Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 245 / 3837

1. The programming language is C++ 2. Write a function that inserts the nodes of
1. The programming language is C++ 2. Write a function that inserts the nodes of a binary tree into an ordered linked list. Also write a program to test your function. a. Do not c…
1. The protocol that asks for a MAC address for a known IP address is ..........
1. The protocol that asks for a MAC address for a known IP address is .......................... Question 2 Traceroute relies on the .......................... field within the IP…
1. The provided code reads two sequences of numbers. In this task, you are asked
1. The provided code reads two sequences of numbers. In this task, you are asked to write a function to insert these numbers into two separate doubly linked lists so that the data…
1. The purpose of the exercise is to practice building and traversing an express
1. The purpose of the exercise is to practice building and traversing an expression tree; so I want you to build a tree to hold the expression, and to evaluate the expression by t…
1. The purpose of this questions is to observe the behavior of binary search tre
1. The purpose of this questions is to observe the behavior of binary search trees when adding random integers. You have already given a code for binary search tree. A Let n denot…
1. The read access delay for an I/O system is defined as the time required for t
1. The read access delay for an I/O system is defined as the time required for the device to acquire the requested data and prepare to start transmitting the data. The data transf…
1. The refractive index n of transparent acrylic plastic (full name Poly(methyl
1. The refractive index n of transparent acrylic plastic (full name Poly(methyl methacrylate)) depends on the color (wavelength) of the light passing through it. At wavelength 486…
1. The refractive index n of transparent acrylic plastic (full name Poly(methyl
1. The refractive index n of transparent acrylic plastic (full name Poly(methyl methacrylate)) depends on the color (wavelength) of the light passing through it. At wavelength 486…
1. The refractive index n of transparent acrylic plastic (full name Poly(methyl
1. The refractive index n of transparent acrylic plastic (full name Poly(methyl methacrylate)) depends on the color (wavelength) of the light passing through it. At wavelength 486…
1. The register that holds the actual data to be read from or written to a given
1. The register that holds the actual data to be read from or written to a given memory address is called: a. memory address register b. index register c. memory buffer register d…
1. The relation R(a,b) may have duplicate tuples. Which of the following queries
1.   The relation R(a,b) may have duplicate tuples. Which of the following queries has a result that is guaranteed not to have duplicates, regardless of what tuples R contains? a)…
1. The relation R(a,b) may have duplicate tuples. Which of the following queries
1.   The relation R(a,b) may have duplicate tuples. Which of the following queries has a result that is guaranteed not to have duplicates, regardless of what tuples R contains? a)…
1. The result of the computation 5+3*4*(5+2) is 89. ( is this correct?) 2 . In t
1. The result of the computation 5+3*4*(5+2) is 89. ( is this correct?) 2 . In the following while loop, which of the statements can be moved above the loop without changing the o…
1. The rule for lining up, or matching, elses is that the else is matched with t
1. The rule for lining up, or matching, elses is that the else is matched with the first if, from top to bottom. True False 2. if (amount > 1000)     result = 1; else    if (am…
1. The same Java array can store primitive types and reference types. (True or f
1. The same Java array can store primitive types and reference types. (True or false) 2. Are Java arrays categorized as primitive types or reference types? 3. What is the output o…
1. The save location for a database in Access is chosen: a. while entering data
1. The save location for a database in Access is chosen: a. while entering data into the tables of the database b.while creating tables within the database c. when the data base i…
1. The script below is showing a vectorized code, (a) Make an m-file using a FOR
1. The script below is showing a vectorized code, (a) Make an m-file using a FOR loop to get the same output seen in the vectorized code. deg = 0:10:360; rad = deg * pi/180; t = […
1. The second byte of an instruction in the immediate addressing mode is A a lab
1. The second byte of an instruction in the immediate addressing mode is A a label B. an opcode C. an address value D. a data value 2. The addressing mode for the instruction ADD …
1. The second byte of an instruction in the immediate addressing mode is A. a la
1. The second byte of an instruction in the immediate addressing mode is A. a label B. an opcode C. an address value D. a data value 2. The addressing mode for the instruction ADD…
1. The sequence number field in the TCP header is 32 bits. How many bytes can be
1. The sequence number field in the TCP header is 32 bits. How many bytes can be sent on a TCP connection before it becomes necessary to reuse sequence numbers? 2.Based upon your …
1. The sequence of steps that describes a computational processes is called a(n)
1. The sequence of steps that describes a computational processes is called a(n) ____. a. program c. pseudocode b. computing agent d. algorithm ____ 2. An algorithm consists of a(…
1. The stages of compilation (9 points). One point for each uppose you are given
1. The stages of compilation (9 points). One point for each uppose you are given the following command: Linux gc as b ere a includes the line #include "c.N. It will produce an exe…
1. The state of an object is the set of values maintained in the instance variab
1. The state of an object is the set of values maintained in the instance variables. True False 2.An attribute is also known as a (an) _____________________. method field class in…
1. The statement cin >> *num3; A) stores the keyboard input into the pointer cal
1. The statement cin >> *num3; A) stores the keyboard input into the pointer called num3 B) is illegal in C++. C) stores the keyboard input into the variable pointed to by n…
1. The statement int main() means that main is a function that takes no argument
1. The statement int main() means that main is a function that takes no arguments and returns an integer true false _______________________________________________________________…
1. The statement “Stack objectStack = new Stack();” indicates that obj
1. The statement “Stack<int> objectStack = new Stack<int>();” indicates that object Stack stores _______ . 2. Attempting to invoke a derived-class-only method through …
1. The strcmp function is one function that is available forthe comparison of st
1. The strcmp function is one function that is available forthe comparison of strings. However, it provides very limitedinformation about how the string actually compare. (It simp…
1. The structure that allows you to write one set of instructions that operates
1. The structure that allows you to write one set of instructions that operates on multiple, separate sets of data is the c. loop a. sequence d. Case b. selection 2. The loop that…
1. The system design will include a class named User to represent a user. That c
1. The system design will include a class named User to represent a user. That class should i nclu and a list containing the IDs of the watched iter The class should include a met…
1. The table below contains sample data for parts and for suppliers who provide
1. The table below contains sample data for parts and for suppliers who provide those parts. In discussing this data with users, we find that part ID, but not names, uniquely iden…
1. The table below represents the parts that make up a manufacturable assembly (
1. The table below represents the parts that make up a manufacturable assembly (say, a smart phone). Use MATLAB to compute the total weight of the phone if parts are purchased for…
1. The three key public network components are what? 2. The ability of FDDI and
1. The three key public network components are what? 2. The ability of FDDI and other high-availability fiber networks to wrap connections on either side of a break is due to the …
1. The two Java functions below each return a string of length N whose character
1. The two Java functions below each return a string of length N whose characters are all x. Determine the order of growth of the running time of each, e.g., log N, N, N log N, N^…
1. The unique security issues and considerations of every system make it crucial
1. The unique security issues and considerations of every system make it crucial to understand all of the following, except _____. A.       security standards B.       security sk…
1. The use of a single token to direct a parse is called single-symbol ____.? in
1. The use of a single token to direct a parse is called single-symbol ____.?                                     interpretation             prediction             directives     …
1. The von Neumann bottleneck is caused by: a. the connection between a computer
1. The von Neumann bottleneck is caused by: a. the connection between a computer's memory and its processor. b. inherent inefficiencies in compilers. c. slow disk access caused by…
1. The word ______________ precedes the name of every function prototype and hea
1. The word ______________ precedes the name of every function prototype and heading that does not return a value back to the calling routine. 2. Pass by ___________ indicates tha…
1. The worst-case complexity of a linear search is ____. A. O(n2) B. O(log2n) C.
1. The worst-case complexity of a linear search is ____. A. O(n2) B. O(log2n) C. O(n) D. O(1) 2. As the problem size gets larger, the performance of an algorithm with the higher o…
1. The________ member function moves the read position of a file. 2. Files that
1. The________ member function moves the read position of a file. 2. Files that will be used for both input and output should be defined as______ data type. 3. The ________member …
1. There are 4 caches with the organization and block size as indicated below. A
1.   There are 4 caches with the organization and block size as indicated below. All caches hold 128 words where each word is 4 bytes. Assuming a 32-bit address. a. A direct-mappe…
1. There are 50 people in a party. Each person knows at least oneother person. A
1.                 There are 50 people in a party. Each person knows at least oneother person. At some point a celebrity enters the party. Everybodyknows the celebrity but the cel…
1. There are 60 seconds in a minute. if the number of the seconds entered by the
1. There are 60 seconds in a minute. if the number of the seconds entered by the user is greater than or equal to 60, the program should display the number of minute in that many …
1. There are four 4 major Human Resource Management processes? a. Managing the p
1. There are four 4 major Human Resource Management processes? a. Managing the project team b. Developing the project team c. Planning human resource management d. Acquiring the p…
1. There are important equations in logical expression: Morgan’s Law I: .NOT. (A
1. There are important equations in logical expression: Morgan’s Law I: .NOT. (A .OR. B) = (.NOT. A) .AND. (.NOT. B) Morgan’ Law II: .NOT.(A .AND. B) = (.NOT. A ) .OR.(.NOT. B) Wr…
1. There are many benefits of the Open Source software model adopted by Mozilla.
1. There are many benefits of the Open Source software model adopted by Mozilla. If you were a Kurdistan computer user, which of these benefits would be most valuable to you? Supp…
1. There are three towers which can be represented by source, temp and destinati
1. There are three towers which can be represented by source, temp and destination 2. We have a stack of n disks on the source tower; all the disks have a different diameter. The …
1. There are two kinds of variables in c programs: those to store _______, and t
1. There are two kinds of variables in c programs: those to store _______, and those to store ________. 2. List some common primitive data types in c: 3. Explain why data type is …
1. There are two types of Hypervisors. Describe the similarities and differences
1. There are two types of Hypervisors. Describe the similarities and differences of the two along with an application of each identifying why one would be used over another. 2. Th…
1. There are well established algorithms (e.g., SHA) that can take a file and pr
1. There are well established algorithms (e.g., SHA) that can take a file and produce a unique numeric value (a checksum or hash digest).The sha sum for a file will be different i…
1. There is a client requirement document 1.1 Represent the categories of the re
1. There is a client requirement document 1.1 Represent the categories of the requirements that client-requirement document can be grouped. 1.2 Define every category by analyzing …