Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 243 / 3837

1. The division of positive integers can be considered as repetitive subtraction
1. The division of positive integers can be considered as repetitive subtraction of the divisor from the dividend until no more subtractions will result in a positive remainder. F…
1. The early computer networking protocol that provided nearly instantaneous ace
1. The early computer networking protocol that provided nearly instantaneous acess between client terminals and host computers was: A) OSI                         B) SNA          …
1. The enhanced for loop: Java provides a specialized version of the for loop th
1. The enhanced for loop: Java provides a specialized version of the for loop that, in many circumstances, simplifies array processing. It is known as enhanced for loop. General f…
1. The escape sequence ‘\ ’ means newline. It causes the cursor to move to the b
1. The escape sequence ‘ ’ means newline. It causes the cursor to move to the beginning of the next line on the screen. 2. C++ programs begin executing at the function main ( ) , …
1. The event handler property of the XMLHttpRequest object is ________. status r
1. The event handler property of the XMLHttpRequest object is ________. status readystate onreadystatechange responseText 2. In a typical three-tiered webapp, the client of the da…
1. The expression 2*3 2 evaluates to wbich of the following values? a. 64 b. 512
1. The expression 2*3 2 evaluates to wbich of the following values? a. 64 b. 512 d 64 2. How many times does a loop with the header for count in range(10): execute the statements …
1. The file called \"sunspots.txt\" contains the observed number of sunspots on
1. The file called "sunspots.txt" contains the observed number of sunspots on the Sun for each month since January 1749. The file contains two columns of numbers, the first being …
1. The first Class example was given in class. Write the member functions for th
1. The first Class example was given in class. Write the member functions for the calculation of mean and standard deviation. Highlight your code so that I can easily find it in t…
1. The first step would be to do this coding assignment and send the answer back
1. The first step would be to do this coding assignment and send the answer back for review. 2. Feel free to code in any language you prefer. 3. Please include a quick summary of …
1. The first subscript of ever array in C++ is ________________ and the last is
1. The first subscript of ever array in C++ is ________________ and the last is _____________ less than the total number of locations in the array. 2. The amount of memory allocat…
1. The firstinteger line of the file will be a positive integer, n (less than 10
1. The firstinteger line of the file will be a positive integer, n(less than 1000), indicating the number of test cases in thefile. 2. The nextn lines will contain a single positi…
1. The flight path of a projectile isdependent on the angle (q) that it is fired
1.      The flight path of a projectile isdependent on the angle (q) that it is fired. This path can beseparated into a horizontal and vertical distance as a function oftime.     …
1. The following Java code provides the outline of a simple bank account class i
1. The following Java code provides the outline of a simple bank account class import java.io.*; public class Account implements Comparable, Serializable ( protected int accnum; p…
1. The following MIPS function processes an array and returnstwo values in $v0 a
1. The following MIPS function processes an array and returnstwo values in $v0 and $v1. Assuming that the array consists of 5000 words indexed 0through 4999, and its base address …
1. The following algorithm returns true if the sorted array A contains all uniqu
1. The following algorithm returns true if the sorted array A contains all unique elements (no duplicates) and returns false otherwise: ALL_UNIQUE(sortedA)      for i = 1 to sorte…
1. The following are relations on the set {1,2,3,4}. a.) { (2,1), (1,4), (2,4),
1.   The following are relations on the set {1,2,3,4}. a.) { (2,1), (1,4), (2,4), (4,3), (1,3), (4,4), (1,1), (4,1), (2,3) } b.) { (1,1), (1,2), (2,2), (3,1), (3,3), (4,4), (1,3),…
1. The following are types of multi-media networking applications except A) text
1. The following are types of multi-media networking applications except A) text messaging and web page downloads (live, real-time texting and data transfer) B) streaming, stored …
1. The following class framework corresponds to the class public class ClassName
1. The following class framework corresponds to the class public class ClassName {                private int info;                private ClassName next;                //Class m…
1. The following code adds integers in two arrays (whose address is in $s0 and $
1. The following code adds integers in two arrays (whose address is in $s0 and $s1) and stores the results back into the first array. $s2 is initialized to 0. Ss3 is 100 I2: I3: I…
1. The following code is the start of the LinkedList class public class LinkedLi
1. The following code is the start of the LinkedList class public class LinkedList<E> implements List<E> { private LinkedNode<E> head; private LinkedNode<E&gt…
1. The following code uses two arrays, one to store products and the other to st
1. The following code uses two arrays, one to store products and the other to store product ID's (a better organization would be to use a singe array of a class or struct, but tha…
1. The following codefragment invokes a function named InitToZero: Int alpha[10]
1.       The following codefragment invokes a function named InitToZero: Int alpha[10] [20]; InitToZero(alpha); Which of the following is a valid function heading forInitToZero? A…
1. The following command was issued on the tablespace containing the ZIP_CODE ta
1.   The following command was issued on the tablespace containing the ZIP_CODE table. DROP TABLESPACE USER_REF; What happens? A. The tablespace and the ZIP_CODE table are dropped…
1. The following database Supply (Company, part, Qty) Storage (Department, part,
1. The following database Supply (Company, part, Qty) Storage (Department, part, Qty) find all parts and their quantity used by “ computer science” department. find all companies …
1. The following function uses reference variables as parameters. Rewrite the fu
1. The following function uses reference variables as parameters. Rewrite the function so it uses pointers instead of reference variables, and then demonstrate the function in a c…
1. The following function uses reference variables as parameters. Rewrite the fu
                    1.                                      The following function uses reference variables as parameters. Rewrite the function so it uses pointers instead of refe…
1. The following interface and classes have to do with the storage of informatio
1. The following interface and classes have to do with the storage of information that may appear on a mailing label. Design and implement each of the described classes below. pub…
1. The following interface and classes have to do with the storage of informatio
1. The following interface and classes have to do with the storage of information that may appear on a mailing label. Design and implement each of the described classes below. The…
1. The following is an unnormalized sample data of a Room-Reservation datastore.
1.      The following is an unnormalized sample data of a Room-Reservation datastore. No Reserve ID. Reserve Date Guest Passport Guest Name Room Number Room Type Room Rate Date Ch…
1. The following matrix was produced by Warshall’s algorithm with successors. Ho
1. The following matrix was produced by Warshall’s algorithm with successors. How many edges are on the represented path from 3 to 1?    -1   3   3   3   3    -1   3   3   3   4  …
1. The following program is stored in the memory unit of the basic computer. Sho
1. The following program is stored in the memory unit of the basic computer. Show the contents of the AC, PC, and lR (in hexadecimal), at the end, after each instruction is execut…
1. The following program will not compile. Rewrite it so that it compiles and co
1. The following program will not compile. Rewrite it so that it compiles and correctly prints the numbers 0 through 4 on successive lines, and then prints the final value of coun…
1. The following questions refer to the skeletal Ct+ program shown below (a) Ass
1. The following questions refer to the skeletal Ct+ program shown below (a) Assume that static scoping is used. List all variables, along with the functions in which they are dec…
1. The following refer to symbol table implementations. a. What is the benefit o
1.   The following refer to symbol table implementations. a.   What is the benefit of using a key-indexed array implementation? b.   Give a circumstance under which a key-indexed …
1. The following requirements are for a program that maintains boats docked in a
1. The following requirements are for a program that maintains boats docked in a harbor. a. Define a structure to store the following data on boats docked in the harbor: owner’s l…
1. The following statement creates an InventoryItem array: InventoryItem[] items
1. The following statement creates an InventoryItem array: InventoryItem[] items = new InventoryItem[10]; Is it okay or not okay to execute the following statement; items[0].setDe…
1. The following structure holds the student grades in homeworks: typedef struct
1. The following structure holds the student grades in homeworks: typedef struct char name Your name as string char grade Your letter grade as string, can be "A", "A-", "B+", "B",…
1. The following table shows a sample process workload: Process Burst Time Prior
1. The following table shows a sample process workload: Process Burst Time Priority Arrival Time P1 50 ms 0 ms P2 20 ms 1 20 ms 100 ms L P3 40 ms P4 40 ms 2 60 ms The following is…
1. The following “proof by induction” attemps to prove that all horses in univer
1.       The following “proof by induction” attemps to prove that all horses in universe have the same color. That is, for every n 1, any set of n horses in universe have the same…
1. The four types of access that may be granted to a database are ___, ___, ___,
1. The four types of access that may be granted to a database are ___, ___, ___, ___ (CRUD), and also represent the four types of security breaches that may occur in systems. 4. A…
1. The function add(int location, int item) is not a valid operation of bags. ad
1. The function add(int location, int item)              is not a valid operation of bags.        adds the item at the end of the bag.        replaces the item in the bag at the p…
1. The fundamental graphic elenments are not points, lines, and eurves 2. Sketch
1. The fundamental graphic elenments are not points, lines, and eurves 2. Sketches and shapes are not composed from points, lines and eurves 3. A sketch is an approximate graphie …
1. The goal of network design is to _____. create a visually attractive network
1. The goal of network design is to _____. create a visually attractive network use the latest technologies to implement the network meet end user needs within budget use the leas…
1. The greatest common divisor of two non-negative integers i and jis the larges
1. The greatest common divisor of two non-negative integers i and jis the largest integer that divides both i and j evenly. Forexample, gcd(24, 30) = 6, and gcd(24, 35) = 1. Write…
1. The guide emphasizes that crimi- nals and corporations both seek out the priv
1. The guide emphasizes that crimi- nals and corporations both seek out the private data of Internet users for their own gains, but they are not the only ones trying to access you…
1. The if statement in C# always requires an else statement. True False 2. When
1. The if statement in C# always requires an else statement. True False 2. When using an AND in a logical expression, both statements must evaluate to true for the expression to e…
1. The individual values contained in array are known as array ______. A) parts
1. The individual values contained in array are known as array ______. A) parts B) subscripts C) elements D) indexes 2. To access an array element, use the array name and the elem…
1. The invariant of a class is a. the rules of programming that all programmers
1. The invariant of a class is a. the rules of programming that all programmers have been following these past 50 years. b. objects of a class which are not allowed to change c. t…
1. The is called whenever a class object is no longer in use. It is used for gar
1. The is called whenever a class object is no longer in use. It is used for garbage collection. a) cleaner b) destructor c) copy constructor d) assignment operator 2. 01 class A …
1. The issue of resource utilization shows up in different forms in different ty
1. The issue of resource utilization shows up in different forms in different types of operating systems. List what resources must be managed carefully in the following settings: …