Web development and programming
191828 questions • Page 241 / 3837
1. Switch to a command-line terminal (tty2) by pressing Ctrl+Alt+F2 and log in t
1. Switch to a command-line terminal (tty2) by pressing Ctrl+Alt+F2 and log in to the terminal using the user name of root and the password of LNXrocks!. 2. At the command prompt,…
1. Switch to a command-line terminal (tty2) by pressing Ctrl+Alt+F2 and log in t
1. Switch to a command-line terminal (tty2) by pressing Ctrl+Alt+F2 and log in to the terminal using the user name of root and the password of LNXrocks!. 2. At the command prompt,…
1. Systems analyst 2. Data structure 3. Bipolar closed questions 4. Logical data
1. Systems analyst 2. Data structure 3. Bipolar closed questions 4. Logical data structures 5. Context diagram 6. Data store 7. Agile modeling 8. Funnel structure 9. Level-0…
1. T F A programmer usually finds that it takes longer to find the errors in a p
1. T F A programmer usually finds that it takes longer to find the errors in a program so the program can execute correctly than it takes to write the program in the first pla…
1. T F A stack is a First In First Out data structure. 2. T F The stack pointer
1. T F A stack is a First In First Out data structure. 2. T F The stack pointer keeps track of the first element to be popped off the stack. 3. T F The stack protocol is …
1. T F In the LC-3, the user program invokes the OS to perform an I/O operation
1. T F In the LC-3, the user program invokes the OS to perform an I/O operation using the TRAP command. 2. T F The System Control Block or the Trap Vector Table is a…
1. T F It is more difficult to remember the assembly language name for an opcode
1. T F It is more difficult to remember the assembly language name for an opcode than the machine language name for the same opcode. 2. T F A single assembly language name f…
1. T F The LC-3 uses special input/output instructions to communicate with I/O d
1. T F The LC-3 uses special input/output instructions to communicate with I/O devices. 2. T F In the LC-3, when a key on the keyboard is pressed, KBDR holds the 2's complemen…
1. T F The data type supported by the LC-3 ISA is 1\'s complement integers. 2. T
1. T F The data type supported by the LC-3 ISA is 1's complement integers. 2. T F For an LC-3 instruction that uses the PC-Relative addressing mode, bits [15:9] of the add…
1. T/F Like the FireWire bus, SCSI buses also use a serial interface. 2. T/F The
1. T/F Like the FireWire bus, SCSI buses also use a serial interface. 2. T/F The acknowledgement gap and subaction gap are essentially the same. 3. T/F – Early systems did not hav…
1. T/F – Operand data can be logical data or addresses. true 2. T/F – Stacks are
1. T/F – Operand data can be logical data or addresses. true 2. T/F – Stacks are visible elements of the system that store program information. 3. T/F – Memory instructions are us…
1. TCO 4) What are the two classes in Java that are provided for in the datagram
1. TCO 4) What are the two classes in Java that are provided for in the datagram socket API? DatagramSend and DatagramReceive. 2. (TCO 4) In which of the following cases would an …
1. TCP is a connection-oriented layer 4 protocol that uses windowing as a form o
1. TCP is a connection-oriented layer 4 protocol that uses windowing as a form of network congestion control. True False 2. Select the correct statement(s) regarding TCP and UDP t…
1. TRUE OR FALSE? Some modern malware can directly attack and disable antivirus
1. TRUE OR FALSE? Some modern malware can directly attack and disable antivirus software or modify its signature to avoid detection. Despite these shortcomings you should still us…
1. Tail recursion _______ . A) always takes more time than regular recursion B)
1. Tail recursion _______ . A) always takes more time than regular recursion B) can be transformed into an iterative algorithm — algorithmically C) is just as problematic as redun…
1. Take a critical look at three GUI applications you have used-for example, a s
1. Take a critical look at three GUI applications you have used-for example, a spreedsheet, a word-processing program, and a game. Describe how well each conforms to the GUI desig…
1. Take a position on whether social engineering tactics can defeat any technolo
1. Take a position on whether social engineering tactics can defeat any technology controls implemented in the information systems environment. Support your position with evidence…
1. Take a position on whether you feel user interfaces for work will remain isol
1. Take a position on whether you feel user interfaces for work will remain isolated or if they will become more collaborative. a. Present at least one evidence to s…
1. Take a snapshot of your virtual machine 2. Boot your virtual machine & login
1. Take a snapshot of your virtual machine 2. Boot your virtual machine & login QA. Where do you think the bootloader resides? 3. Remove the bootloader configuration (e.g. gru…
1. Take the code change it to use references to be more efficient and safe. (If
1. Take the code change it to use references to be more efficient and safe. (If you don't expect the variable to change in the function, do not allow it to change) #include <io…
1. Task: Create a Time class. The class should contain 3 fields (integers called
1. Task: Create a Time class. The class should contain 3 fields (integers called hrs, mins, secs, for hours, minutes and seconds) and the following methods: Default and alternate …
1. Task: Create a Time class. The class should contain 3 fields (integers called
1. Task: Create a Time class. The class should contain 3 fields (integers called hrs, mins, secs, for hours, minutes and seconds) and the following methods: Default and alternate …
1. Telephone versus instant messaging versus email? Which one is your preferred
1. Telephone versus instant messaging versus email? Which one is your preferred method of communication using technology? Why do you prefer it over the others? 2. Identify two (2)…
1. Tell me about the Mercury, Gemini and Apollo missions. How many missions were
1. Tell me about the Mercury, Gemini and Apollo missions. How many missions were involved in each program, what were the mission objectives, who were the key player, what importan…
1. Tell two major differences between a VPN router and a VPN server (e.g., Cisco
1. Tell two major differences between a VPN router and a VPN server (e.g., Cisco VPN concentrator). (8 points) Consider the remote access VPN scenario shown in the Figure. In this…
1. Test Score Evaluation Create a procedure named CalcGrade that receives an int
1. Test Score Evaluation Create a procedure named CalcGrade that receives an integer value between 0 and 100, and returns a single capital letter in the AL register. Preserve all …
1. Test Scores #1
1. Test Scores #1<?xml:namespace prefix = o ns = "urn:schemas-microsoft-com:office:office" /> Create a New Project called YourLastnameSortScores. Write a program that …
1. Test the execution time of the program in Code 3. Make a screen capture which
1. Test the execution time of the program in Code 3. Make a screen capture which shows the execution time that has the unit of machine time unit. Code3 SOURCE.CPP # include&…
1. The .csv file will be read by your program, so save it in a place where you c
1. The .csv file will be read by your program, so save it in a place where you can find it later #include "stdafx.h" #include <iostream> #include <string> #include <…
1. The 68HC11 can address 512K bits of information. Your company is considering
1. The 68HC11 can address 512K bits of information. Your company is considering developing the next generation micro the 68HC12 which will use 1024K bits. What changes to the addr…
1. The Administrative and MedStaff classes extend the Staff class. The Staff cla
1. The Administrative and MedStaff classes extend the Staff class. The Staff class implements the Comparable interface: a. Staff instanceof Comparable b. Staff will contain a meth…
1. The Apache Web server on Fedora is not returning data to the outside world. W
1. The Apache Web server on Fedora is not returning data to the outside world. What could you do to check what might be wrong? 2. Which directories are most important on…
1. The Euclidean distance between any two points (x1, y1) and (x2, y2) is given
1. The Euclidean distance between any two points (x1, y1) and (x2, y2) is given by: d = ((x1 x2) ^2 + (y1 y2)^ 2) The area of a triangle can be calculated based on the lengths of …
1. The Fibonacci sequence is defined as a sequence of integers where each number
1. The Fibonacci sequence is defined as a sequence of integers where each number is the sum of the two preceding ones. The following function returns the nth Fibonacci number. Sho…
1. The Fibonacci sequence is defined as a sequence of integers where each number
1. The Fibonacci sequence is defined as a sequence of integers where each number is the sum of the two preceding ones. The following function returns the nth Fibonacci number. Sho…
1. The HTML tag needed to include an applet in a web page is: 2. The HTML attrib
1. The HTML tag needed to include an applet in a web page is: 2. The HTML attribute used to identify the particular applet is: 3. The utility provided by Oracle (formerly Sun) to …
1. The INC instruction takes a maximum of ___ operands. 2. Finish the instructio
1. The INC instruction takes a maximum of ___ operands. 2. Finish the instruction to decrement 1 from a 16-bit val variable using NASM: DEC ___. 3. When using GAS, the first opera…
1. The Internet Backbone consists of a group of ISPs (a) True (b) False Explain:
1. The Internet Backbone consists of a group of ISPs (a) True (b) False Explain: 2. Access networks are links between ISPs (a) True (b) False Explain: 3. A LAN is Connected to the…
1. The KrebsOnSecurity.com attack ________. a. neither was a denial of service a
1. The KrebsOnSecurity.com attack ________. a. neither was a denial of service attack nor used IoT devices to attack the site b. used IoT devices to attack the site c. both was a …
1. The Logical Equivalent (LE) is: A process that analysts must use to create ef
1. The Logical Equivalent (LE) is: A process that analysts must use to create effective requirements of the needs of a system A software development lifecycle methodology A risk m…
1. The Maclaurin series can be used to represent certain functions such as the o
1. The Maclaurin series can be used to represent certain functions such as the one below. kv2k COS X (2k)! 2! For this compare the accuracy of the Maclaurin series to a definite i…
1. The Maclaurin series can be used to represent certain functions such as the o
1. The Maclaurin series can be used to represent certain functions such as the one below. kv2k COS X (2k)! 2! For this compare the accuracy of the Maclaurin series to a definite i…
1. The Math Program (this is the title you want your void function to display) 1
1. The Math Program (this is the title you want your void function to display) 1. Add 2. Multiply 3. Exit Here is my code : using namespace std; // Function de…
1. The OS controls an I/O device by a) sending a message to the device’s port, b
1. The OS controls an I/O device by a) sending a message to the device’s port, b) using CPU instructions specific to that device, or c) writing to registers in the device’s contro…
1. The OS must maintain __________ tables to manage processes. a) Process b) I/O
1. The OS must maintain __________ tables to manage processes. a) Process b) I/O c) Memory d) File 2. A total of _________ process states are recognized by the UNIX SVR4 operating…
1. The OWASP project (Open Web Application Security Project) is a great source t
1. The OWASP project (Open Web Application Security Project) is a great source to explain the most common web application attack vectors (as Brian posted a couple days ago). Here …
1. The Portfolio Management Maturity Model from Jeffery and Leliveld outlines fo
1. The Portfolio Management Maturity Model from Jeffery and Leliveld outlines four stages of maturity for any organization’s IM/IT portfolio management capabilities.What defines t…
1. The Power Supply and Case are often overlooked when building or upgrading a c
1. The Power Supply and Case are often overlooked when building or upgrading a computer. Describe why they are important in terms of wattage (for power supply), cooling (for both …
1. The Reset button does nothing currently in the program. Implement additional
1.The Reset button does nothing currently in the program. Implement additional code so that when the Reset button is clicked, the game level is reset back to the initial level, an…
1. The Reset button does nothing currently in the program. Implement additional
1.The Reset button does nothing currently in the program. Implement additional code so that when the Reset button is clicked, the game level is reset back to the initial level, an…
Subject
Web development and programming
Use Browse or pick another subject.