculator where the user enters a wholesale cost of an item and its markup percentage into textfields. When a button is pressed, display…
1. Retrieve H2 header of a webpage and assign the result to some variable named
                    1. Retrieve H2 header of a webpage and assign the result to some variable named bigheader.                                                       2. Retrieve fi…
1. Retrieve customer names and number of orders placed; display the results in o
1. Retrieve customer names and number of orders placed; display the results in order of “importance” as calculated by total orders placed. 2. Modify the query in #1 to also includ…
1. Retrieve the employee ids, first and last names who work for department numbe
1. Retrieve the employee ids, first and last names who work for department number 2 3 pts) (3 pts Retrieve first and last name of the employee whose id 5; display result in sorted…
1. Retrieve the first name, last name, and SSN of each employee along with the d
1. Retrieve the first name, last name, and SSN of each employee along with the department name he/she is working for. 2. For each project, retrieve its name and the names of emplo…
1. Reversing a 1-D array. Write a Python function that given an array A of numbe
1. Reversing a 1-D array. Write a Python function that given an array A of numbers returns an array B that has the elements of A in reverse order. YOU CANNOT USE THE BUILT IN PYTH…
1. Review the code in the JavaScript file to see that it includes a function for
1.       Review the code in the JavaScript file to see that it includes a function for running the slide show and a statement that starts the slide shown by running this function.…
1. Review the following code and follow the instructions that follow. int main()
1. Review the following code and follow the instructions that follow. int main() { int x = 4; if (CODE SEGMENT) cout << "YES " << endl; return 0; } Note that the code …
1. Review the third capture and determine what is happening with the PPP traffic
1. Review the third capture and determine what is happening with the PPP traffic in this capture. What else is involved? a. Research one of the protocols relating to PPP and descr…
1. Revise the following sentences to eliminate the misplaced modifiers. a. Over
1. Revise the following sentences to eliminate the misplaced modifiers. a. Over the past three years we have estimated that eight hours per week are spent on this problem. 2. Revi…
1. Revise the following sentences to eliminate the obvious material. a. To regis
1. Revise the following sentences to eliminate the obvious material. a. To register to take a course offered by the university, you must first determine whether the university wil…
1. Rewrite Project 3 using an array of objects, rather than the three parallel a
1.    Rewrite Project 3 using an array of objects, rather than the three parallel arrays of Project 3. Create a class named inventory, there are 3 data fields: itemId, storeNr and…
1. Rewrite the Quicksort routine so that it now calculates the Pivot value a cou
1. Rewrite the Quicksort routine so that it now calculates the Pivot value a couple of different ways. First, make sure you keep the original version. Second, create another versi…
1. Rewrite the following GrowList class so that it is immutable. (Note: Keep the
1. Rewrite the following GrowList class so that it is immutable. (Note: Keep the same representation): import java.util.*; // GrowList is a mutable list that only gets longer. pub…
1. Rewrite the following code segment using while loop int ires = 2; for (int in
1. Rewrite the following code segment using while loop int ires = 2; for (int index = 10, index>=6, --index) ires += index; ----------------- 2. Rewrite the following code segm…
1. Rewrite the following if else statements using a conditional operator . Assum
1. Rewrite the following if else statements using a conditional operator . Assume all variables are declared properly. If (x >=y) Z=x-y; Else Z =y-x; If (score>=60) Str="pas…
1. Rewrite the following loops, using the enhanced for loop construct. Here, val
1. Rewrite the following loops, using the enhanced for loop construct. Here, values is an array of floating-point numbers. a) for (int i = 0; i < values.length; i++) { total = …
1. Rewrite the following script, replacing the FOR -loop with a WHILE -loop. Sav
1. Rewrite the following script, replacing the FOR -loop with a WHILE -loop. Save your file as whileLoopino.py for n in range(-50,150,5): print n Note: The comma at the end of the…
1. Rewrite the table shown below, filling in any missing parts indicated by ques
1. Rewrite the table shown below, filling in any missing parts indicated by question marks The comment for x7FFF shows the level of comment needed (you can write in more detail if…
1. Ripple-Carry Adder RCA) First write a module for a full adder (FA) with: Inpu
1. Ripple-Carry Adder RCA) First write a module for a full adder (FA) with: Inputs: x, y and cin (all 1 bit). outputs: s and cout (both 1 bit). Use Figs. 3.4 and 3.18, 3.19, 3.20 …