Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Web development and programming

191828 questions • Page 246 / 3837

1. There is the code for two tables given below. You must copy this to Notepad++
1. There is the code for two tables given below. You must copy this to Notepad++ (copy it exactly!!, though it has been provided). Once you have copied it to Notepad++, you ought …
1. There is the code for two tables given below. You must copy this to Notepad++
1. There is the code for two tables given below. You must copy this to Notepad++ (copy it exactly!!, though it has been provided). Once you have copied it to Notepad++, you ought …
1. There is tremendous variation in the size and type of construction companies.
1. There is tremendous variation in the size and type of construction companies. In 2004, what percent of fi rms were composed of one to nine people? In what sector were a majorit…
1. Think about keeping a home budget. Would it be better to keep the budget in s
1. Think about keeping a home budget. Would it be better to keep the budget in spreadsheets or to create a budget database? Write a couple of paragraphs that describe your choice …
1. Think of a controversial issue or practice involving cybertechnology that has
1. Think of a controversial issue or practice involving cybertechnology that has not yet been identied as an ethical issue, but which might eventually be recognized as one that ha…
1. Think of another way the company could be using its data warehouse for compet
1. Think of another way the company could be using its data warehouse for competitive purposes. 2. Take a position on whether you believe your ability to maintain privacy and anon…
1. This Prolog exercise is concerned with book, libraries and selection of books
1. This Prolog exercise is concerned with book, libraries and selection of books. A book is represented as a structure of the form book (author, title, no-of-pages, category) The …
1. This assignment asks to add some code from to a previous assignment I had . A
1. This assignment asks to add some code from to a previous assignment I had. A) overload the >> operator to allow for reading a new name and new balance from the keyboard a…
1. This assignment asks to add some code from to a previous assignment I had . A
1. This assignment asks to add some code from to a previous assignment I had. A) overload the >> operator to allow for reading a new name and new balance from the keyboard a…
1. This assignment asks to add some code from to a previous assignment I had . A
1. This assignment asks to add some code from to a previous assignment I had. A) overload the >> operator to allow for reading a new name and new balance from the keyboard a…
1. This assignment asks to add some code from to a previous assignment I had . A
1. This assignment asks to add some code from to a previous assignment I had. A) overload the >> operator to allow for reading a new name and new balance from the keyboard a…
1. This assignment asks to add some code from to a previous assignment I had . A
1. This assignment asks to add some code from to a previous assignment I had. A) overload the >> operator to allow for reading a new name and new balance from the keyboard a…
1. This assignment will compare the performance of the dynamic programming appro
1. This assignment will compare the performance of the dynamic programming approach to the Branch and Bound approach. 2. Consider the 0/1 knapsack problem. Write the complete prog…
1. This following code will create (Explicit/Implicit) Intent (sender/receiver)
1. This following code will create (Explicit/Implicit) Intent (sender/receiver) activity java file and should included in Intent intent-new Intent(this, SecondActivity.class): int…
1. This is a two player (X\'s and O\'x) board game. 2. The game board is a 3 X 3
1. This is a two player (X's and O'x) board game. 2. The game board is a 3 X 3 grid, where each location can hold either and 'X' an 'O' or a space (empty) Note: we will linearize …
1. This is an example of a database. Come up with your own database. This append
1. This is an example of a database. Come up with your own database. This appendix describes the users' requirements specification for the Branch and Staff user views of the Dream…
1. This is taken from Spring 2013 mid-term 2 question 3. This is a different gre
1. This is taken from Spring 2013 mid-term 2 question 3. This is a different greedy algorithm of finding a minimum-cost tree that spans an undirected graph G(V,E), i.e., a tree th…
1. This method takes an array of ints as a parameter and returns an array of boo
1. This method takes an array of ints as a parameter and returns an array of booleans. For each element in the parameter array whose value is 0, the corresponding element of the a…
1. This operator can be used to find the symmetric difference of two sets. | & -
1. This operator can be used to find the symmetric difference of two sets. | & - ^ 2. Python core libraries are called packages modules components libraries 3. myList=[] Which…
1. This particular document describes the rules governing access to a company’s
1.   This particular document describes the rules governing access to a company’s information resources, enforcement, and steps taken if rules are breached a.      Complex securit…
1. This prgram willl consist of a simple class and a tester class. 2. Implement
1. This prgram willl consist of a simple class and a tester class. 2. Implement a class Automobile (Automobile.java). An Automobile will have three instance variables: a make (a S…
1. This problem and the next two concern web browsers and HTTP (a) As described
1. This problem and the next two concern web browsers and HTTP (a) As described on text p. 107, to download the web page located at gaia.cs.umass.edu/kurose ross/inter- active/ind…
1. This problem and the next two concern web browsers and HTTP. (a) As described
1. This problem and the next two concern web browsers and HTTP. (a) As described on text p. 107, to download the web page located at gaia.cs.umass.edu/kurose ross/interactive/inde…
1. This problem explores how, when using a faster computer, thespeedup is affect
1.                 This problem explores how, when using a faster computer, thespeedup is affected by the algorithm's complexity. Suppose we cansolve a problem size nin time t on …
1. This problem investigates nearest neighbor and bilinear interpolation. For si
1. This problem investigates nearest neighbor and bilinear interpolation. For simplicity, we will focus on estimating the image intensity at a single location. Interpolation is us…
1. This problem refers to the following two algorithms. procedure Sort (a1,a2, ,
1. This problem refers to the following two algorithms. procedure Sort (a1,a2, ,an: a list of real numbers with n 1) 1. for i 1 to n -1 2. item. 3. location. i 4. for j i-- 1 to m…
1. This program produces this output. True or False? books o points book input(W
1. This program produces this output. True or False? books o points book input(What book are you returning? )while book !". books.append(book) book - input(What book are you retur…
1. This program should randomly generate from 2 to 12 numbers between the values
1. This program should randomly generate from 2 to 12 numbers between the values of 0 and 1000. (If the number is invalid re-ask until valid) 2. The random number generator needs …
1. This program should randomly generate from 2 to 12 numbers between the values
1. This program should randomly generate from 2 to 12 numbers between the values of 0 and 1000. (If the number is invalid re-ask until valid) 2. The random number generator needs …
1. This programming challenge is based on Total.java program on page 515 (Note:
1. This programming challenge is based on Total.java program on page 515 (Note: Total.java and number.txt are in a zipped folder Chapter11-Example1 provided in Sakai) Suppose you …
1. This programming challenge is based on Total.java program on page 515. Suppos
1. This programming challenge is based on Total.java program on page 515. Suppose you wanted to add the total to an existing file (number.txt) instead of writing a new file. As yo…
1. This question concerns the main security goals (confidentiality, integrity, a
1. This question concerns the main security goals (confidentiality, integrity, availability). Describe a situation in which the the goal of integrity is important, but there is no…
1. This question is based on the figure shown below. The figure shows the topolo
1. This question is based on the figure shown below. The figure shows the topology of the network, and the assigned IP address and MAC address. a. Consider sending an IP datagram …
1. This question is on program tracing and related issues. Consider the followin
1. This question is on program tracing and related issues. Consider the following algorithm which is supposed to begin its operation with an array a of length n > 0 which store…
1. This relational schema models a company schema with departments, employees, a
1. This relational schema models a company schema with departments, employees, and locations.   Primary keys are underlined and foreign keys are indicated below each relation. dep…
1. This statement lets the value of a variable(int or char type only) or express
1. This statement lets the value of a variable(int or char type only) or expression determine where the program will branch to. a.Select b.associative c.scope d.switch 2.What will…
1. Though desktops once dominated the computer market , the advent of laptops an
1. Though desktops once dominated the computer market, the advent of laptops and mobile devices have changed the game. Beyond the examples provided in the text, under what circums…
1. Three of the common CSS selectors select A) by element type, id attribute, an
1. Three of the common CSS selectors select A) by element type, id attribute, and class attribute B) by element, header, and footer C) div, h1, and p elements D) h1, ul, and li el…
1. Three requirements elicitation techniques (Designer as Apprentice, Task Analy
1. Three requirements elicitation techniques (Designer as Apprentice, Task Analysis, and Interviews) were used to obtain the process of designing and bringing new products in an a…
1. Time Complexity (9 points) Let EXP -3SAT = {F #N | F is a satisfiable 3cnf-fo
1. Time Complexity (9 points) Let EXP -3SAT = {F #N | F is a satisfiable 3cnf-formula and N = 2|F |} (i.e., F is a formula followed by an exponential number of #s) (2) (6points)Sh…
1. To avoid having to use fully qualified referenced classes, you could: 2. What
1. To avoid having to use fully qualified referenced classes, you could: 2. What is the .NET class that every other class is derived from? 3. Interface can include: 4. Using the f…
1. To display a graphic in a Picture Box control, change the control\'s property
1. To display a graphic in a Picture Box control, change the control's property a. Image b. Picture c. Graphic d. Icon 2. If you have added a label to a form and you want to make …
1. To give students practice at typing in, compiling and running simple programs
1. To give students practice at typing in, compiling and running simple programs. 2. To learn how to read in input from the user. 3. To learn how to use assignment statements and …
1. To join three tables using the SQL, I will need (x) equations in the WHERE st
1. To join three tables using the SQL, I will need (x) equations in the WHERE statement. (For the answer, enter letters not numbers) 2. Fill in the missing word in the next SQL st…
1. To learn how to use arrays to store and retrieve data to help solving problem
1. To learn how to use arrays to store and retrieve data to help solving problems. 2. Reinforce use of input files. Introduction: Ninja Academy Ninjas are awesome! Your friend has…
1. To pass an array as an argument to a function, pass the ____ of the array. a)
1. To pass an array as an argument to a function, pass the ____ of the array. a) contents b) size, expressed as an integer c) name d) value of the first element e) none 2. An arra…
1. To perform a range test of the “hours worked” data field for an employee, you
1. To perform a range test of the “hours worked” data field for an employee, you should store the term “Between 0 and 40” in which of these properties in a database? (Points : 3) …
1. To prevent attacks, the authenticator must be encrypted in Step (3). However,
1. To prevent attacks, the authenticator must be encrypted in Step (3). However, the client does NOT know the long term key of the TGS. How can Kerberos let the TGS know the authe…
1. To prevent attacks, the authenticator must be encrypted in Step (3). However,
1. To prevent attacks, the authenticator must be encrypted in Step (3). However, the client does NOT know the long term key of the TGS. How can Kerberos let the TGS know the authe…
1. To test for equality between two values, use the ________ operator. 2. ______
1. To test for equality between two values, use the ________ operator. 2. ________ can be omitted if they enclose a single statement in an if construct, but doing so is error-pron…