Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 237 / 3837

1. Rolling Dice (15 points) Many pen-and-paper role-playing games (like Dungeons
1. Rolling Dice (15 points) Many pen-and-paper role-playing games (like Dungeons and Dragons) use dice to determine damage chances of success, and so forth. These games use polyhe…
1. Router XYZ has forwarding table: Network/Mask Next_Hop 94.212.192.0/20 delive
1. Router XYZ has forwarding table: Network/Mask Next_Hop 94.212.192.0/20 deliver directly 94.212.208.0/20 10.0.0.1 94.212.224.0/19 20.0.0.2 94.212.192.0/18 30.0.0.3 0.0.0.0/0 40.…
1. Router_A is currently the OSPF designated router (DR). When will an election
1. Router_A is currently the OSPF designated router (DR). When will an election occur for a new DR? (Points : 2)        When a new router comes up with a higher OSPF priority     …
1. Rule-based Systems Given facts: A, B Conflict resolution: FCFS R1: IF A and D
1. Rule-based Systems Given facts: A, B Conflict resolution: FCFS R1: IF A and D R2: IF C and D R3: IF B and E R4: IF B R5: IF F THEN E THEN F THEN F THEN D THEN G 1) What can be …
1. Run query that converts the uppercase names in a database into normal case (i
1. Run query that converts the uppercase names in a database into normal case (i.e. JERRY JACK becomes Jerry Jack). 2. Run a query that reports back the average of each exam in th…
1. Run the following program. what is the output? 1.5 pts) int mainlvoid) float
1. Run the following program. what is the output? 1.5 pts) int mainlvoid) float f1 100001, 2-1 000001, f3. 2. What is the output of the folowing programs if the user enters 36.7 f…
1. Run what.s (downloadable from \"Assignment 2\" on eLearning) in SPIM, examine
1.   Run what.s (downloadable from "Assignment 2" on eLearning) in SPIM, examine some of the registers etc in the SPIM windows, and look in the code of what.s, and try to work out…
1. Run-length encoding is a relatively simple technique for compressing data; if
1. Run-length encoding is a relatively simple technique for compressing data; if a particular value (or substring) appears multiple times in a row, it is only represented once, fo…
1. Running and Grand Total Program Create a .cpp program that asks the user for
1. Running and Grand Total Program Create a .cpp program that asks the user for a maximum number. A loop will then run from 1 to this many times. Each time the loop runs, two user…
1. Ryan is readying for a face-off at the begninning of a hockey game. What is t
1. Ryan is readying for a face-off at the begninning of a hockey game. What is the total Force that ryan exerts on the ice? What is the total force of the ice on Ryan? Assume that…
1. SNMP. Pros and Cons. Write at least 4 paragraphs, with at least 5 sentences i
1.     SNMP. Pros and Cons. Write at least 4 paragraphs, with at least 5 sentences in each paragraph.   For the first 2 paragraphs detail several core advantages of using SNMP. De…
1. SQL (50 pts) Orders Order OrdeDate Statu Products Stores Order Repion Super 1
1. SQL (50 pts) Orders Order OrdeDate Statu Products Stores Order Repion Super 1001 3/1/2014 Cosed 28 101 10 1002 3/1/2014 Cosed 28 101 8 1003 3/1/2014 Open 28 102 50 1004 3/2/201…
1. SSL only has a single protocol which is used for Web security. A. True B. Fal
1. SSL only has a single protocol which is used for Web security. A. True B. False 2.When you use https, all contents of the document in the communication are encrypted. A. True B…
1. SUBMITTING NEW TRANSACTIONS Since the job of this program is to store and aud
1. SUBMITTING NEW TRANSACTIONS Since the job of this program is to store and audit transactions, let’s discuss how those transactions will be submitted and stored within our progr…
1. SUMMARY This project will involve the creation of a Blockchain miner that doe
1. SUMMARY This project will involve the creation of a Blockchain miner that does all the following: Receives transactions from user or remote node. Sends transactions to a remote…
1. SUMMARY This project will simulate the card game Concentration for one player
1. SUMMARY This project will simulate the card game Concentration for one player. In Concentration, all cards, or pictures in this case, are upside down. Two cards are chosen, and…
1. Save all employees entered on the keyboard into a file called “Employees.dat”
1. Save all employees entered on the keyboard into a file called “Employees.dat”. 2. After the calculation of each employee payment is done, instead of printing all of the employe…
1. Save all employees entered on the keyboard into a file called “Employees.dat”
1. Save all employees entered on the keyboard into a file called “Employees.dat”. 2. After the calculation of each employee payment is done, instead of printing all of the employe…
1. Save this unstyled XHTML file (http://www.cs.sfu.ca/CC/165/ggbaker/1107-c1/la
1. Save this unstyled XHTML file (http://www.cs.sfu.ca/CC/165/ggbaker/1107-c1/labs/files/lab5-list.html) Create a stylesheet for this page. You will be styling only the menu list—…
1. Scenario: John is a new, full-time technician. You assigned John to take a ne
1. Scenario: John is a new, full-time technician. You assigned John to take a new PC downstairs to be deployed in the main distribution facility. In carrying the PC, he cradled it…
1. Scopes and Durations of variables: A variable is defined by declaring it in t
1. Scopes and Durations of variables: A variable is defined by declaring it in the program. Thus, for example, in function f(int i), i is declared as a variable. When a variable i…
1. Scoping and Binding Each of the following programs is written in a C-like not
1. Scoping and Binding Each of the following programs is written in a C-like notation, but is not C. (a) Write in the boxes what would be printed if the language had each type of …
1. Search Benchmarks int array[20] = {78, 45, 33, 1, 6, 41, 99, 54, 73, 28, 101,
1.       Search Benchmarks int array[20] = {78, 45, 33, 1, 6, 41, 99, 54, 73, 28, 101, 60, 21, 82, 11, 15, 654, 36, 52, 70}; Write a program that has an array of 20 integers. (You…
1. Search Benchmarks int array[20] = {78, 45, 33, 1, 6, 41, 99, 54, 73, 28, 101,
1.       Search  Benchmarks int array[20] = {78, 45, 33, 1, 6, 41, 99, 54, 73, 28, 101, 60, 21, 82, 11, 15, 654, 36, 52, 70}; Write a program that has an array of 20 integers. (Yo…
1. Search the Internet for an open source or commercial Access Control Capabilit
1. Search the Internet for an open source or commercial Access Control Capabilities system. Please choose one and give its name and the URL. Read about the system you find and sum…
1. Search the key value 128 from the following record 209, 24, 17, 106, 245, 128
1. Search the key value 128 from the following record 209, 24, 17, 106, 245, 128, 216, 156 by using the following two different search techniques, respectively, a) Sequential sear…
1. Search: Given the following sorted array of 150 numbers from 0 to 999 3 7 11
1. Search: Given the following sorted array of 150 numbers from 0 to 999 3 7 11 12 18 25 31 36 48 51 57 59 65 73 84 88 94 97 110 119 137 142 151 158 161 174 176 179 185 192 194 20…
1. Security in Oracle Apps, Users, Menus, Responsibilities, Profile Options 2. F
1. Security in Oracle Apps, Users, Menus, Responsibilities, Profile Options 2. Flex Fields – Key and Descriptive – Talk about the different KFFs and how to enable a segment on a D…
1. Sedentary (not active) 2. Somewhat active (exercise occasionally) 3. Active (
1. Sedentary (not active) 2. Somewhat active (exercise occasionally) 3. Active (exercise 3-4 times per week) 4. Highly Active (exercise every day) Ask the user to select the categ…
1. Select all that apply : When is the queue empty? Front = -1 Back = -1 Front
1. Select all that apply: When is the queue empty? Front = -1 Back = -1 Front <= Back Front > Back Front = Back 2. Each item in priority queue has a value denoting its ... s…
1. Select an organization of your choice (IBM), describe the organization and it
1. Select an organization of your choice (IBM), describe the organization and its governance structure that is currently being followed. Please note you have to provide references…
1. Select any business sector in the country in which you currently reside, and
1.    Select any business sector in the country in which you currently reside, and present a reasonably detailed case, based mainly on economic grounds, for why large organisation…
1. Select one or more of the following statements that are valid/true when a pro
1. Select one or more of the following statements that are valid/true when a programer or CPU designer decides to increase the number of bits used to represent a certain type of d…
1. Select one: a. PDF b. text c. Paradox d. Excel 2. An _______ database file is
1. Select one: a. PDF b. text c. Paradox d. Excel 2. An _______ database file is a locked-down version of a database. Select one: a. ACCXP b. ACCDB c. ACCDE d. BACKUP 3. An object…
1. Select one: a. PDF b. text c. Paradox d. Excel 2. An _______ database file is
1. Select one: a. PDF b. text c. Paradox d. Excel 2. An _______ database file is a locked-down version of a database. Select one: a. ACCXP b. ACCDB c. ACCDE d. BACKUP 3. Opening a…
1. Select the appropriate programming languages for the following applications o
1. Select the appropriate programming languages for the following applications out of high level, assembly and machine/binary. Justify your answers. a. An open source compiler tha…
1. Select the best answer regarding your observation a. both s(t) and b(t) appea
1. Select the best answer regarding your observation a. both s(t) and b(t) appear as identical sine waves b. both s(t) and b(t) appear as identical cosine waves c. s(t) appears as…
1. Select the correct statement(s) regarding the Address Resolution Protocol (AR
1. Select the correct statement(s) regarding the Address Resolution Protocol (ARP). a. When an IP datagram is received, ARP initially inspects its cache to see if the IP address m…
1. Select the derived class method definitions that represent actual method chai
1. Select the derived class method definitions that represent actual method chaining (never mind the reason or effect, as long as it demonstrates a derived class method chaining t…
1. Selection sort is a popular sorting algorithm. The algorithm works as follows
1. Selection sort is a popular sorting algorithm. The algorithm works as follows: 1).Find the minimum value in the list. 2). Swap it with the value in the first position. 3). Repe…
1. Selection sort starts at the beginning of the list and compares pairs of data
1. Selection sort starts at the beginning of the list and compares pairs of data items as it moves down to the end. A. True B. False 2. Bubble sort is ____. A. O(n2) B. O(log2n) C…
1. Set echo on 2. SET SERVEROUT ON 3. Set up a spool file to receive your output
1. Set echo on 2. SET SERVEROUT ON 3. Set up a spool file to receive your output for submission. I would suggest c:CSwa5spool.txt . 4. DECLARE a record variable (Emp_rec) using %R…
1. Several operating systems have two privilege modes. The VMS operating system
1. Several operating systems have two privilege modes. The VMS operating system has four privilege modes. What are the advantages and disadvantages of a system having four modes v…
1. Shopping for a Computer Look at computer ads on some current retail websites.
1. Shopping for a Computer Look at computer ads on some current retail websites. Create a checklist and use it to compare three desktop or notebook computers. In 3 to 4 paragraphs…
1. Short-Answer Questions about Software Testing 1a) Programs can be thoroughly
1. Short-Answer Questions about Software Testing 1a) Programs can be thoroughly tested and must be thoroughly test. Right or wrong? Why? 1b) A tester must be a good programmer. Ri…
1. Shortest Paths using LP: (5 points) Shortest paths can be cast as an LP using
1. Shortest Paths using LP: (5 points) Shortest paths can be cast as an LP using distances dv from the source s to a particular vertex v as variables. We can compute the shortest …
1. Show (using a truth table) that the following argument holds p V q ~p V r The
1. Show (using a truth table) that the following argument holds p V q ~p V r Therefore q V r 2. Given the following, first identify the different propositions (label them as p, q,…
1. Show how heapsort processes the sequence 5, 13, 2, 25, 7, 17, 20, 8, 4. Start
1. Show how heapsort processes the sequence 5, 13, 2, 25, 7, 17, 20, 8, 4. Start with heap construction, and then remove the maximum element one at a time. You can either draw a t…
1. Show how to calculate the sum and average values from an array of numbers. 2.
1. Show how to calculate the sum and average values from an array of numbers. 2. Show how to find if a value exists in an array of numbers; find the smallest or largest value in a…
1. Show how you can use frequency table to decipher the following ciphertext whi
1. Show how you can use frequency table to decipher the following ciphertext which is based on the Caesar cipher without knowing the key: Irkpmwl pmxivexyvi mw xli wxyhc sj pmxive…