Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 242 / 3837

1. The SELECT clause must always be followed by a FROM clause 2. Items after SEL
1. The SELECT clause must always be followed by a FROM clause 2. Items after SELECT must always be columns in a database table. TF 3. You can change the name of a table column sel…
1. The Scheme statement, (map (lambda (x)(* x x)) \'(9 8 7 6)) evaluates to the
1. The Scheme statement, (map (lambda (x)(* x x)) '(9 8 7 6)) evaluates to the list, '(81 64 49 36)             2.The Scheme constructor, cons, is used when you already have a lis…
1. The Scrum approach for managing iterative development involves and/or incorpo
1. The Scrum approach for managing iterative development involves and/or incorporates which of these? Select ALL that apply. Select one or more: a. planning and architectural desi…
1. The Sieve of Eratosthenes is a method of finding all prime numbers up to some
1. The Sieve of Eratosthenes is a method of finding all prime numbers up to some fixed upper limit. It operates in the following way: (a). Create an array of boolean values all in…
1. The Simple Substitution Cipher is a major improvement on the Caesar Cipher. a
1. The Simple Substitution Cipher is a major improvement on the Caesar Cipher. a. In what different ways is it an improvement? b.  If a Simple Substitution Cipher is used (with an…
1. The United States Federal personal income tax is calculated based on filing s
1.      The United States Federal personal income tax is calculated based on filing status and taxable income. There are four filing statuses: single filers (0) , married filing j…
1. The WorkHours class should have the following fields: a. monthlyHours - an ar
1. The WorkHours class should have the following fields: a. monthlyHours - an array of integers, one for each month of the year The WorkHours class should have the following metho…
1. The _______ indicates the number of elements, or values, an array can hold. 2
1. The _______ indicates the number of elements, or values, an array can hold. 2. The size declarator must be a(n) _______ with a value greater than _______. 3. Each element of an…
1. The _______ is the part of a function definition that shows the function name
1. The _______ is the part of a function definition that shows the function name, return type, and parameter list. 2. If a function doesn't return a value, the word _______ will a…
1. The _________ is a programming language construct that provides equivalent fu
1. The _________ is a programming language construct that provides equivalent functionality to that of semaphores and is easier to control. a) atomic operation b) critical section…
1. The ___________ of a machine specifies the instructions that the computer can
1. The ___________ of a machine specifies the instructions that the computer can perform and the format for each instruction. a. control unit b. CPU c. instruction set architectur…
1. The ____________ ___________ is the core of a computer\'s system software. 2.
1. The ____________ ___________ is the core of a computer's system software. 2. Given the following information: Process 1 has a logical of address of <1,222>, frame number …
1. The _____________________ of a numeric data type indicates the total number o
1. The _____________________ of a numeric data type indicates the total number of digits that can be stored in the data type. 2. When you code a subquery in a FROM clause, you mus…
1. The ______________________ does the translation between IP addresses and MAC
1. The ______________________ does the translation between IP addresses and MAC addresses. 2. ________________ is the most commonly used wired LAN network. 3. The packet processin…
1. The `get()` method in the IntegerList class returns the value in the list at
1. The `get()` method in the IntegerList class returns the value in the list at the index passed in as a parameter. Valid inputs to `get()` are integers from 0 to size-1 if the li…
1. The ability of a PLC to perform math functions is intended to: 1. a) replace
1. The ability of a PLC to perform math functions is intended to:        1. a) replace a calculator. b) multiply the effective number of input and output devices. c) perform arith…
1. The actual value of NULL is Select one: a. -1 b. 0 c. 99999 d. -99 2. There i
1. The actual value of NULL is Select one: a. -1 b. 0 c. 99999 d. -99 2. There is no need for error checking when popping a stack. Select one: True False 3. Select one: a. You hav…
1. The advantage(s) of creating indexes in the database is/are a.Indexes reduce
1. The advantage(s) of creating indexes in the database is/are a.Indexes reduce time to insert data into the database b.Indexes enhance the presentation of data to the end user c.…
1. The algorithm to generate the trendline of a set of points is: Generate Trend
1. The algorithm to generate the trendline of a set of points is: Generate Trendline Calculate the slope Calculate the y_intercept Trendline is y = slope * x + y_intercept (y = mx…
1. The application view of a data structure is associated with which of the foll
1. The application view of a data structure is associated with which of the following? 2. The implementation view of a data structure is associated with which of the following? 3.…
1. The approximate value of Lieb\'s square ice constant is 1.53960. Show how to
1. The approximate value of Lieb's square ice constant is 1.53960. Show how to define this as a constant named LIEBS using a pre-processor directive: Show show to define this as a…
1. The approximate value of Lieb\'s square ice constant is 1.53960. Show how to
1. The approximate value of Lieb's square ice constant is 1.53960. Show how to define this as a constant named LIEBS using a pre-processor directive: Show show to define this as a…
1. The array implementation in this chapter keeps the top variable pointing to t
1. The array implementation in this chapter keeps the top variable pointing to the next array position above the actual top of the stack. Rewrite the array implementation such tha…
1. The array int[][] numbers contains many numbers. Unfortunately, some of those
1. The array int[][] numbers contains many numbers. Unfortunately, some of those numbers are 3, which is an ugly number (it's just a lazy 8). Remove all 3s from the matrix and rep…
1. The array-based implementation of the ADT queue on page 422 assumes a maximum
1. The array-based implementation of the ADT queue on page 422 assumes a maximum queue size of 50 items. At first, create a NetBeans project which implements all of the code given…
1. The author begins Chapter 7 with TJX case study and discusses Payment Card In
1. The author begins Chapter 7 with TJX case study and discusses Payment Card Industry-Data Security Standard (PCI-DSS) on page 253. What is the latest standard in PCI-DSS and how…
1. The base class Dog is a class with general information about dogs. Store the
1. The base class Dog is a class with general information about dogs. Store the declaration for this class in a file called lab8dog.h. The class has three protected data members t…
1. The beginning of a free space bitmap looks like this after the disk partition
1. The beginning of a free space bitmap looks like this after the disk partition is first formatted: 1000 0000 0000 0000 0000 0000 0000 0000 (the first block is used by the root d…
1. The block of code that handles an exception is called Select one: a. the catc
1. The block of code that handles an exception is called Select one: a. the catch block. b. the try block. c. a function. d. an error block. 2. If a function throws an exception S…
1. The body of a function is contained in braces. T or F 2. The parameter list (
1. The body of a function is contained in braces. T or F 2. The parameter list (or argument list) contains all objects used by the function. T or F 3. In a call by calue, a funtio…
1. The central question of theory is What
1.                     The central question of <computability, complexity, automata> theory is What makes some problems difficult and others easy? 2.                     The…
1. The citizens of Antarctica on a future, slightly warmer planet, live in n cit
1. The citizens of Antarctica on a future, slightly warmer planet, live in n cities along the coast of the continent. To get from one city to another they may sail, but the seas a…
1. The class AbstractButton is abstract. It is a sublcass of the JComponent clas
1. The class AbstractButton is abstract. It is a sublcass of the JComponent class. It also implements two interfaces: ItemSelectable and SwingConstants. Fill in the blanks to comp…
1. The class D inherits from base class B using public inheritance. The class B
1. The class D inherits from base class B using public inheritance. The class B has public member function f(), but the derived class has no function member with this signature. T…
1. The class Shapes includes two void methods: calcRectangleArea( ) and calcRect
1. The class Shapes includes two void methods: calcRectangleArea( ) and calcRectanglePerimeter( ). The calcRectangleArea( ) method takes two int parameters (length and width), cal…
1. The clicking of the mouse on a desktop item to indicate selection is an examp
1. The clicking of the mouse on a desktop item to indicate selection is an example of a _______ metaphor. 2. According to "Human Errors" alertness and ______ in action or memory a…
1. The closer the memory to the CPU, the faster it is. 2. The 2’s complement rep
1. The closer the memory to the CPU, the faster it is. 2. The 2’s complement representation of a positive number is its two’s complement. 3. Direct Memory Access I/O technique req…
1. The code in Figure 11-49 executes when a button is tapped or clicked on a Win
1. The code in Figure 11-49 executes when a button is tapped or clicked on a Windows Form object. Identify what will happen when a single error occurs. What happens if two errors …
1. The content of AC in the basic computer is hexadecimal 789A ; the initial val
1. The content of AC in the basic computer is hexadecimal 789A ; the initial value of E is 1; and the initial value of PC is hexadecimal 048. Determine the contents of E, AC, PC, …
1. The core classes available with each data provider include all of the followi
1. The core classes available with each data provider include all of the following except: a. Connection b. DataAdapter c. Command d. DataSet e. DataReader 2. Each data provider c…
1. The correct output of the following (poorly - indented) program segment is :
1. The correct output of the following (poorly - indented) program segment is : int num = 4; double a = -1.0; if (num > 0) if (a > 0) System.out.println("first"); else Syste…
1. The critical path is: a The longest path through the network and determines t
1. The critical path is: a The longest path through the network and determines the earliest completion of project work. b The initial requirements phase of a project. c A risk man…
1. The current method executing is always the method whose activation record is
1. The current method executing is always the method whose activation record is ________. Select one: at the bottom of the stack. second from the top of the stack, just below the …
1. The cycle time of a processor with a 1 GHz clock rate is ___________ nanoseco
1. The cycle time of a processor with a 1 GHz clock rate is ___________ nanosecond(s). 2. Which of the following CPU components fetches an instruction from a register, increments …
1. The data below are for an airline. Each flight can leave at any time from any
1. The data below are for an airline. Each flight can leave at any time from any airport and is identified by FlightID. Each flight is piloted by one and only one captain in an ai…
1. The data type char and the data type __ are often interchangeable in C++. a)
1. The data type char and the data type __ are often interchangeable in C++. a) double b) float c) int d) string 2. What will happen if a char is cout'd as an int? a) the characte…
1. The default section is required in a switch statement True False 2. If the su
1. The default section is required in a switch statement True False 2. If the sub-expression on the left side of the && operator is true, the expression on the right side …
1. The denormalized design of a JSON document implies a violation of thed lsioin
1. The denormalized design of a JSON document implies a violation of thed lsiointness constraint. b. fifth normal form. c. first normal form. d. XML well-formedness. 2. A query tr…
1. The design constraints imposed in the sorting system are: [1] programming lan
1. The design constraints imposed in the sorting system are: [1] programming language and algorithms. [2] security and other systems interaction. [3] platform and schedule. [4] us…
1. The detailed specification of how all the parts of a system will be implement
1. The detailed specification of how all the parts of a system will be implemented and coordinated a. programming b. paraphrasing The primary purpose of good modeling techniques i…