Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 244 / 3837

1. The key and value in a dictionary must be of the same type. 2. A ___ works si
1. The key and value in a dictionary must be of the same type. 2. A ___ works similarly to an array; however, when you add or remove items it resizes itself. 3. You declare a list…
1. The keyboard buffer has unlimited capacity A) True B) False 2. The default in
1. The keyboard buffer has unlimited capacity A) True B) False 2. The default input buffer is called stdout A) True B) False 3. The placeholder to read a string is %s A) True B) F…
1. The last command lists information about who has logged into the computer on
1. The last command lists information about who has logged into the computer on which it is run. In particular, it has a column with the username, the terminal on which the user w…
1. The last statement of each function must be a return statement. True False 2.
1. The last statement of each function must be a return statement. True False 2.When the ______ statement is executed, the variable or expression is evaluated and the resulting va…
1. The latest scores from the Japanese Baseball League are in the table with sch
1. The latest scores from the Japanese Baseball League are in the table with schema Scores(Team, Opponent, RunsFor, RunsAgainst) The data in this table is as follows: Team Opponen…
1. The line total-total + num is an example ofa(n)--statement. a. initialization
1. The line total-total + num is an example ofa(n)--statement. a. initialization b. declaration d. definition 2. A(n)-. statement forces an immediate exit from the switch, while, …
1. The lowest normal form that the relational model supports is a. the first nor
1. The lowest normal form that the relational model supports is a.   the first normal form. b.   the second normal form. c.   the third normal form. d.   the Boyce-Codd normal for…
1. The magnetic flux through a loop can change due to a change in which of the f
1. The magnetic flux through a loop can change due to a change in which of the following (there may be more than one correct answer)? Check all that apply. a) the area of the coil…
1. The main difference between a computer virus and a computer worm is that a co
1.       The main difference between a computer virus and a computer worm is that a computer virus: a. is embedded within another program. b. is self-replicating. c. is spread via…
1. The main difference between a computer virus and a computer worm is that a co
1.       The main difference between a computer virus and a computer worm is that a computer virus: a. is embedded within another program. b. is self-replicating. c. is spread via…
1. The main difference between a computer virus and a computer worm is that a co
1.       The main difference between a computer virus and a computer worm is that a computer virus: a. is embedded within another program. b. is self-replicating. c. is spread via…
1. The main things to look for in scatterplots include all of the below except:
1.     The main things to look for in scatterplots include all of the below except: a.     Direction b.     Form c.     Strength d.     Negative values 1.     The slope gets its s…
1. The main) function section contains two parts namely: (a) Function part and e
1. The main) function section contains two parts namely: (a) Function part and executable part (b) Declaration part and executable part (c) Declaration part and I (d) Subprogram p…
1. The message AAAAABBBCDEEF was used to create the following Prefix Code tree:
1. The message AAAAABBBCDEEF was used to create the following Prefix Code tree: How many bits will get used when this Prefix Code tree encodes the message: AAAAABBBCDEEF a. A tota…
1. The message AAAAABBBCDEEF was used to create the following Prefix Code tree:
1. The message AAAAABBBCDEEF was used to create the following Prefix Code tree: How many bits will get used when this Prefix Code tree encodes the message: AAAAABBBCDEEF a. A tota…
1. The minimum and maximum cost of all books in the database published by Pearso
1.    The minimum and maximum cost of all books in the database published by Pearson Publishing 2.   The UNION of all titles published by "Wiley" and all titles published by "Pear…
1. The moon orbits the earth at a distance of about 3.84 * 10^8 (m) in a path th
1. The moon orbits the earth at a distance of about 3.84 * 10^8 (m) in a path that takes 27.3 days to complete. What is the centripetal acceleration of the moon? 2. When a bucket …
1. The moral principles that govern a person\'s or grou A) Laws B) Ethics 0 C) B
1. The moral principles that govern a person's or grou A) Laws B) Ethics 0 C) Behaviors D) Personal Style p's behavior is know as 2. Using someone else's A) Fraud B) Piracy C) Hac…
1. The moral principles that govern a person\'s or grou A) Laws B) Ethics 0 C) B
1. The moral principles that govern a person's or grou A) Laws B) Ethics 0 C) Behaviors D) Personal Style p's behavior is know as 2. Using someone else's A) Fraud B) Piracy C) Hac…
1. The name, telephone number, and quarterly sales totals, separated by ‘:’, for
1. The name, telephone number, and quarterly sales totals, separated by ‘:’, for a list of salespersons for a certain company. Steve Blenheim:238-923-7366:20300:21320:22390:21500 …
1. The network shown in the figure below is an MPLS network with all routers con
1. The network shown in the figure below is an MPLS network with all routers configured as Label Switching Routers(LSRs). The path (LSPs) are determined using TE (Traffic Engineer…
1. The number of Caesar Ciphers on an alphabet of 53 symbols is 2. If an attacke
1. The number of Caesar Ciphers on an alphabet of 53 symbols is 2. If an attacker wants to decrypt a secret message encrypted using a Caesar cipher with an alphabet of 68 symbols,…
1. The number of Caesar Ciphers on an alphabet of 53 symbols is NOTE * the answe
1. The number of Caesar Ciphers on an alphabet of 53 symbols is NOTE * the answer is not 25 2. If an attacker wants to decrypt a secret message encrypted using a Caesar cipher wit…
1. The number of levels in multi-level index depends on a.the number of records
1. The number of levels in multi-level index depends on a.the number of records    b.the size of index block c.the size of index entries    d. all of a., b., and c. 2. ___________…
1. The number of potential probe sequences when using double hashing with a tabl
1. The number of potential probe sequences when using double hashing with a table with m entries (m is prime) is: A. m(m-1) B. m!     C. O(log m)   D. m 2. The number of potential…
1. The objective of this question is to learn how to declare and initialize arra
1. The objective of this question is to learn how to declare and initialize arrays. Write a program that declares and initializes four arrays (A,B,C,D) in the main function, as fo…
1. The operators: & | ^ are: a) AND OR NOT b) AND OR XOR c) AND NOT NAND d) AND
1. The operators: & | ^ are: a) AND OR NOT b) AND OR XOR c) AND NOT NAND d) AND NOR XOR e) none of these 2. Identical programs using only C syntax will tend to run slower when…
1. The operators: & | ^ are: a) AND OR NOT b) AND OR XOR c) AND NOT NAND d) AND
1. The operators: & | ^ are: a) AND OR NOT b) AND OR XOR c) AND NOT NAND d) AND NOR XOR e) none of these 2. Strings are objects, not types. (T/F) 3. Classes are blueprints for…
1. The operators: & | ^ are: a) AND OR NOT b) AND OR XOR c) AND NOT NAND d) AND
1. The operators: & | ^ are: a) AND OR NOT b) AND OR XOR c) AND NOT NAND d) AND NOR XOR e) none of these 2. Well-written programs with identical purpose using only C syntax wi…
1. The operators: & | ^ are: a) AND OR NOT b) AND OR XOR c) AND NOT NAND d) AND
1. The operators: & | ^ are: a) AND OR NOT b) AND OR XOR c) AND NOT NAND d) AND NOR XOR e) none of these 2. Well-written programs with identical purpose using only C syntax wi…
1. The order that struct members are defined does not affect the order in which
1. The order that struct members are defined does not affect the order in which they are accessed a. true b. false 2. A struct is accessed by the struct variable name, the name of…
1. The output of the following code is ______ static void Main(string[] args) {
1. The output of the following code is ______ static void Main(string[] args) { int[] nums = { 1, 0, 6, -2, -4, 3}; var posNums = from n in nums where n % 2 == 0 select n; foreach…
1. The package required by both Java GUI applications and applets the _______ pa
1. The package required by both Java GUI applications and applets the _______ package. 2. The method needed to arrange for an object to be notified when a window's close-window bu…
1. The parity of a number is whether it is even or odd. Consider performing arit
1. The parity of a number is whether it is even or odd. Consider performing arithmetic on numbers where only the parity of the resultis important. For the class definition pragma …
1. The performance of a client-server system is strongly influenced by two major
1. The performance of a client-server system is strongly influenced by two major network characteristics: the bandwidth of the network (that is, how many bits/sec it can transport…
1. The performance of a client-server system is strongly influenced by two major
1. The performance of a client-server system is strongly influenced by two major network characteristics: the bandwidth of the network (that is, how many bits/sec it can transport…
1. The pipeline that allows a process to forward the information needed to start
1. The pipeline that allows a process to forward the information needed to start the next process in line so that the two processes can overlap the processing is a Answer A. Type …
1. The power series 2! 3! k! converges to e for all values of z. Write a functio
1. The power series 2! 3! k! converges to e for all values of z. Write a function subprogram that uses this series to calculate values for e to five-decimal-place accuracy (i.e, u…
1. The primary disadvantage of a fully meshed architecture is. A. It does not pe
1. The primary disadvantage of a fully meshed architecture is. A. It does not perform as well as other architectures B. It is complex to manage C. It does not provide fault tolera…
1. The primary financial impact of a robust CRM system results from retaining cu
1. The primary financial impact of a robust CRM system results from retaining current customers versus obtaining new customers. - True or False? 2. Paul has been working long hour…
1. The process state chart, what are the different states of the process and wha
1. The process state chart, what are the different states of the process and what the transitions between the different states. 2. InterProcess Communication
1. The program asks for 3 natural numbers and outputs minimal number, sum of thi
1. The program asks for 3 natural numbers and outputs minimal number, sum of this numbers and average among them. 2. Program asks price of one item and how many of them were sold …
1. The program cp.c makes a copy of a file. It uses getc () and putc () to do th
1. The program cp.c makes a copy of a file. It uses getc () and putc () to do the input and output. Write four new versions of a file copy program. Each of the programs should hav…
1. The program cp.c makes a copy of a file. It uses getc () and putc () to do th
1. The program cp.c makes a copy of a file. It uses getc () and putc () to do the input and output. Write four new versions of a file copy program. Each of the programs should hav…
1. The program should ask the user for a number input (integer). The program wil
1. The program should ask the user for a number input (integer). The program will then produce the stars ("*") as a square like the sample Stars.java in the screen. However, while…
1. The program should display Please select currencies that you want to exchange
1. The program should display Please select currencies that you want to exchange. Description:        Enter ‘R’for Pakistani Rupees.         Enter ‘E’for Euro.         Enter ‘D’fo…
1. The program shoulddisplay Please select currencies that youwant to exchange.
1. The program shoulddisplay Please select currencies that youwant to exchange. Description:        Enter ‘R’ forPakistani Rupees.        Enter ‘E’ for Euro.         Enter ‘D’for …
1. The program will accept a string as input in which all of the words are run t
1. The program will accept a string as input in which all of the words are run together, but the first character of each word is uppercase. Convert the string to a string in which…
1. The program will prompt for the user\'s first and last name 2. The program wi
1. The program will prompt for the user's first and last name 2. The program will prompt for the user's height in inches, and weight in pounds. 3. 4. 5. These values will be whole…
1. The programming language is C++ 2. Write a function that inserts the nodes of
1. The programming language is C++ 2. Write a function that inserts the nodes of a binary tree into an ordered linked list. Also write a program to test your function. a. Do not c…